{"id":28735,"date":"2019-08-28T11:13:09","date_gmt":"2019-08-28T11:13:09","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/"},"modified":"2019-08-28T11:13:09","modified_gmt":"2019-08-28T11:13:09","slug":"time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/","title":{"rendered":"Time to spin the wheel of pwnage! This week, malware can infect your\u2026. Android set-top box!"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/03\/21\/shutterstock_fortune_wheel.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Set-top tuner boxes have become the infection vector in the spread of Internet of Things malware.<\/p>\n<p>This came out of a report from mobile security house WootCloud, which said its team has caught a botnet called Ares, targeting Android entertainment boxes from Huawei, Cubetek, and Qezy Media.<\/p>\n<p>The WootCloud malware detectives said the Ares infection preys on the poorly secured configurations many set-top boxes use with the ADB debugging interface in Android. In many of the boxes, TCP port 5555 has been opened for both ADB and remote management commands, making it an easy target to any attacker able to scan the open internet.<\/p>\n<p>When a vulnerable device is detected, the malware then attempts to install itself via the remote commands over port 5555. From there, the bots connect to a command-and-control server, then scan for other vulnerable Android devices within reach, thus spreading the infection. From there, the infected machines are sent crypto-mining tools and other unspecified malware payloads.<\/p>\n<p>The Ares outbreak marks the intersection of two rapidly growing malware arenas: Android mobile devices and embedded IoT gear. The attacks on IoT devices in particular have proven startlingly effective in recent years with the rise of massive botnets like <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/11\/07\/mirai_botnet_sitrep\/\" rel=\"noopener noreferrer\">Mirai<\/a> that make quick work of poorly-guarded appliances and network gear.<\/p>\n<p>WootCloud said it saw the biggest risk from Ares in the potential for the malware to use the pwned set-top boxes as the jumping-off point for attacks on other Android devices, particularly smart TVs, which in many cases use the same vulnerable ADB policies to manage their connections.<\/p>\n<p>&#8220;The biggest threat associated with these Android set-top boxes, apart from the Ares vulnerability that we discovered, is the presence of an open and unauthenticated ADB service running on internet-connected devices,&#8221; said WootCloud founder and CTO Srinivas Akella.<\/p>\n<p>&#8220;Unless we stay vigilant, the probability is huge that any enterprise or consumer could find themselves a victim to hacking attacks through these set-top boxes and, down the line, even by way of the smart TVs and other consumer IoT devices.&#8221;<\/p>\n<p>Those with the technical prowess can protect against attacks by locking down ADB access to only authorized IP addresses and keeping an eye on outgoing network traffic from the set-top boxes. Users are also advised to set passwords on their devices for interfaces like Telnet, SNMP, and web. \u00ae<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/08\/28\/android_set_boxes_ares_malware\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IoT botnets move into the home theater market in search of low-hanging fruit Set-top tuner boxes have become the infection vector in the spread of Internet of Things malware.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28736,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-28735","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Time to spin the wheel of pwnage! This week, malware can infect your\u2026. Android set-top box! 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Time to spin the wheel of pwnage! This week, malware can infect your\u2026. Android set-top box! 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-28T11:13:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"632\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Time to spin the wheel of pwnage! This week, malware can infect your\u2026. Android set-top box!\",\"datePublished\":\"2019-08-28T11:13:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\\\/\"},\"wordCount\":403,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\\\/\",\"name\":\"Time to spin the wheel of pwnage! This week, malware can infect your\u2026. Android set-top box! 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box.jpg\",\"datePublished\":\"2019-08-28T11:13:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box.jpg\",\"width\":1000,\"height\":632},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Time to spin the wheel of pwnage! This week, malware can infect your\u2026. Android set-top box!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Time to spin the wheel of pwnage! This week, malware can infect your\u2026. Android set-top box! 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/","og_locale":"en_US","og_type":"article","og_title":"Time to spin the wheel of pwnage! This week, malware can infect your\u2026. Android set-top box! 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-28T11:13:09+00:00","og_image":[{"width":1000,"height":632,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Time to spin the wheel of pwnage! This week, malware can infect your\u2026. Android set-top box!","datePublished":"2019-08-28T11:13:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/"},"wordCount":403,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/","url":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/","name":"Time to spin the wheel of pwnage! This week, malware can infect your\u2026. Android set-top box! 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box.jpg","datePublished":"2019-08-28T11:13:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box.jpg","width":1000,"height":632},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/time-to-spin-the-wheel-of-pwnage-this-week-malware-can-infect-your-android-set-top-box\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Time to spin the wheel of pwnage! This week, malware can infect your\u2026. Android set-top box!"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28735"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28735\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28736"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}