{"id":27256,"date":"2019-06-14T16:08:17","date_gmt":"2019-06-14T16:08:17","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30239\/Spirit-Confirms-ASCO-Industries-Cyberattack.html"},"modified":"2019-06-14T16:08:17","modified_gmt":"2019-06-14T16:08:17","slug":"spirit-confirms-asco-industries-cyberattack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/","title":{"rendered":"Spirit Confirms ASCO Industries Cyberattack"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/4\/2018\/08\/ransomware2_1308382.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div class=\"wysiwyg\">\n<p>Reports that Belgian aerospace manufacturer ASCO Industries has shuttered several factories due to a ransomware attack on June 7 is certainly news, but what is causing even more raised eyebrows is the company\u2019s almost complete silence on the issue.<\/p>\n<p>ASCO, which is in the process of being acquired by Wichita, Kan.-based <a href=\"https:\/\/www.prnewswire.com\/news-releases\/spirit-aerosystems-receives-eu-clearance-for-asco-acquisition-300815915.html\">Spirit AeroSystems<\/a>, reportedly confirmed to the Belgian news site <a href=\"https:\/\/datanews.knack.be\/ict\/nieuws\/vliegtuigonderdelenproducent-asco-gehackt\/article-news-1475555.html?cookie_check=1560422631\">Data News<\/a> that it had suffered a ransomware attack and has brought in outside help, but declined to offer any additional details. <a href=\"https:\/\/www.brusselstimes.com\/all-news\/business\/technology\/58373\/cyber-attack-causes-aircraft-parts-maker-to-close-indefinitely-asco\/\">Reports<\/a> also indicated ASCO has shut down some of its Belgian factories, putting more than 1,000 workers on the sidelines, but the company has not made an official statement.<\/p>\n<p>However, proposed buyer Spirit has told SC Media that it was informed by ASCO of the attack on June 11, but could offer no additional details on the incident.<\/p>\n<p>\u201cOn July 11, Asco Industries confirmed a malicious intrusion on their servers and communicated that information to public authorities, customers and other stakeholders,\u201d said Fred Malley, Spirit\u2019s director of communications.<\/p>\n<p>Spirit and ASCO received conditional European Commission clearance for their merger in March and at this time there is no indication the breach will disrupt the expected closing tentatively scheduled for mid year, but Malley said Spirit is watching for developments.<\/p>\n<p>\u201cSpirit remains vigilant in its close watch on threats to Spirit\u2019s systems and data. There is no indication at this time that Spirit has been impacted by any malware or other data threats. Spirit is closely monitoring Asco\u2019s progress mitigating Asco\u2019s network intrusion as well as any implications on the closing of the acquisition,\u201d he said.<\/p>\n<p>The cone of silence put in place by ASCO is in direct contrast to the recent high-profile ransomware attack on <a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/damages-from-ransomware-attack-on-norsk-hydro-reach-as-high-as-40m\/\">Norsk Hydro<\/a>. The Norwegian aluminum producer was hit in March with LockerGoga ransomware, costing the company an estimated $40 million in recovery costs. However, that company has been applauded by how upfront it was about the attack.<\/p>\n<p>\u201cThis comes only a few months after Norsk Hydro was also shut down by ransomware; however, Norsk showed the world that while ransomware is costly and devastating in the moment, it doesn\u2019t have to have a lasting effect on reputation, as the open and transparent way Norsk dealt with the attack resulted in a rise in share price,\u201d said Shlomie Liberow, technical program manager at HackerOne. \u201cPublic understanding of ransomware is on the rise, so if ASCO reacts quickly and in a way that keeps relevant stakeholders informed, hopefully it will see no lasting damage to reputation.\u201d<\/p>\n<p>Stuart Reed, VP at Nominet, said some level of silence is understandable during the early stages of the investigation, but noted that communication is key as the recovery process proceeds.<\/p>\n<p>\u201cCommunication\u2026 is a critical part of any incident response plan. As such, organizations should ensure that after the initial assessment is complete, active engagement with stakeholders and, crucially, any victims of the attack takes place promptly to minimize the impact of a breach. Timely and informative communications can go a long way in repairing trust with customers and preserving brand equity,\u201d he said.<\/p>\n<p>Spirit\u2019s stock has declined since June 10, the first business day since the ransomware attack took place; however, this also could be explained by the company being hard hit in other areas, as it is a supplier to Boeing for its currently grounded 737 MAX airliner.<\/p>\n<p>On the other hand, the move to shut down unaffected factories or segments of the network was a step in the right direction.<\/p>\n<p>\u201cThe best way to prevent attacks is by implementing security 101 measures. This means patching programs and enabling automatic updates, limiting permissions on systems and having procedures to deal with disaster recovery,\u201d Leigh-Anne Galloway, cybersecurity resilience lead at Positive Technologies, told SC Media.<\/p>\n<p>Trying to isolate the problem does make sense, added Reed, but he pointed out that this decision can add to a victim\u2019s problems.<\/p>\n<p>\u201cShutting down systems and facilities may help halt the spread of the attack reaching any further. As such, it\u2019s prudent to take this action as far as [it\u2019s] practical, though obviously this post-breach activity is not a long-term solution and carries its own consequences that compound the losses after an attack,\u201d he said.<\/p>\n<p>This means companies, governments and other organizations need to take a much more proactive stance when it comes to their cybersecurity, Galloway and Reed said.<\/p>\n<p>Targets generally are infected due to a human error \u2013 someone clicking on a malicious email link, poor patch management or not using all the technology that is available to protect oneself.<\/p>\n<p>One area to look at, Reed said, is the DNS traffic being generated by an organization. Malware has to communicate with its command-and-control server and the DNS layer is often used due to its ubiquitous nature, but this can mean wading through billions of queries, so an infosec team has to lean on technology to get the job done.<\/p>\n<p>\u201cWhile this equates to potentially billions of queries, the application of threat intelligence and machine learning techniques can analyze this activity at scale to deliver a rich source of information including early indicators of compromise. As such, proactive DNS cyber analytics should be wrapped into the overall security stack to intercept and neutralize attacks such as ransomware before they\u2019re mobilized to cause harm,\u201d he said.<\/p>\n<p>On the other side of the equation are the basics that, if forgotten or not taken seriously, can lead to a massive amount of damage, Galloway said.<\/p>\n<p>\u201cMost ransomware attacks are reliant on exploiting existing vulnerabilities in computer systems. The WannaCry ransomware attack, for example, was caused by a very simple and common bad habit: using outdated and unpatched versions of software. This is\u2026 [still one] of the most common security weaknesses among organizations and enterprises,\u201d she said.<\/p>\n<p>So Galloway suggests the best way to protect against ransomware or most cyberattacks is by implementing basic security measures in conjunction with some higher level moves.<\/p>\n<p>\u201cThis means patching programs and enabling automatic updates, limiting permissions on systems and having procedures to deal with disaster recovery. Organizations should implement: centralized update management; antivirus protection on all systems and endpoints, preferably with support for on-demand scanning by users of suspicious attachments prior to opening them; SIEM capabilities, for timely attack detection; and automated software audit tools to identify vulnerabilities,\u201d she said.<\/p>\n<p>SC Media has reached out to ASCO but has not received a response.<\/p>\n<\/div>\n<section class=\"post-tags\">\n<h2>Topics:<\/h2>\n<p><a href=\"https:\/\/www.scmagazine.com\/tag\/cryptocurrency\/\" class=\"button -secondary\">Cryptocurrency<\/a><\/section>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30239\/Spirit-Confirms-ASCO-Industries-Cyberattack.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27257,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[2317],"class_list":["post-27256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemalwarefraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spirit Confirms ASCO Industries Cyberattack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spirit Confirms ASCO Industries Cyberattack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-14T16:08:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/spirit-confirms-asco-industries-cyberattack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"379\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spirit-confirms-asco-industries-cyberattack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spirit-confirms-asco-industries-cyberattack\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Spirit Confirms ASCO Industries Cyberattack\",\"datePublished\":\"2019-06-14T16:08:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spirit-confirms-asco-industries-cyberattack\\\/\"},\"wordCount\":1077,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spirit-confirms-asco-industries-cyberattack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/spirit-confirms-asco-industries-cyberattack.jpg\",\"keywords\":[\"headline,malware,fraud\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spirit-confirms-asco-industries-cyberattack\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spirit-confirms-asco-industries-cyberattack\\\/\",\"name\":\"Spirit Confirms ASCO Industries Cyberattack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spirit-confirms-asco-industries-cyberattack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spirit-confirms-asco-industries-cyberattack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/spirit-confirms-asco-industries-cyberattack.jpg\",\"datePublished\":\"2019-06-14T16:08:17+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spirit-confirms-asco-industries-cyberattack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spirit-confirms-asco-industries-cyberattack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spirit-confirms-asco-industries-cyberattack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/spirit-confirms-asco-industries-cyberattack.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/spirit-confirms-asco-industries-cyberattack.jpg\",\"width\":700,\"height\":379},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/spirit-confirms-asco-industries-cyberattack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware,fraud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemalwarefraud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Spirit Confirms ASCO Industries Cyberattack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spirit Confirms ASCO Industries Cyberattack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/","og_locale":"en_US","og_type":"article","og_title":"Spirit Confirms ASCO Industries Cyberattack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-06-14T16:08:17+00:00","og_image":[{"width":700,"height":379,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/spirit-confirms-asco-industries-cyberattack.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Spirit Confirms ASCO Industries Cyberattack","datePublished":"2019-06-14T16:08:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/"},"wordCount":1077,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/spirit-confirms-asco-industries-cyberattack.jpg","keywords":["headline,malware,fraud"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/","url":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/","name":"Spirit Confirms ASCO Industries Cyberattack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/spirit-confirms-asco-industries-cyberattack.jpg","datePublished":"2019-06-14T16:08:17+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/spirit-confirms-asco-industries-cyberattack.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/spirit-confirms-asco-industries-cyberattack.jpg","width":700,"height":379},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/spirit-confirms-asco-industries-cyberattack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware,fraud","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwarefraud\/"},{"@type":"ListItem","position":3,"name":"Spirit Confirms ASCO Industries Cyberattack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27256"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27256\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27257"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}