{"id":32199,"date":"2019-12-06T16:13:33","date_gmt":"2019-12-06T16:13:33","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30742\/New-Vuln-Lets-Attackers-Sniff-Or-Hijack-VPN-Connections.html"},"modified":"2019-12-06T16:13:33","modified_gmt":"2019-12-06T16:13:33","slug":"new-vuln-lets-attackers-sniff-or-hijack-vpn-connections","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/","title":{"rendered":"New Vuln Lets Attackers Sniff Or Hijack VPN Connections"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2019\/12\/05\/f4e7f0f6-a3c6-482c-9c6a-616838b893d0\/efc40f06a0a5c3af5c65b269f51c2734\/binary-code-3814663-1920.jpg\" class alt=\"Binary Code\"><\/span><span class=\"credit\">Image: kalhh<\/span> <\/p>\n<p>Academics have disclosed this week a security flaw impacting Linux, Android, macOS, and other Unix-based operating systems that allows an attacker to sniff, hijack, and tamper with VPN-tunneled connections.<\/p>\n<p>The vulnerability &#8212; tracked as CVE-2019-14899 &#8212; resides in the networking stacks of multiple Unix-based operating systems, and more specifically, in how the operating systems reply to unexpected network packet probes.<\/p>\n<p>According to the research team, attackers can use this vulnerability to probe devices and discover various details about the user&#8217;s VPN connection status.<\/p>\n<p>Attacks can be carried out from a malicious access point or router, or by an attacker present on the same network &#8220;to determine if another user is connected to a VPN, the virtual IP address they have been assigned by the VPN server, and whether or not there is an active connection to a given website.&#8221;<\/p>\n<p>Furthermore, the research team also claims they were also able to determine the exact packet sequence in certain VPN connections.<\/p>\n<p>&#8220;This allows us to inject data into the TCP stream and hijack connections,&#8221; said William J. Tolley, one of the three members of the Breakpointing Bad research team at the University of New Mexico.<\/p>\n<h3>Multiple operating systems impacted<\/h3>\n<p>The team said they tested and successfully exploited the vulnerability on the following operating systems:<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p><em>Ubuntu 19.10 (systemd)<\/em><br \/><em>Fedora (systemd)<\/em><br \/><em>Debian 10.2 (systemd)<\/em><br \/><em>Arch 2019.05 (systemd)<\/em><br \/><em>Manjaro 18.1.1 (systemd)<\/em><br \/><em>Devuan (sysV init)<\/em><br \/><em>MX Linux 19 (Mepis+antiX)<\/em><br \/><em>Void Linux (runit)<\/em><br \/><em>Slackware 14.2 (rc.d)<\/em><br \/><em>Deepin (rc.d)<\/em><br \/><em>FreeBSD (rc.d)<\/em><br \/><em>OpenBSD (rc.d)<\/em><\/p>\n<p>Other Unix-based operating systems like Android and macOS are also impacted.<\/p>\n<p>The research team said their attack worked against VPN technologies like OpenVPN, WireGuard, and IKEv2\/IPSec, and possibly others, as &#8220;the VPN technology used does not seem to matter.&#8221;<\/p>\n<h3>A &#8220;very impressive&#8221; attack<\/h3>\n<p>In response to the public disclosure, Jason A. Donenfeld, the creator of the WireGuard open-source VPN, said the &#8220;this isn&#8217;t a WireGuard vulnerability, but rather something in the routing table code and\/or TCP code on affected operating systems.&#8221;<\/p>\n<p>&#8220;It appears to affect basically most common Unix network stacks,&#8221; <a href=\"https:\/\/lists.zx2c4.com\/pipermail\/wireguard\/2019-December\/004679.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Donenfeld added<\/a>.<\/p>\n<p>Donenfeld described CVE-2019-12899 as a &#8220;nice vuln[erability]&#8221; while Colm MacC\u00e1rthaigh, an Amazon Web Services engineer and member of the Apache HTTPd development team, described the attack as &#8220;<a href=\"https:\/\/news.ycombinator.com\/item?id=21712863\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">very impressive<\/a>.&#8221;<\/p>\n<p>According to the research team, the attack relies on sending unsolicited network packets to a victim&#8217;s device (Linux router, Android phone, macOS desktop, etc.) and observing how the targeted device replies.<\/p>\n<p>The cleverness of the attack resides in how the research team crafted these packets, and the way in which they used the replies to infer what the user was doing inside their VPN tunnel.<\/p>\n<p>The research team&#8217;s <a href=\"https:\/\/seclists.org\/oss-sec\/2019\/q4\/122\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">public disclosure<\/a> contains more technical details, along with possible mitigations that server owners can apply. The attack is not trivial to execute so this would exclude scenarios of mass-exploitation until patches will be available. However, the vulnerability is ideal for targeted attacks, if the attacker has the expertise to carry it out.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30742\/New-Vuln-Lets-Attackers-Sniff-Or-Hijack-VPN-Connections.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32200,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5785],"class_list":["post-32199","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacyflawcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Vuln Lets Attackers Sniff Or Hijack VPN Connections 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Vuln Lets Attackers Sniff Or Hijack VPN Connections 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-06T16:13:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"465\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New Vuln Lets Attackers Sniff Or Hijack VPN Connections\",\"datePublished\":\"2019-12-06T16:13:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\\\/\"},\"wordCount\":510,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections.jpg\",\"keywords\":[\"headline,privacy,flaw,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\\\/\",\"name\":\"New Vuln Lets Attackers Sniff Or Hijack VPN Connections 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections.jpg\",\"datePublished\":\"2019-12-06T16:13:33+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections.jpg\",\"width\":1000,\"height\":465},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,flaw,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyflawcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New Vuln Lets Attackers Sniff Or Hijack VPN Connections\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Vuln Lets Attackers Sniff Or Hijack VPN Connections 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/","og_locale":"en_US","og_type":"article","og_title":"New Vuln Lets Attackers Sniff Or Hijack VPN Connections 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-12-06T16:13:33+00:00","og_image":[{"width":1000,"height":465,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New Vuln Lets Attackers Sniff Or Hijack VPN Connections","datePublished":"2019-12-06T16:13:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/"},"wordCount":510,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections.jpg","keywords":["headline,privacy,flaw,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/","url":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/","name":"New Vuln Lets Attackers Sniff Or Hijack VPN Connections 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections.jpg","datePublished":"2019-12-06T16:13:33+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections.jpg","width":1000,"height":465},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-vuln-lets-attackers-sniff-or-hijack-vpn-connections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,flaw,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyflawcryptography\/"},{"@type":"ListItem","position":3,"name":"New Vuln Lets Attackers Sniff Or Hijack VPN Connections"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32199"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32199\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32200"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}