{"id":32851,"date":"2020-01-17T16:27:18","date_gmt":"2020-01-17T16:27:18","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30850\/JhoneRAT-Exploits-Cloud-To-Attack-Middle-Eastern-Countries.html"},"modified":"2020-01-17T16:27:18","modified_gmt":"2020-01-17T16:27:18","slug":"jhonerat-exploits-cloud-to-attack-middle-eastern-countries","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/","title":{"rendered":"JhoneRAT Exploits Cloud To Attack Middle Eastern Countries"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2020\/01\/17\/fd5034f5-8882-4bce-891b-af5e7666a8f4\/thumbnail\/770x578\/da7ca6116951e5594b3e3fd9e992f1e9\/screenshot-2020-01-17-at-10-55-17.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>A new Trojan on the scene is selectively attacking targets in the Middle East by checking keyboard layouts and attempts to avoid blacklisting by abusing cloud services.&nbsp;<\/p>\n<p>On Thursday, cybersecurity researchers from Cisco Talos said that the Remote Access Trojan (RAT), <a href=\"https:\/\/blog.talosintelligence.com\/2020\/01\/jhonerat.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">dubbed JhoneRAT<\/a>, is actively spreading through Microsoft Office documents containing malicious macros.&nbsp;<\/p>\n<p>The first of the documents identified through phishing campaigns, named &#8220;Urgent.docx,&#8221; asks the recipient to enable editing in English and Arabic. The second, &#8220;fb.docx,&#8221; claims to contain data on a Facebook information leak, and the third pretends to be from a legitimate United Arab Emirate organization.&nbsp;<\/p>\n<p><strong>See also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/lazarus-pivots-to-linux-attacks-through-dacls-trojan\/\" target=\"_blank\" rel=\"noopener noreferrer\">Lazarus pivots to Linux attacks through Dacls Trojan<\/a><\/p>\n<p>In each case, if editing is enabled, an additional Office document is loaded and executed which contains a malicious macro.&nbsp;<\/p>\n<p>These documents are hosted through Google Drive &#8220;to avoid URL blacklisting,&#8221; the team says.&nbsp;<\/p>\n<p>JhoneRAT is written in Python and is dropped through Google Drive, which hosts images with a base64-encoded binary appended at the end. These images, once loaded onto a machine susceptible to infection, will deploy the Trojan, which immediately begins harvesting information from the victim&#8217;s machine including type, disk serial numbers, the operating system in use, and more.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>When communicating with its command-and-control server (C2) in order to exfiltrate information, commands are checked via a public Twitter feed every 10 seconds. The handle @jhone87438316 was originally used but this account has now been suspended.&nbsp;<\/p>\n<p>&#8220;These commands can be issued to a specific victim based on the UID generated on each target (by using the disk serial and contextual information such as the hostname, the antivirus and the OS) or to all of them,&#8221; the researchers say.&nbsp;<\/p>\n<p><strong>CNET:&nbsp;<\/strong><a href=\"https:\/\/www.cnet.com\/news\/fbi-will-start-notifying-states-when-hackers-hit-local-elections\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">FBI will start notifying states when hackers hit local elections<\/a><\/p>\n<p>The actual theft of data, however, is made through cloud providers ImgBB and both Google Drive and Forms. Screenshots are uploaded to ImgBB, binaries are downloaded from Drive, and commands are executed with output sent to Forms.&nbsp;<\/p>\n<p>An interesting facet of the malware is how targets are selected. Filtering has been implemented based on a victim&#8217;s keyboard layout, and the malware will only execute against those in Arabic-speaking countries.&nbsp;<\/p>\n<p>Cisco Talos says that JhoneRAT targets Saudi Arabia, Iraq, Egypt, Libya, Algeria, Morocco, Tunisia, Oman, Yemen, Syria, UAE, Kuwait, Bahrain, and Lebanon.&nbsp;<\/p>\n<p>&#8220;This campaign started in November 2019 and it is still ongoing,&#8221; the researchers say. &#8220;At this time, the API key is revoked and the Twitter account is suspended. However, the attacker can easily create new accounts and update the malicious files in order to still work.&#8221;<\/p>\n<p><strong>TechRepublic:&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/these-subject-lines-are-the-most-clicked-for-phishing\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">These subject lines are the most clicked for phishing<\/a><\/p>\n<p>Anther unusual Trojan under review by threat researchers at present is Faketoken. Faketoken began its journey as a form of bolt-on malware used by traditional desktop Trojans to intercept verification codes sent to mobile devices when victims attempted to login to online accounts and has since evolved into a standalone financial threat.&nbsp;<\/p>\n<p>Recently, a Faketoken campaign demonstrated odd behavior &#8212; the hijack of mobile device messaging facilities to send <a href=\"https:\/\/www.zdnet.com\/article\/this-trojan-hijacks-your-smartphone-to-send-offensive-text-messages\/\" target=\"_blank\" rel=\"noopener noreferrer\">offensive text messages<\/a>.&nbsp;<\/p>\n<p>Cybersecurity researchers are at a loss as to why, with the exception being many recipients are abroad &#8212; and therefore the SMS messages could be generating revenue through expensive messages being sent to these numbers.<\/p>\n<h3>Previous and related coverage<\/h3>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30850\/JhoneRAT-Exploits-Cloud-To-Attack-Middle-Eastern-Countries.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32852,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8390],"class_list":["post-32851","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemalwaretrojancyberwar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>JhoneRAT Exploits Cloud To Attack Middle Eastern Countries 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"JhoneRAT Exploits Cloud To Attack Middle Eastern Countries 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-17T16:27:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"JhoneRAT Exploits Cloud To Attack Middle Eastern Countries\",\"datePublished\":\"2020-01-17T16:27:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\\\/\"},\"wordCount\":577,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries.png\",\"keywords\":[\"headline,malware,trojan,cyberwar\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\\\/\",\"name\":\"JhoneRAT Exploits Cloud To Attack Middle Eastern Countries 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries.png\",\"datePublished\":\"2020-01-17T16:27:18+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware,trojan,cyberwar\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemalwaretrojancyberwar\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"JhoneRAT Exploits Cloud To Attack Middle Eastern Countries\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"JhoneRAT Exploits Cloud To Attack Middle Eastern Countries 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/","og_locale":"en_US","og_type":"article","og_title":"JhoneRAT Exploits Cloud To Attack Middle Eastern Countries 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-17T16:27:18+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"JhoneRAT Exploits Cloud To Attack Middle Eastern Countries","datePublished":"2020-01-17T16:27:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/"},"wordCount":577,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries.png","keywords":["headline,malware,trojan,cyberwar"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/","url":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/","name":"JhoneRAT Exploits Cloud To Attack Middle Eastern Countries 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries.png","datePublished":"2020-01-17T16:27:18+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/jhonerat-exploits-cloud-to-attack-middle-eastern-countries\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware,trojan,cyberwar","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwaretrojancyberwar\/"},{"@type":"ListItem","position":3,"name":"JhoneRAT Exploits Cloud To Attack Middle Eastern Countries"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32851"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32851\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32852"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}