{"id":34280,"date":"2020-04-07T16:36:20","date_gmt":"2020-04-07T16:36:20","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31102\/Global-COVID-19-Apps-Suffering-From-Flaws-Malicious-Copycats.html"},"modified":"2020-04-07T16:36:20","modified_gmt":"2020-04-07T16:36:20","slug":"global-covid-19-apps-suffering-from-flaws-malicious-copycats","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/","title":{"rendered":"Global COVID-19 Apps Suffering From Flaws, Malicious Copycats"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/04\/Mobile-Covid.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div class=\"wysiwyg\">\n<p>As COVID-19 continues to spread around the world, so does the use of risky mobile applications designed to help track the outbreak. Some of these apps already present troubling privacy implications due to their ability to track the movements of local citizens and collect information on them. But beyond that, they may also be saddled with vulnerabilities, or have been ripped off by copycats, perhaps for nefarious purposes.<\/p>\n<p>Indeed, researchers from the <a href=\"https:\/\/www.scmagazine.com\/?s=ZeroFOX\">ZeroFOX<\/a> Alpha Team on Monday reported finding suspicious or even outright malicious versions of government-sanctioned COVID-19 mobile applications in Iran and Italy. Users in these countries \u2014 both among the hardest hit by the virus \u2014 are likely downloading these versions from untrustworthy third-party sources instead of from the official app store.<\/p>\n<p>\u201cA greater number of government-sanctioned applications causes users to be less certain of which applications are legitimate,\u201d says the <a href=\"https:\/\/www.zerofox.com\/blog\/covid-19-mobile-apps\/\">blog post report<\/a>. \u201cThreat actors have taken advantage of this confusion, and have released malicious applications\u2026 to prey on users who may mistakenly download the malicious app. To prevent this and protect their citizens, it is highly important that governments ensure consistency with where applications are able to be downloaded, and even with their appearance.\u201d<\/p>\n<p>The same research team also discovered that a legitimate, government-approved mobile app in Colombia contained an encryption flaw that could have allowed attackers to intercept sensitive user information in clear text.<\/p>\n<p>In the Italian case, Alpha Team found 12 malicious APKs impersonating a genuine app from developer SoftMining called SM-Covid-19. The campaign is designed to infect users with backdoor malware that starts after an Android device reboots.<\/p>\n<p>According to the report, the campaign leverages reverse TCP tunnels, the Metasploit&nbsp;penetration testing framework and msfvenom tools to infect individuals.<\/p>\n<p>The copycat Iranian app, meanwhile, is somewhat unusual because it\u2019s unclear to what degree the fake app is any more dangerous than the actual government-sponsored one, which is available via the Iranian app store Cafe Bazaar.<\/p>\n<p>ZeroFOX doesn\u2019t name the official Iranian program, but based on various reports, it is likely the \u201cAC19\u201d app, which has been compared to surveillanceware for its heavy-handed approach toward tracking the country\u2019s citizens and harvesting personal information. The fake version \u2014 named CoronaApp and available for download from a website listed in various news websites, Telegram groups and social network posts \u2014 does much of the same, the researchers said.<\/p>\n<p>\u201cAlpha Team has analyzed the unofficial CoronaApp, and although no evidence of ill-intent was identified, the app does request permissions to access a user\u2019s location, camera, internet data, system information and write to external storage,\u201d the report states. \u201cIntrusive permissions are not necessarily an indication of something malicious, but rather, this particular collection of permissions demonstrates the likely intent of the developer to access sensitive user information.\u201d<\/p>\n<p>Indeed, by allowing all the permissions, the application is able to exfiltrate details related to a device\u2019s ID, IP address, MAC address, geolocation, language, active default data network, connection status, supported network types and more. The app\u2019s code libraries arouse suspicion as well, and to make matters worse it does not does not use Transport Layer Security (TLS) for data transfer. For that reason, Alpha Team \u201cassesses with HIGH confidence that this application can be abused in the future,\u201d the report concludes.<\/p>\n<p>The researchers also found a legitimate, official coronavirus app that was similarly lacking in TLS security \u2014 the Colombian COVID-19 mobile app \u201cCoronApp-Colombia.\u201d The app reportedly was insecurely communicating with the API server throughout the app workflow, using HTTP instead of HTTPS.<\/p>\n<p>ZeroFOX said that after it alerted the Colombian CERT on March 26, the developer fixed the problem just days later.<\/p>\n<p>Prior to the security update, \u201cZeroFOX Alpha Team installed the app on an Android Emulator and captured traffic going to this server with Wireshark. We successfully created a user in the app, and captured all the information (PII and PHI) over cleartext, demonstrating the ease with which an attacker could man-in-the-middle this traffic. Successfully doing so would give attackers access to the PII and PHI of any user of CoronApp-Colombia,\u201d the report stated.<\/p>\n<p>\u201cAlthough there is something to be said about rapid response during a crisis, failure to do due diligence and review code prior to releasing it to hundreds of thousands of users puts citizens at risk,\u201d ZeroFOX concludes in its report. \u201cInsecure mobile applications\u2026 put sensitive user health and personal information at risk of being compromised.\u201d<\/p>\n<\/div>\n<section class=\"post-tags\">\n<h2>Topics:<\/h2>\n<p><a href=\"https:\/\/www.scmagazine.com\/tag\/coronavirus\/\" class=\"button -secondary\">Coronavirus<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/mobile-security\/\" class=\"button -secondary\">Mobile Security<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/privacy\/\" class=\"button -secondary\">Privacy<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/vulnerabilities\/\" class=\"button -secondary\">Vulnerabilities<\/a><\/section>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31102\/Global-COVID-19-Apps-Suffering-From-Flaws-Malicious-Copycats.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34281,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8565],"class_list":["post-34280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemalwarevirusphonespyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Global COVID-19 Apps Suffering From Flaws, Malicious Copycats 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Global COVID-19 Apps Suffering From Flaws, Malicious Copycats 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-07T16:36:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/global-covid-19-apps-suffering-from-flaws-malicious-copycats.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1083\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Global COVID-19 Apps Suffering From Flaws, Malicious Copycats\",\"datePublished\":\"2020-04-07T16:36:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/\"},\"wordCount\":748,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/global-covid-19-apps-suffering-from-flaws-malicious-copycats.jpg\",\"keywords\":[\"headline,malware,virus,phone,spyware\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/\",\"name\":\"Global COVID-19 Apps Suffering From Flaws, Malicious Copycats 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/global-covid-19-apps-suffering-from-flaws-malicious-copycats.jpg\",\"datePublished\":\"2020-04-07T16:36:20+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/global-covid-19-apps-suffering-from-flaws-malicious-copycats.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/global-covid-19-apps-suffering-from-flaws-malicious-copycats.jpg\",\"width\":2000,\"height\":1083},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware,virus,phone,spyware\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwarevirusphonespyware\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Global COVID-19 Apps Suffering From Flaws, Malicious Copycats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Global COVID-19 Apps Suffering From Flaws, Malicious Copycats 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/","og_locale":"en_US","og_type":"article","og_title":"Global COVID-19 Apps Suffering From Flaws, Malicious Copycats 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-07T16:36:20+00:00","og_image":[{"width":2000,"height":1083,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/global-covid-19-apps-suffering-from-flaws-malicious-copycats.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Global COVID-19 Apps Suffering From Flaws, Malicious Copycats","datePublished":"2020-04-07T16:36:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/"},"wordCount":748,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/global-covid-19-apps-suffering-from-flaws-malicious-copycats.jpg","keywords":["headline,malware,virus,phone,spyware"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/","url":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/","name":"Global COVID-19 Apps Suffering From Flaws, Malicious Copycats 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/global-covid-19-apps-suffering-from-flaws-malicious-copycats.jpg","datePublished":"2020-04-07T16:36:20+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/global-covid-19-apps-suffering-from-flaws-malicious-copycats.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/global-covid-19-apps-suffering-from-flaws-malicious-copycats.jpg","width":2000,"height":1083},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/global-covid-19-apps-suffering-from-flaws-malicious-copycats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware,virus,phone,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwarevirusphonespyware\/"},{"@type":"ListItem","position":3,"name":"Global COVID-19 Apps Suffering From Flaws, Malicious Copycats"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34280"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34280\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34281"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}