{"id":24962,"date":"2019-02-05T10:36:50","date_gmt":"2019-02-05T10:36:50","guid":{"rendered":"http:\/\/ac4770c5-5f6d-4358-b499-eba5f83ce79b"},"modified":"2019-02-05T10:36:50","modified_gmt":"2019-02-05T10:36:50","slug":"pro-tibet-groups-targeted-with-exilerat-in-spy-campaign","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/","title":{"rendered":"Pro-Tibet groups targeted with ExileRAT in spy campaign"},"content":{"rendered":"<p>Researchers have uncovered a new cyberespionage campaign which is targeting pro-Tibetan individuals in order to distribute the ExileRAT Trojan.<\/p>\n<p>On Monday, researchers <a href=\"https:\/\/blog.talosintelligence.com\/2019\/02\/exilerat-shares-c2-with-luckycat.html\" target=\"_blank\" rel=\"noopener noreferrer\">from Cisco Talos said<\/a> that the new campaign delivers a malicious Microsoft PowerPoint document containing the Remote Access Trojan (RAT) which is capable of stealing system and personal information, terminating or launching processes, surveillance and the theft of files.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>The malware is being spread through a &#8220;Tibetan News&#8221; mailing list belonging to the Central Tibetan Administration (CTA), an organization which is representing the Tibetan government-in-exile.<\/p>\n<p><strong>See also:\u00a0<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/nanocore-trojan-stops-you-killing-its-process\/\" target=\"_blank\">NanoCore Trojan is protected in memory from being killed off<\/a><\/p>\n<p>The list is used to contact supporters and is operated through India-based DearMail. Talos says that the attackers were able to modify the standard Reply-to header so responses would be sent back to an email address managed by the scammers.<\/p>\n<p>The malicious email references the upcoming 60th anniversary of the Dalai Lama&#8217;s exile and it is believed every subscriber has received the phishing message.<\/p>\n<p>Recipients of emails sent through the targeting phishing scheme are presented with a .PPSX file which is loaded with an exploit for <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-0199\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2017-0199<\/a>, an arbitrary code vulnerability in Microsoft Office which was patched in 2017.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p><strong>CNET:\u00a0<\/strong><a href=\"https:\/\/www.cnet.com\/news\/apple-stores-russian-users-data-on-russian-servers-report-says\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple stores Russian users&#8217; data on Russian servers, report says<\/a><\/p>\n<p>The PowerPoint document is a copy of the legitimate &#8220;Tibet-was-never-a-part-of-China&#8221; presentation which was published in November 2018 by the CTA.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2019\/02\/05\/4fdd0270-9cf0-4b10-9aaf-5bb7cff2d9dc\/a2295d653081ac7fbed06cf0fad8e16f\/screenshot-2019-02-05-at-09-26-30.png\" class=\"\" alt=\"screenshot-2019-02-05-at-09-26-30.png\"\/><\/span> <span class=\"credit\">Cisco Talos<\/span><\/p>\n<p>The .PPSX file contains a dropper which pulls the Trojan from its command-and-control (C20 server for execution on a vulnerable system.<\/p>\n<p>Interestingly, Talos found that the C2 connected to this campaign has also been linked to the LuckyCat Android- and Windows-based Trojans in the past.<\/p>\n<p>LuckyCat is believed to be the work of pro-Chinese threat actors in pursuit of information belonging to Tibetan activists. An IP address connected to LuckyCat has also been linked to a <a href=\"https:\/\/www.zdnet.com\/article\/new-targeted-mac-os-x-trojan-requires-no-user-interaction\/\" target=\"_blank\">Mac Trojan spotted<\/a> in the wild in 2012.<\/p>\n<p><strong>TechRepublic:\u00a0<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/3-ways-state-actors-target-businesses-in-cyber-warfare-and-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noopener noreferrer\">3 ways state actors target businesses in cyber warfare, and how to protect yourself<\/a><\/p>\n<p>&#8220;Given the nature of this malware and the targets involved, it is likely designed for espionage purposes rather than financial gain,&#8221; Talos says. &#8220;This is just part of a continuing trend of nation-state actors working to spy on civilian populations for political reasons.&#8221;<\/p>\n<p>In November, the same team of researchers published an investigation into <a href=\"https:\/\/www.zdnet.com\/article\/persian-stalker-grayware-targets-telegram-instagram-users\/\" target=\"_blank\">Persian Stalker<\/a>, a potentially state-sponsored threat group which is targeting Iranian users of Telegram, an app banned in the country. Phishing is taking place alongside the takeover of the Border Gateway Protocol (BGP) to reroute Internet traffic, an attack that average users cannot defend themselves against.\u00a0<\/p>\n<h3>Previous and related coverage<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/pro-tibet-groups-targeted-with-exilerat-in-spam-campaign\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cyberespionage scheme makes use of a mailing list operated by the Tibetan government-in-exile.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":24963,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-24962","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pro-Tibet groups targeted with ExileRAT in spy campaign 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pro-Tibet groups targeted with ExileRAT in spy campaign 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-05T10:36:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1292\" \/>\n\t<meta property=\"og:image:height\" content=\"868\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Pro-Tibet groups targeted with ExileRAT in spy campaign\",\"datePublished\":\"2019-02-05T10:36:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\\\/\"},\"wordCount\":446,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\\\/\",\"name\":\"Pro-Tibet groups targeted with ExileRAT in spy campaign 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign.png\",\"datePublished\":\"2019-02-05T10:36:50+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign.png\",\"width\":1292,\"height\":868},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pro-Tibet groups targeted with ExileRAT in spy campaign\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pro-Tibet groups targeted with ExileRAT in spy campaign 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/","og_locale":"en_US","og_type":"article","og_title":"Pro-Tibet groups targeted with ExileRAT in spy campaign 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-05T10:36:50+00:00","og_image":[{"width":1292,"height":868,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Pro-Tibet groups targeted with ExileRAT in spy campaign","datePublished":"2019-02-05T10:36:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/"},"wordCount":446,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/","url":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/","name":"Pro-Tibet groups targeted with ExileRAT in spy campaign 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign.png","datePublished":"2019-02-05T10:36:50+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign.png","width":1292,"height":868},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/pro-tibet-groups-targeted-with-exilerat-in-spy-campaign\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Pro-Tibet groups targeted with ExileRAT in spy campaign"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=24962"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/24962\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/24963"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=24962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=24962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=24962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}