{"id":27757,"date":"2019-07-11T04:48:12","date_gmt":"2019-07-11T04:48:12","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/"},"modified":"2019-07-11T04:48:12","modified_gmt":"2019-07-11T04:48:12","slug":"sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/","title":{"rendered":"Sea Turtle hackers head to the Mediterranean, snag Greece&#8217;s TLD registrar as a souvenir"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/07\/10\/shutterstock_athens.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Miscreants notorious for hijacking traffic to victims&#8217; servers by changing their DNS records have been accused of hacking a top domain-name registrar in Greece.<\/p>\n<p>The team at <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.talosintelligence.com\/2019\/07\/sea-turtle-keeps-on-swimming.html\">Cisco Talos<\/a> believes the Sea Turtle group was responsible for an <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/techblog.gr\/internet\/kyvernoepithesi-ypesti-to-mitroo-onomaton-internet-katalixi-gr-el\/\">April cyber-break-in<\/a> at ICS-Forth, the company that manages the .gr top-level domain for Greece. The hackers maintained access for a period of at least five days.<\/p>\n<p>&#8220;Cisco telemetry confirmed that the actors behind Sea Turtle maintained access to the ICS-Forth network from an operational command and control (C2) node,&#8221; Talos researcher Paul Rascagneres explained earlier this week.<\/p>\n<p>&#8220;Our telemetry indicates that the actors maintained access in the ICS-Forth network through at least April 24, five days after the statement [that ICS-Forth had been hacked] was publicly released.<\/p>\n<p>&#8220;Upon analysis of this operational C2 node, we determined that it was also used to access an organization in Syria that was previously redirected using the actor-controlled name server ns1[.]intersecdns[.]com. This indicates that the same threat actors were behind both operations.&#8221;<\/p>\n<p>Getting into a domain registrar would be a big win for Sea Turtle, as the group&#8217;s favored hacking technique involves hijacking the DNS entries for their targets&#8217; domain names and subdomains to redirect people&#8217;s connections to hacker-controlled servers. Users think they are connecting to the under-attack organization&#8217;s servers as normal, but are instead connecting to Sea Turtle&#8217;s systems, that masquerade as legit sites, and handing over their login credentials to scumbags.<\/p>\n<p>Indeed, the Talos team reports that shortly after the ICS-Forth intrusion took place, two Greek government organizations fell victim to DNS hijackings.<\/p>\n<p>The attacks would have occurred at roughly the same time Cisco Talos was <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/04\/17\/sea_turtle_dns\/\" rel=\"noopener noreferrer\">introducing the world<\/a> to Sea Turtle and its methods for hacking government and corporate networks without ever having to target their servers or network appliances. While the group was initially focused on the North Africa and Middle East regions, since April the operation has expanded not only to Greece, but also to targets in Switzerland, Sweden, and the US.<\/p>\n<p>The groups in Sea Turtle&#8217;s crosshairs had mostly been government organizations, political think tanks, and international NGOs, though the Talos team notes that some energy companies and at least one airport were also targeted.<\/p>\n<p>Talos recommends that companies worried about attacks add multi-factor authentication to their registrar accounts, to prevent crooks socially engineering their way into domain settings, and implement <a target=\"_blank\" href=\"https:\/\/search.theregister.co.uk\/?q=DNSSEC\" rel=\"noopener noreferrer\">DNSSEC<\/a>. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1842\/-7432\/balancing-consumerization-and-corporate-control?td=wptl1842\">Balancing consumerization and corporate control<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/07\/11\/sea_turtle_greece_tld\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chance to hack Hellenic targets better than a bottle of Metaxa Miscreants notorious for hijacking traffic to victims&#8217; servers by changing their DNS records have been accused of hacking a top domain-name registrar in Greece.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27758,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-27757","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sea Turtle hackers head to the Mediterranean, snag Greece&#039;s TLD registrar as a souvenir 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sea Turtle hackers head to the Mediterranean, snag Greece&#039;s TLD registrar as a souvenir 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-11T04:48:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"632\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Sea Turtle hackers head to the Mediterranean, snag Greece&#8217;s TLD registrar as a souvenir\",\"datePublished\":\"2019-07-11T04:48:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\\\/\"},\"wordCount\":422,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\\\/\",\"name\":\"Sea Turtle hackers head to the Mediterranean, snag Greece's TLD registrar as a souvenir 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir.jpg\",\"datePublished\":\"2019-07-11T04:48:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir.jpg\",\"width\":1000,\"height\":632},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sea Turtle hackers head to the Mediterranean, snag Greece&#8217;s TLD registrar as a souvenir\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sea Turtle hackers head to the Mediterranean, snag Greece's TLD registrar as a souvenir 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/","og_locale":"en_US","og_type":"article","og_title":"Sea Turtle hackers head to the Mediterranean, snag Greece's TLD registrar as a souvenir 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-07-11T04:48:12+00:00","og_image":[{"width":1000,"height":632,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Sea Turtle hackers head to the Mediterranean, snag Greece&#8217;s TLD registrar as a souvenir","datePublished":"2019-07-11T04:48:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/"},"wordCount":422,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/","url":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/","name":"Sea Turtle hackers head to the Mediterranean, snag Greece's TLD registrar as a souvenir 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir.jpg","datePublished":"2019-07-11T04:48:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/07\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir.jpg","width":1000,"height":632},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/sea-turtle-hackers-head-to-the-mediterranean-snag-greeces-tld-registrar-as-a-souvenir\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Sea Turtle hackers head to the Mediterranean, snag Greece&#8217;s TLD registrar as a souvenir"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27757"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27757\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27758"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}