{"id":35653,"date":"2020-06-22T15:52:19","date_gmt":"2020-06-22T15:52:19","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31322\/Encrypted-Phone-Network-Shutting-Down-After-Police-Hack.html"},"modified":"2020-06-22T15:52:19","modified_gmt":"2020-06-22T15:52:19","slug":"encrypted-phone-network-shutting-down-after-police-hack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/","title":{"rendered":"Encrypted Phone Network Shutting Down After Police Hack"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/test-uploads\/articles\/5ef0ad92af9e32009d979616\/lede\/1592831557358-encrochat-2.png?crop=0.9218xw:0.8573xh;0.0775xw,0.1099xh&amp;resize=1200:*\" class=\"ff-og-image-inserted\"><\/div>\n<p>Someone in control of an email address long associated with Encrochat, a company that sells custom encrypted phones often used by organized criminals, tells Motherboard the company is shutting down after a law enforcement hacking operation against its customers.<\/p>\n<p>The news comes as law enforcement agencies have arrested multiple criminal users of Encrochat across Europe in what appears to be a large scale, coordinated operation against the phone network and its users.<\/p>\n<p>&#8220;We have been forced to make the difficult decision to shut down our service and our business permanently,&#8221; the person wrote in an email to Motherboard. &#8220;This <em>[sic]<\/em>following several attacks carried out by a foreign organization that seems to originate in the UK.&#8221; The email address has been linked to Encrochat for years, but Motherboard could not confirm the identity of the person currently using the account.<\/p>\n<p>Motherboard also separately obtained screenshots of text messages sent over the past week of alleged Encrochat users discussing a wave of arrests associated with the Encrochat takeover.<\/p>\n<p class=\"article__blockquote\"><strong>Do you know anything else about Encrochat? We&#8217;d love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, OTR chat on jfcox@jabber.ccc.de, or email joseph.cox@vice.com.<\/strong><\/p>\n<p>Encrochat is part of the encrypted phone industry, which sells devices pre-loaded with private messaging apps, sometimes have the GPS or camera functionality physically removed, and can be remotely wiped by the user. The phones can typically only communicate with other devices sold by the same company, and often cost thousands of dollars per year to buy. Some companies in this space especially cater to criminal customers, and law enforcement agencies have increasingly targeted the industry. Encrochat&#8217;s users <a href=\"https:\/\/www.phoneweek.co.uk\/john-kinsella-and-paul-massey-murder-suspects-had-extremely-expensive-encrypted-phones\/\" target=\"_blank\" rel=\"noopener noreferrer\">included a British hitman<\/a> who assassinated another crime figure, and <a href=\"https:\/\/www.gloucestershirelive.co.uk\/news\/gloucester-news\/3000-year-encrypted-mobile-phones-2883942\" target=\"_blank\" rel=\"noopener noreferrer\">drug gangs in England<\/a> and Ireland.<\/p>\n<p>Last week, <a href=\"https:\/\/www.vice.com\/en_us\/article\/z3emm3\/encrochat-encro-hacked-encrypted-phones\" target=\"_blank\" rel=\"noopener noreferrer\">Encrochat users received a text message<\/a> warning that law enforcement had taken over part of the company&#8217;s infrastructure and launched a hacking attack against devices. In the days since, local outlet The Irish News reported court cases based on evidence <a href=\"https:\/\/www.irishnews.com\/news\/northernirelandnews\/2020\/06\/18\/news\/court-hears-police-uncovered-evidence-of-large-scale-supply-and-importation-of-drugs-on-encrypted-phone-1977585\/#:~:text=DETECTIVES%20uncovered%20evidence%20of%20%E2%80%9Clarge,phone%2C%20a%20court%20has%20heard.&amp;text=The%20accused%20had%20been%20sitting,a%20%E2%80%9Cblack%20encrypted%20phone%E2%80%9D.\" target=\"_blank\" rel=\"noopener noreferrer\">obtained from hacked Encrochat devices<\/a>, and a spike of <a href=\"http:\/\/www.irishnews.com\/paywall\/tsb\/irishnews\/irishnews\/irishnews\/\/news\/northernirelandnews\/2020\/06\/20\/news\/wave-of-arrests-after-breach-of-encrypted-communication-network-1980136\/content.html\" target=\"_blank\" rel=\"noopener noreferrer\">arrests after the Encrochat compromise<\/a>. Tabloid paper <em>Sunday World<\/em> cited European sources saying that Europol, Europe&#8217;s law enforcement agency, and other organizations had breached the Encrochat network.<\/p>\n<p>In the wake of that takeover, the person in control of the Encrochat email address told Motherboard, &#8220;We fully understand the inconvenience and frustration this decision has caused our customers. Our main priority has always been our customers integrity and security, and when we no longer can guarantee that, we have no other choice than to shut down the service even if it destroys our business.&#8221;<\/p>\n<p>The person added that in May, they received a number of tech support issues around Encrochat phones not wiping correctly. In June, they found one of Encrochat&#8217;s &#8220;X2&#8221; devices with this issue and &#8220;discovered malware installed on the device.&#8221; The malware was designed to conceal itself from detection, disable the phone&#8217;s factory reset, record the screen lock password, and clone application data, the person added.<\/p>\n<p>The person said they pushed out an update to the X2 models. But almost immediately after that patch, they noticed another attack, and sent the text message to users warning them, including advising customers to dispose of their Encrochat devices.<\/p>\n<p>Europol previously told Motherboard it would not comment around &#8220;ongoing operations.&#8221; The UK&#8217;s National Crime Agency has repeatedly not responded to requests for comment.<\/p>\n<p>&#8220;Encros finished,&#8221; a source in the encrypted phone industry previously told Motherboard, referring to Encrochat.<\/p>\n<p><strong><em>Subscribe to our cybersecurity podcast, <a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener noreferrer\">CYBER<\/a>.<\/em><\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31322\/Encrypted-Phone-Network-Shutting-Down-After-Police-Hack.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35654,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8736],"class_list":["post-35653","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackergovernmentprivacyphonecryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Encrypted Phone Network Shutting Down After Police Hack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encrypted Phone Network Shutting Down After Police Hack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-22T15:52:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/encrypted-phone-network-shutting-down-after-police-hack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1485\" \/>\n\t<meta property=\"og:image:height\" content=\"835\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encrypted-phone-network-shutting-down-after-police-hack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encrypted-phone-network-shutting-down-after-police-hack\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Encrypted Phone Network Shutting Down After Police Hack\",\"datePublished\":\"2020-06-22T15:52:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encrypted-phone-network-shutting-down-after-police-hack\\\/\"},\"wordCount\":617,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encrypted-phone-network-shutting-down-after-police-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/encrypted-phone-network-shutting-down-after-police-hack.jpg\",\"keywords\":[\"headline,hacker,government,privacy,phone,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encrypted-phone-network-shutting-down-after-police-hack\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encrypted-phone-network-shutting-down-after-police-hack\\\/\",\"name\":\"Encrypted Phone Network Shutting Down After Police Hack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encrypted-phone-network-shutting-down-after-police-hack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encrypted-phone-network-shutting-down-after-police-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/encrypted-phone-network-shutting-down-after-police-hack.jpg\",\"datePublished\":\"2020-06-22T15:52:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encrypted-phone-network-shutting-down-after-police-hack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encrypted-phone-network-shutting-down-after-police-hack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encrypted-phone-network-shutting-down-after-police-hack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/encrypted-phone-network-shutting-down-after-police-hack.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/encrypted-phone-network-shutting-down-after-police-hack.jpg\",\"width\":1485,\"height\":835},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/encrypted-phone-network-shutting-down-after-police-hack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,privacy,phone,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentprivacyphonecryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Encrypted Phone Network Shutting Down After Police Hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Encrypted Phone Network Shutting Down After Police Hack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/","og_locale":"en_US","og_type":"article","og_title":"Encrypted Phone Network Shutting Down After Police Hack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-22T15:52:19+00:00","og_image":[{"width":1485,"height":835,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/encrypted-phone-network-shutting-down-after-police-hack.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Encrypted Phone Network Shutting Down After Police Hack","datePublished":"2020-06-22T15:52:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/"},"wordCount":617,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/encrypted-phone-network-shutting-down-after-police-hack.jpg","keywords":["headline,hacker,government,privacy,phone,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/","url":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/","name":"Encrypted Phone Network Shutting Down After Police Hack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/encrypted-phone-network-shutting-down-after-police-hack.jpg","datePublished":"2020-06-22T15:52:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/encrypted-phone-network-shutting-down-after-police-hack.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/encrypted-phone-network-shutting-down-after-police-hack.jpg","width":1485,"height":835},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/encrypted-phone-network-shutting-down-after-police-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,privacy,phone,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentprivacyphonecryptography\/"},{"@type":"ListItem","position":3,"name":"Encrypted Phone Network Shutting Down After Police Hack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35653"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35653\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35654"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}