{"id":4015,"date":"2018-06-22T19:09:11","date_gmt":"2018-06-22T19:09:11","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=133023"},"modified":"2018-06-22T19:09:11","modified_gmt":"2018-06-22T19:09:11","slug":"malicious-app-infects-60000-android-devices-but-still-saves-their-batteries","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/","title":{"rendered":"Malicious App Infects 60,000 Android Devices \u2013 But Still Saves Their Batteries"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<p>A battery-saving app that also allows attackers to snatch text messages and read sensitive log data has been downloaded by more than 60,000 Android devices so far.<\/p>\n<p>But what\u2019s unique about the attack, according to the researchers at RiskIQ who discovered it, is that it holds true to its advertising: It actually does monitor devices\u2019 battery status, even killing unwanted background processes.<\/p>\n<p>\u201cAlthough the app these scam pages send users to does its advertised function, it also has a nasty secret\u2014it infects victims\u2019 devices and comes with a side of information-stealing and ad-clicking,\u201d Yonathan Klijnsma, threat researcher at RiskIQ, said in a <a href=\"https:\/\/www.riskiq.com\/blog\/interesting-crawls\/battery-saving-mobile-scam-app\/\" target=\"_blank\" rel=\"noopener\">post<\/a> on Thursday.<\/p>\n<p>Klijnsma told Threatpost that although a complaint has been filed for take-down, the app can still be <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.advancedbatr.batsaver\" target=\"_blank\" rel=\"noopener\">found<\/a> on Google Play. Google did not respond to a request for comment from Threatpost.<\/p>\n<p>The attack starts off with a false warning message that appears on Android users\u2019 devices while they browse the web.<\/p>\n<p>Klijnsma said that the pop-up\u2019s text is customized around the victim\u2019s device by parsing the user-agent server-side and embedding the processed brand and model information in the script behind the pop-up (in this example given below, for instance, the pop-up identifies the user device as a Samsung SM-G925A).<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/22140543\/Android-Scam.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-133024 alignleft\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/22140543\/Android-Scam-255x300.png\" alt=\"\" width=\"255\" height=\"300\"\/><\/a>While most scams lead victims to other web pages, researchers were surprised to find that this particular message led them to Google Play, where they were then served a malicious app.<\/p>\n<p>The pop-up heavily pushes victims to do its bidding; even if they click \u201ccancel\u201d instead of \u201cinstall,\u201d it will take them to the Google Play Store app; and, if they hit the back button on the page, another pop-up warning message appears telling them that their desktop will remain slow.<\/p>\n<p>Once the victim goes to the app store and downloads the battery-saving app, it requests access to an array of privacy permissions, such as reading sensitive log data, receiving text messages, receiving data from the internet, pairing with Bluetooth devices and full network access.<\/p>\n<p>The mobile app also comes with a small ad-clicking backdoor that steals information from the phone like International Mobile Equipment Identity (IMEI), phone numbers and location.<\/p>\n<p>Researchers were able to analyze command-and-control traffic, and observed that the C2 server assigned incremental ID numbers to bots; \u201cBased on those ID numbers, we can say with high certainty that the bot has had at least 60,000 android devices under its control,\u201d they said.<\/p>\n<p>Interestingly, the app does actually perform the legitimate functions mentioned, including reducing battery strain to lengthen the battery life, monitoring the battery status and killing off processes that use battery resources when the battery is low.<\/p>\n<p>\u201c[Sometimes], popular apps are bought out and then modified,\u201d Klijnsma explained to Threatpost. \u201cI feel like that might have been the case here: [Criminals] buy the source code for an app or get a freelancer to build it, and [then] add your own malicious code.\u201d<\/p>\n<p>Google Play lists details about the developers, so Klijnsma was able to track down clues about the app developer, using their email address listed. The email used to have another app on the Google Play store, which was has been taken down, he said.<\/p>\n<p>There also may be more than one attacker at play.<\/p>\n<p>\u201cIt appears that most of the effort here went into making the mobile app, while the page that redirects to it seems to be relatively low-effort,\u201d said Klijnsma. \u201cThe lack of attention to detail on the redirector pages could signify that the group is less concerned with them than they are with the app itself, or that one group is creating the redirector pages while another is responsible for the mobile part of the campaign.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/threatpost.com\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/133023\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A battery-saving app enables attackers to snatch text messages and read sensitive log data &#8211; but it also holds true to its advertising. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":4016,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[162,1332,1494,618,1495,71,1496,1497,621,29,333,69],"class_list":["post-4015","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-android","tag-android-app","tag-android-device","tag-android-malware","tag-battery-saver-app","tag-bot","tag-c2","tag-command-and-control","tag-google-play","tag-mobile-security","tag-scam","tag-web-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malicious App Infects 60,000 Android Devices \u2013 But Still Saves Their Batteries 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malicious App Infects 60,000 Android Devices \u2013 But Still Saves Their Batteries 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-22T19:09:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries.png\" \/>\n\t<meta property=\"og:image:width\" content=\"255\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Malicious App Infects 60,000 Android Devices \u2013 But Still Saves Their Batteries\",\"datePublished\":\"2018-06-22T19:09:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\\\/\"},\"wordCount\":627,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries.png\",\"keywords\":[\"Android\",\"Android app\",\"android device\",\"Android malware\",\"battery saver app\",\"bot\",\"C2\",\"command and control\",\"google play\",\"Mobile Security\",\"scam\",\"Web Security\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\\\/\",\"name\":\"Malicious App Infects 60,000 Android Devices \u2013 But Still Saves Their Batteries 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries.png\",\"datePublished\":\"2018-06-22T19:09:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries.png\",\"width\":255,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/android\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Malicious App Infects 60,000 Android Devices \u2013 But Still Saves Their Batteries\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malicious App Infects 60,000 Android Devices \u2013 But Still Saves Their Batteries 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/","og_locale":"en_US","og_type":"article","og_title":"Malicious App Infects 60,000 Android Devices \u2013 But Still Saves Their Batteries 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-22T19:09:11+00:00","og_image":[{"width":255,"height":300,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Malicious App Infects 60,000 Android Devices \u2013 But Still Saves Their Batteries","datePublished":"2018-06-22T19:09:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/"},"wordCount":627,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries.png","keywords":["Android","Android app","android device","Android malware","battery saver app","bot","C2","command and control","google play","Mobile Security","scam","Web Security"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/","url":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/","name":"Malicious App Infects 60,000 Android Devices \u2013 But Still Saves Their Batteries 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries.png","datePublished":"2018-06-22T19:09:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries.png","width":255,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/malicious-app-infects-60000-android-devices-but-still-saves-their-batteries\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Android","item":"https:\/\/www.threatshub.org\/blog\/tag\/android\/"},{"@type":"ListItem","position":3,"name":"Malicious App Infects 60,000 Android Devices \u2013 But Still Saves Their Batteries"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=4015"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4015\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/4016"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=4015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=4015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=4015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}