{"id":391,"date":"2018-05-10T20:04:23","date_gmt":"2018-05-10T20:04:23","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=131891"},"modified":"2018-05-10T20:04:23","modified_gmt":"2018-05-10T20:04:23","slug":"pos-malware-treasurehunter-source-code-leaked","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/","title":{"rendered":"PoS Malware \u2018TreasureHunter\u2019 Source Code Leaked"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<div><img decoding=\"async\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/05\/10145313\/PoS_Malware_Cash_Register.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Source code for the point-of-sale malware called TreasureHunter has been leaked, according to researchers who said the release offers them unique insights into the malware, but also gives them pause as they brace for expected variants.<\/p>\n<p>Not just was TreasureHunter\u2019s source code leaked, but so was source code for the malware\u2019s graphical user interface-builder and administrator panel. The leaked code was found on a \u201ctop-tier\u201d Russian-speaking hacker forum in March, according to Vitali Kremez, a senior intelligence analyst at Flashpoint, in a technical write-up of the discovery <a href=\"https:\/\/www.flashpoint-intel.com\/blog\/treasurehunter-source-code-leaked\/\">posted on Thursday<\/a>.<\/p>\n<p>\u201cThe availability of both code bases lowers the barrier for entry for cybercriminals wishing to capitalize on the leaks to build their own variants of the PoS malware,\u201d he wrote.<\/p>\n<p>TreasureHunter has been thorn in the side to companies since 2014, as cybercriminals burrowed the malware into PoS systems to scrape credit-card track data. According to a 2017 analysis by independent <a href=\"http:\/\/adelmas.com\/blog\/treasurehunter.php\">security engineer Arnaud Delmas<\/a>, the malware is garden-variety and relies entirely on RAM scraping to attempt to steal credit-card primary account numbers; it also lacks any hooking capabilities.<\/p>\n<p>\u201cTreasureHunter was observed to be\u00a0deployed on compromised point-of-sale\u00a0machines by the criminal operators after\u00a0they initially were able to successfully brute force their access to victim\u00a0remote desktop protocol (RDP) servers,\u201d researchers said.<\/p>\n<p>Flashpoint said the malware was likely developed by an underground cybergang called Bears Inc. that primarily does business on low- to mid-tier hacking and carding communities.\u00a0According to a <a href=\"https:\/\/threatpost.com\/pos-malware-tool-treasurehunt-targets-small-us-based-banks-retailers\/117014\/\">2016 report by FireEye<\/a>, TreasureHunter is version of the PoS malware known as TreasureHunt, developed by malware author <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2016\/03\/treasurehu\">Jolly Roger specifically for Bears Inc<\/a>.<\/p>\n<p>Chief among researcher concerns is that the leaked source code will spawn a wave of new PoS threats. That\u2019s typical with the accidental or intentional release of malware source code. In 2011, source code to the infamous\u00a0<a href=\"https:\/\/threatpost.com\/zeus-source-code-leaked-051011\/75217\/\">Zeus crimeware kit was leaked,<\/a> triggering a flurry of similar banking trojans into underground markets, including the tool known as <a href=\"https:\/\/threatpost.com\/citadel-trojan-it-s-not-just-banking-fraud-anymore-020113\/77481\/\">Citadel<\/a>, responsible for over $100 million in reported losses.<\/p>\n<p>\u201cPoS malware leaks have had similar effects, most notably with the 2015 leak of the Alina malware, which led to the creation of the ProPoS and Katrina variants,\u201d Kremez wrote.<\/p>\n<p>Researchers are at a loss as to why the malware code was released. In an email interview with Threatpost, Kremez said it might be an attempt by the developers to distance themselves from being unique malware\u00a0code owners. \u201cOftentimes, various\u00a0threat actors do so to frustrate and thwart possible law-enforcement\u00a0investigation and attribution by law enforcement (e.g., Mirai and\u00a0Zeus source\u00a0code leaks),\u201d he said.<\/p>\n<p>The only silver lining tied to the code leak is that investigators will have a closer look into the malware and how it operates, for the first time. \u201cTreasureHunter has been known and investigated since 2014, but until now investigators have had to reverse-engineer its code in order to analyze it,\u201d Kremez said. \u201cNow, with the full code available, analysts have previously unseen insight into the malware\u2019s operation. It provides unique insights into coder\u2019s mindset and operations style revealing interesting code comments.\u201d<\/p>\n<p>An analysis of the code, and the hacker chatter tied to the code\u2019s release, lead researchers to a code project called \u201ctrhutt34C,\u201d which they believe was an ongoing revamp of the malware.<\/p>\n<p>\u201cThe developer intended to improve and redesign various features, including anti-debugging, code structure improvement and gate communication logic,\u201d according to the Flashpoint analysis. \u201cWith the goal of additional features to be improved, the developer hoped frustrate malware analysis and subsequent research.\u201d<\/p>\n<p>A note left by one of the developers read: \u201cWe want the malware researchers screamin\u2019!\u201d<\/p>\n<p>Read More <a href=\"https:\/\/threatpost.com\/pos-malware-treasurehunter-source-code-leaked\/131891\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The leak of point-of-sale malware source code is a double-edge sword to researchers who view it as boon to research, but a headache when it comes to inspiring future variants and attacks. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":392,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[261,18,28,262,263,264,265,266,267,69,268],"class_list":["post-391","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-citadel","tag-hacks","tag-malware","tag-point-of-sale","tag-pos-malware","tag-remote-desktop-protocol","tag-treasurehunt","tag-treasurehunter","tag-trhutt34c","tag-web-security","tag-zeus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PoS Malware \u2018TreasureHunter\u2019 Source Code Leaked 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PoS Malware \u2018TreasureHunter\u2019 Source Code Leaked 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-10T20:04:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/pos-malware-treasurehunter-source-code-leaked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"PoS Malware \u2018TreasureHunter\u2019 Source Code Leaked\",\"datePublished\":\"2018-05-10T20:04:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/\"},\"wordCount\":607,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/pos-malware-treasurehunter-source-code-leaked.jpg\",\"keywords\":[\"citadel\",\"Hacks\",\"Malware\",\"point of sale\",\"POS malware\",\"Remote Desktop Protocol\",\"TreasureHunt\",\"treasurehunter\",\"trhutt34C\",\"Web Security\",\"Zeus\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/\",\"name\":\"PoS Malware \u2018TreasureHunter\u2019 Source Code Leaked 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/pos-malware-treasurehunter-source-code-leaked.jpg\",\"datePublished\":\"2018-05-10T20:04:23+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/pos-malware-treasurehunter-source-code-leaked.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/pos-malware-treasurehunter-source-code-leaked.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pos-malware-treasurehunter-source-code-leaked\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"citadel\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/citadel\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PoS Malware \u2018TreasureHunter\u2019 Source Code Leaked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PoS Malware \u2018TreasureHunter\u2019 Source Code Leaked 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/","og_locale":"en_US","og_type":"article","og_title":"PoS Malware \u2018TreasureHunter\u2019 Source Code Leaked 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-10T20:04:23+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/pos-malware-treasurehunter-source-code-leaked.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"PoS Malware \u2018TreasureHunter\u2019 Source Code Leaked","datePublished":"2018-05-10T20:04:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/"},"wordCount":607,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/pos-malware-treasurehunter-source-code-leaked.jpg","keywords":["citadel","Hacks","Malware","point of sale","POS malware","Remote Desktop Protocol","TreasureHunt","treasurehunter","trhutt34C","Web Security","Zeus"],"articleSection":["Threatpost"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/","url":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/","name":"PoS Malware \u2018TreasureHunter\u2019 Source Code Leaked 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/pos-malware-treasurehunter-source-code-leaked.jpg","datePublished":"2018-05-10T20:04:23+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/pos-malware-treasurehunter-source-code-leaked.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/pos-malware-treasurehunter-source-code-leaked.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/pos-malware-treasurehunter-source-code-leaked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"citadel","item":"https:\/\/www.threatshub.org\/blog\/tag\/citadel\/"},{"@type":"ListItem","position":3,"name":"PoS Malware \u2018TreasureHunter\u2019 Source Code Leaked"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=391"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/391\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/392"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}