{"id":39096,"date":"2021-01-11T15:36:50","date_gmt":"2021-01-11T15:36:50","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31915\/SolarWinds-Hackers-Linked-To-Known-Russian-Spying-Tools.html"},"modified":"2021-01-11T15:36:50","modified_gmt":"2021-01-11T15:36:50","slug":"solarwinds-hackers-linked-to-known-russian-spying-tools","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/","title":{"rendered":"SolarWinds Hackers Linked To Known Russian Spying Tools"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210111&amp;t=2&amp;i=1547368513&amp;r=LYNXMPEH0A0IY&amp;w=800\" class=\"ff-og-image-inserted\"><\/div>\n<div class=\"ArticleBody-byline-container-3H6dy\">\n<p class=\"Byline-byline-1sVmo ArticleBody-byline-10B7D\">By <a class=\"TextLabel__text-label___3oCVw TextLabel__black-to-orange___23uc0 TextLabel__serif___3lOpX Byline-author-2BSir\" href=\"https:\/\/www.reuters.com\/journalists\/jack-stubbs\" target=\"_blank\" rel=\"noopener noreferrer\">Jack Stubbs<\/a><\/p>\n<div class=\"ArticleBody-read-time-and-social-2VOIr\">\n<p class=\"TextLabel__text-label___3oCVw TextLabel__gray___1V4fk TextLabel__small-all-caps-spaced-out___3O9H4 ReadTime-read-time-1s3CG ArticleBody-read-time-29pGN\">3 Min Read<\/p>\n<\/div>\n<\/div>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">LONDON (Reuters) &#8211; The group behind a global cyber-espionage campaign discovered last month deployed malicious computer code with links to spying tools previously used by suspected Russian hackers, researchers said on Monday.<\/p>\n<figure class=\"WithCaption-container-Aau3d WithCaption-outside-2Jvzs\" readability=\"6\">\n<p><figcaption>FILE PHOTO: SolarWinds Corp banner hangs at the New York Stock Exchange (NYSE) on the IPO day of the company in New York, U.S., October 19, 2018. REUTERS\/Brendan McDermid\/\/File Photo\/File Photo<\/figcaption><\/p>\n<\/figure>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">Investigators at Moscow-based cybersecurity firm Kaspersky said the \u201cbackdoor\u201d used to compromise up to 18,000 customers of U.S. software maker SolarWinds closely resembled malware tied to a hacking group known as \u201cTurla,\u201d which Estonian authorities have said operates on behalf of Russia\u2019s FSB security service.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">The findings are the first publicly-available evidence to support assertions by the United States that Russia orchestrated the hack, which compromised a raft of sensitive federal agencies and is among the most ambitious cyber operations ever disclosed.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">Moscow has repeatedly denied the allegations. The FSB did not respond to a request for comment.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">Costin Raiu, head of global research and analysis at Kaspersky, said there were three distinct similarities between the SolarWinds backdoor and a hacking tool called \u201cKazuar\u201d which is used by Turla.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">The similarities included the way both pieces of malware attempted to obscure their functions from security analysts, how the hackers identified their victims, and the formula used to calculate periods when the viruses lay dormant in an effort to avoid detection.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">\u201cOne such finding could be dismissed,\u201d Raiu said. \u201cTwo things definitely make me raise an eyebrow. Three is more than a coincidence.\u201d<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">Confidently attributing cyberattacks is extremely difficult and strewn with possible pitfalls. When Russian hackers disrupted the Winter Olympics opening ceremony in 2018, for example, they deliberately imitated a North Korean group to try and deflect the blame.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">Raiu said the digital clues uncovered by his team did not directly implicate Turla in the SolarWinds compromise, but did show there was a yet-to-be determined connection between the two hacking tools.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">It\u2019s possible they were deployed by the same group, he said, but also that Kazuar inspired the SolarWinds hackers, both tools were purchased from the same spyware developer, or even that the attackers planted \u201cfalse flags\u201d to mislead investigators.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">Security teams in the United States and other countries are still working to determine the full scope of the SolarWinds hack. Investigators have said it could take months to understand the extent of the compromise and even longer to evict the hackers from victim networks.<\/p>\n<p class=\"Paragraph-paragraph-2Bgue ArticleBody-para-TD_9x\">U.S. intelligence agencies have said the hackers were \u201clikely Russian in origin\u201d and targeted a small number of high-profile victims as part of an intelligence-gathering operation.<\/p>\n<div readability=\"4.8235294117647\">\n<div class=\"Attribution-attribution-Y5JpY\" readability=\"7\">\n<p>Reporting by Jack Stubbs; Editing by Chris Sanders and Edward Tobin<\/p>\n<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31915\/SolarWinds-Hackers-Linked-To-Known-Russian-Spying-Tools.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9142],"class_list":["post-39096","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinegovernmentusarussiacyberwarbackdoor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SolarWinds Hackers Linked To Known Russian Spying Tools 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SolarWinds Hackers Linked To Known Russian Spying Tools 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-11T15:36:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210111&amp;t=2&amp;i=1547368513&amp;r=LYNXMPEH0A0IY&amp;w=800\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hackers-linked-to-known-russian-spying-tools\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hackers-linked-to-known-russian-spying-tools\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"SolarWinds Hackers Linked To Known Russian Spying Tools\",\"datePublished\":\"2021-01-11T15:36:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hackers-linked-to-known-russian-spying-tools\\\/\"},\"wordCount\":465,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hackers-linked-to-known-russian-spying-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/static.reuters.com\\\/resources\\\/r\\\/?m=02&amp;d=20210111&amp;t=2&amp;i=1547368513&amp;r=LYNXMPEH0A0IY&amp;w=800\",\"keywords\":[\"headline,government,usa,russia,cyberwar,backdoor\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hackers-linked-to-known-russian-spying-tools\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hackers-linked-to-known-russian-spying-tools\\\/\",\"name\":\"SolarWinds Hackers Linked To Known Russian Spying Tools 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hackers-linked-to-known-russian-spying-tools\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hackers-linked-to-known-russian-spying-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/static.reuters.com\\\/resources\\\/r\\\/?m=02&amp;d=20210111&amp;t=2&amp;i=1547368513&amp;r=LYNXMPEH0A0IY&amp;w=800\",\"datePublished\":\"2021-01-11T15:36:50+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hackers-linked-to-known-russian-spying-tools\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hackers-linked-to-known-russian-spying-tools\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hackers-linked-to-known-russian-spying-tools\\\/#primaryimage\",\"url\":\"https:\\\/\\\/static.reuters.com\\\/resources\\\/r\\\/?m=02&amp;d=20210111&amp;t=2&amp;i=1547368513&amp;r=LYNXMPEH0A0IY&amp;w=800\",\"contentUrl\":\"https:\\\/\\\/static.reuters.com\\\/resources\\\/r\\\/?m=02&amp;d=20210111&amp;t=2&amp;i=1547368513&amp;r=LYNXMPEH0A0IY&amp;w=800\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/solarwinds-hackers-linked-to-known-russian-spying-tools\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,russia,cyberwar,backdoor\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusarussiacyberwarbackdoor\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SolarWinds Hackers Linked To Known Russian Spying Tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SolarWinds Hackers Linked To Known Russian Spying Tools 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/","og_locale":"en_US","og_type":"article","og_title":"SolarWinds Hackers Linked To Known Russian Spying Tools 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-01-11T15:36:50+00:00","og_image":[{"url":"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210111&amp;t=2&amp;i=1547368513&amp;r=LYNXMPEH0A0IY&amp;w=800","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"SolarWinds Hackers Linked To Known Russian Spying Tools","datePublished":"2021-01-11T15:36:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/"},"wordCount":465,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210111&amp;t=2&amp;i=1547368513&amp;r=LYNXMPEH0A0IY&amp;w=800","keywords":["headline,government,usa,russia,cyberwar,backdoor"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/","url":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/","name":"SolarWinds Hackers Linked To Known Russian Spying Tools 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210111&amp;t=2&amp;i=1547368513&amp;r=LYNXMPEH0A0IY&amp;w=800","datePublished":"2021-01-11T15:36:50+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/#primaryimage","url":"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210111&amp;t=2&amp;i=1547368513&amp;r=LYNXMPEH0A0IY&amp;w=800","contentUrl":"https:\/\/static.reuters.com\/resources\/r\/?m=02&amp;d=20210111&amp;t=2&amp;i=1547368513&amp;r=LYNXMPEH0A0IY&amp;w=800"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/solarwinds-hackers-linked-to-known-russian-spying-tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,russia,cyberwar,backdoor","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusarussiacyberwarbackdoor\/"},{"@type":"ListItem","position":3,"name":"SolarWinds Hackers Linked To Known Russian Spying Tools"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39096"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39096\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}