{"id":26334,"date":"2019-03-24T10:34:06","date_gmt":"2019-03-24T10:34:06","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/"},"modified":"2019-03-24T10:34:06","modified_gmt":"2019-03-24T10:34:06","slug":"slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/","title":{"rendered":"Slack slings crypto-keys at big biz, union gets worked over, VPN owners probed, trolls trouble vets, and more"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/03\/10\/keys_648x429.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong class=\"trailer\">Roundup<\/strong> This week we got <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/03\/22\/medtronic_implanted_defibrillator_hackable\/\">freaked out<\/a> about heart implant hacks, welcomed <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/03\/21\/microsoft_defender_atp\/\">a new<\/a> Microsoft security tool, and endured <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/03\/21\/facebook_passwords\/\">yet another<\/a> Facebook fsck up.<\/p>\n<p>Here&#8217;s what else happened along the way:<\/p>\n<h3 class=\"crosshead\"><span>Slack pack give keys a whack<\/span><\/h3>\n<p>Large enterprise customers will now have more control over the security of their Slack channels.<\/p>\n<p>This after the workplace chat giant <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/slackhq.com\/enterprise-key-management\">announced<\/a> it would let companies bring their own security keys into their Slack channels. The feature, called Enterprise Key Management, works through AWS, letting businesses push their keys to AWS key management system then use them with their own Slack installations.<\/p>\n<p>&#8220;What actually makes the design of our system so unique is that, in the case of an incident let\u2019s say, rather than revoking access to the entire product, admins can choose to revoke access in a very granular, highly targeted manner,&#8221; said Slack CSO Geoff Belknapp.<\/p>\n<p>&#8220;That granular revocation ensures that teams continue working while admins suss out any risks.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>Scare in Texas over hacked sirens<\/span><\/h3>\n<p>Earlier this month, residents in two Texas towns were awoken at 0230 when storm sirens suddenly went off. <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/dfw.cbslocal.com\/2019\/03\/12\/texas-emergency-warming-sirens-hacked\/\">According to<\/a> Dallas-area TV station CBS-DFW, authorities are convinced the late-night wailing was the work of hackers.<\/p>\n<p>The station cites officials in the cities of DeSoto and Lancaster who report that an unknown person(s) were somehow able to get into the city&#8217;s network and trigger storm sirens across the two cities. This, in turn, prompted officials to shut down the emergency siren system for several days while the matter was sorted.<\/p>\n<p>&#8220;Based on the widespread impact to the outdoor sirens located in two separate cities, including Lancaster, it has become evident that a person or persons with hostile intent deliberately targeted our combined outdoor warning siren network,&#8221; Lancaster city hall said.<\/p>\n<p>&#8220;Sabotage against a public warning system is more than vandalism.&#8221;<\/p>\n<div class=\"boxout\" readability=\"10.393285371703\">\n<h3 class=\"crosshead\"><span>In brief&#8230;<\/span><\/h3>\n<p>State-backed hackers in <strong>Vietnam<\/strong> are <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2019-03-20\/vietnam-tied-hackers-target-auto-industry-firms-fireeye-says?srnd=cybersecurity\">said<\/a> to be compromising car makers for info. A <strong>Sprint<\/strong> website glitch <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/techcrunch.com\/2019\/03\/18\/sprint-account-leak\/\">revealed<\/a> US cellular subscribers&#8217; info to strangers. Scientific journal giant <strong>Elsevier<\/strong> <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/motherboard.vice.com\/en_us\/article\/vbw8b9\/elsevier-user-passwords-exposed-online\">exposed<\/a> to the public internet the passwords of some of its users via a poorly secured server. And <strong>a child-tracking app<\/strong> for parents <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/techcrunch.com\/2019\/03\/23\/family-tracking-location-leak\/\">left<\/a> a MongoDB of youngsters&#8217; real-time location data facing the public web, too.<\/p>\n<\/div>\n<h3 class=\"crosshead\"><span>Metal workers in deep sheet following data breach<\/span><\/h3>\n<p>A California division of the Sheet Metal Workers Union is sending out warnings to its members following the disclosure of a data breach related to equipment theft.<\/p>\n<p>Local 104 <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/oag.ca.gov\/system\/files\/Calif%20Resident%20Letter_0.pdf\">told<\/a> (PDF) the state Attorney General&#8217;s office that on February 5 one of its administrators had their car broken into.<\/p>\n<p>Among the items stolen from the vehicle were a backpack, laptop, and a flash drive containing the names, driver&#8217;s license numbers, and social security numbers for members of the local union.<\/p>\n<p>As a result, the union now says it will offer those who were exposed the standard two-year enrollment in a credit monitoring service. It is recommended that anyone who gets a notification letter from the union should keep a close eye on their bank statements and seriously consider enrolling in the monitoring service.<\/p>\n<h3 class=\"crosshead\"><span>Spyware linked to journalist&#8217;s killing in Mexico<\/span><\/h3>\n<p>A journalist in Mexico suspected to have been murdered by a local drug cartel was also the subject of a targeted spyware campaign.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/citizenlab.ca\/2019\/03\/nso-spyware-slain-journalists-wife\/\">Citizen Lab reports<\/a> that in the week after the killing of Javier Valdez, attempts were made to infect the phones of two of Valdez&#8217; former colleagues, as well as his widow, Griselda Triana, with spyware. Researchers eventually linked the malware to an ongoing attempt by a government-connected group to monitor journalists with tools developed by the NSO Group.<\/p>\n<p>&#8220;The spyware, developed by Israeli company NSO Group, is designed to infect and remotely monitor mobile phones,&#8221; the report notes.<\/p>\n<p>&#8220;In that investigation, we linked the infection attempts to a group that we call RECKLESS-1, which we linked to the Mexican government.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>Pick a type of fraud: Chances are one of these two blokes engaged in it<\/span><\/h3>\n<p>Two US men have been convicted of carrying out a remarkable range of online and real-world fraud schemes.<\/p>\n<p>The <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.justice.gov\/opa\/pr\/two-men-found-guilty-international-cyber-fraud-scheme-involving-online-dating-and-businesshttps:\/\/www.justice.gov\/opa\/pr\/two-men-found-guilty-international-cyber-fraud-scheme-involving-online-dating-and-business\">DOJ has announced<\/a> guilty verdicts against two men who were found to have engaged in a series of scams ranging from dating to email compromise and even sham marriages.<\/p>\n<p>Olufolajimi Abegunde and Javier Luis Ramos-Alonso were found to have engaged in, among other things, dating site &#8220;catfishing&#8221; scams where people were tricked into sending cash, money mule scams where marks were told to cash out stolen funds and send wire transfers, and even business email compromise attacks where funds were drained from companies.<\/p>\n<p>Abegunde was also said to have helped launder the stolen cash through black market currency trades and helped support the whole thing by keeping two separate marriages.<\/p>\n<p>&#8220;Abegunde was married during his studies at Texas A&amp;M, but divorced his wife in 2016 to marry a US service member through whom he could obtain immigration and health care benefits and also open new bank accounts,&#8221; the DOJ said.<\/p>\n<p>&#8220;He continued to live with his first wife in Atlanta while his US service member wife was deployed to South Korea.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>Trolls target veterans groups<\/span><\/h3>\n<p>In case you wondered how social media could get any more toxic and miserable, the US government is now worried that troll groups are targeting American veterans.<\/p>\n<p>Rep Ted Lieu (D-CA) <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/lieu.house.gov\/media-center\/in-the-news\/congressmen-urge-fbi-investigate-bots-targeting-veterans-fake-news\">is calling on<\/a> the FBI to open an investigation into suspected organized troll campaigns focusing on manipulates both vets&#8217; groups and those still serving in uniform.<\/p>\n<p>The congressman says the troll farms are creating fake veterans&#8217; groups, then using the bogus profiles to manipulate vets and service members much in the same way political groups did in the run-up to the 2016 election.<\/p>\n<h3 class=\"crosshead\"><span>Meet the new VPN, same as the old VPN<\/span><\/h3>\n<p>Users looking to get a new VPN could be in for a shock when they find their old and new service are run by the same company.<\/p>\n<p>A report from reviews site VPNPro shared with <em>The Register<\/em> examined 97 popular VPN products and found that all were the work of just 23 companies. In most instances, developers maintained multiple VPN apps.<\/p>\n<p>Why is this a big deal? VPNPro researchers note that with so much consolidation, users have far less choice than they think, and by hiding the owners of an app the chances of being exposed to surveillance increase dramatically.<\/p>\n<p>&#8220;If they are in Russia, China, and other authoritarian\/repressive governments, they are forced to provide their data to the governments on a default basis,&#8221; the report notes.<\/p>\n<p>&#8220;The parent company may also be willing to sell user data.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>Norsk Hydro bouncing back from ransomware attack<\/span><\/h3>\n<p>When last we left Norsk Hydro, the industrial and electric giant had disconnected much of its network in order to contain a ransomware attack.<\/p>\n<p>A few days later, and things are looking up for the company. A <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.hydro.com\/nl-NL\/media\/news\/2019\/update-on-cyber-attacks-march-21\/\">news update<\/a> reports that most of Norsk&#8217;s business units have resumed normal activity, and staff have entered the forensics portion of the event, with Microsoft coming in to help investigators.<\/p>\n<p>&#8220;There have been no reported safety incidents as a result of the cyber attack, and most operations are running, ensuring deliveries to customers according to specification, with some more manual operations than normal,&#8221; Norsk said.<\/p>\n<p>&#8220;The attack has been reported to Norway\u2019s National Investigation Service (Kripos) and the police have opened an investigation. Although progressing from day to day, it is still not clear how long it might take to restore stable IT operations.&#8221;<\/p>\n<p>Meanwhile, chemicals manufacturers <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.businesswire.com\/news\/home\/20190322005490\/en\/Hexion-Addresses-Network-Security-Incident\">Hexion<\/a> and <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/motherboard.vice.com\/en_us\/article\/8xyj7g\/ransomware-forces-two-chemical-companies-to-order-hundreds-of-new-computers\">Momentive<\/a> both also appear to have been ransacked this month by the same, or similar, file-scrambling nasty as the one that hit Norsk Hydro. It is speculated this ransomware is LockerGaga.<\/p>\n<h3 class=\"crosshead\"><span>Pwn2Own wraps up<\/span><\/h3>\n<p>The CanSecWest conference is winding down, and we now have a list of the winners from this year&#8217;s Pwn2Own contest.<\/p>\n<p>The event pits researchers against a series of fully patched PCs, browsers, mobile devices, and even cars, with the goal being to compromise and hijack the gear via previously unknown vulnerabilities. The first person(s) to show a working full zero-day exploit for the target devices, and thus achieve typically remote code execution, get to take home big cash prizes.<\/p>\n<p>Below are some of this year&#8217;s big winners, as well as their payouts, after successfully hacking the following products:<\/p>\n<ul>\n<li><strong>Apple Safari:<\/strong> Amat Cama and Richard Zhu. $55,000.<\/li>\n<li><strong>Oracle VirtualBox:<\/strong> Amat Cama and Richard Zhu. $35,000.<\/li>\n<li><strong>Oracle VirtualBox:<\/strong> Ph\u1ea1m H\u1ed3ng Phi. $35,000.<\/li>\n<li><strong>Oracle VirtualBox:<\/strong> Amat Cama and Richard Zhu. $35,000.<\/li>\n<li><strong>VMWare Workstation:<\/strong> Amat Cama and Richard Zhu. $70,000.<\/li>\n<li><strong>Apple Safari:<\/strong> Niklas Baumstark, qwertyoruiop, Bruno Keith. $45,000.<\/li>\n<li><strong>Mozilla Firefox:<\/strong> Amat Cama and Richard Zhu. $50,000.<\/li>\n<li><strong>Microsoft Edge on VMWare Workstation:<\/strong> Amat Cama and Richard Zhu. $130,000.<\/li>\n<li><strong>Mozilla Firefox:<\/strong> Niklas Baumstark. $40,000.<\/li>\n<li><strong>Microsoft Edge:<\/strong> Arthur Gerkis. $50,000.<\/li>\n<li><strong>Tesla Model 3:<\/strong> Amat Cama and Richard Zhu. $35,000.<\/li>\n<\/ul>\n<p>Congrats to all the winners. The vendors involved have been privately informed of the flaws so they can be patched before anyone else finds them. Standby for patches to arrive when developed. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7090\/see-more-attacks-stop-more-attacks?td=wptl1810\">See More Attacks, Stop More Attacks<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/03\/24\/security_roundup_220319\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Plus, two crooks craft a veritable fraudocopia Roundup\u00a0 This week we got freaked out about heart implant hacks, welcomed a new Microsoft security tool, and endured yet another Facebook fsck up.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26335,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-26334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Slack slings crypto-keys at big biz, union gets worked over, VPN owners probed, trolls trouble vets, and more 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Slack slings crypto-keys at big biz, union gets worked over, VPN owners probed, trolls trouble vets, and more 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-24T10:34:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"429\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Slack slings crypto-keys at big biz, union gets worked over, VPN owners probed, trolls trouble vets, and more\",\"datePublished\":\"2019-03-24T10:34:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\\\/\"},\"wordCount\":1520,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\\\/\",\"name\":\"Slack slings crypto-keys at big biz, union gets worked over, VPN owners probed, trolls trouble vets, and more 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more.jpg\",\"datePublished\":\"2019-03-24T10:34:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more.jpg\",\"width\":648,\"height\":429},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Slack slings crypto-keys at big biz, union gets worked over, VPN owners probed, trolls trouble vets, and more\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Slack slings crypto-keys at big biz, union gets worked over, VPN owners probed, trolls trouble vets, and more 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/","og_locale":"en_US","og_type":"article","og_title":"Slack slings crypto-keys at big biz, union gets worked over, VPN owners probed, trolls trouble vets, and more 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-24T10:34:06+00:00","og_image":[{"width":648,"height":429,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Slack slings crypto-keys at big biz, union gets worked over, VPN owners probed, trolls trouble vets, and more","datePublished":"2019-03-24T10:34:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/"},"wordCount":1520,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/","url":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/","name":"Slack slings crypto-keys at big biz, union gets worked over, VPN owners probed, trolls trouble vets, and more 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more.jpg","datePublished":"2019-03-24T10:34:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more.jpg","width":648,"height":429},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/slack-slings-crypto-keys-at-big-biz-union-gets-worked-over-vpn-owners-probed-trolls-trouble-vets-and-more\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Slack slings crypto-keys at big biz, union gets worked over, VPN owners probed, trolls trouble vets, and more"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26334"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26334\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26335"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}