{"id":41225,"date":"2021-06-04T13:00:00","date_gmt":"2021-06-04T13:00:00","guid":{"rendered":"http:\/\/7228207b-47e3-4b37-82d7-9f1d1786e2d0"},"modified":"2021-06-04T13:00:00","modified_gmt":"2021-06-04T13:00:00","slug":"hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/","title":{"rendered":"Hackers use Colonial pipeline ransomware news for phishing attack"},"content":{"rendered":"<p>Cyberattackers are now using the notoriety of the <a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\" target=\"_blank\" rel=\"noopener noreferrer\">Colonial Pipeline<\/a> ransomware attack to <a href=\"https:\/\/www.inky.com\/blog\/colonial-pipeline-ransomware-hack-unleashes-flood-of-related-phishing-attempts\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">leverage further phishing attacks<\/a>, according to the findings of a cybersecurity company.&nbsp;<\/p>\n<p>It is common for attackers to use widely-covered news events to get people to click on malicious emails and links, and cybersecurity firm INKY said it recently received multiple helpdesk emails about curious emails their customers were receiving.&nbsp;<\/p>\n<p>INKY customers reported receiving emails that discuss the ransomware attack on Colonial Pipeline and ask them to download &#8220;ransomware system updates&#8221; in order to protect their organization from a similar fate.&nbsp;<\/p>\n<p>The malicious links take users to websites with convincing names &#8212; ms-sysupdate.com and selectivepatch.com &#8212; both of which are newly created and registered with NameCheap. The same domain that sent the emails also controlled the links, INKY explained in a blog post.&nbsp;<\/p>\n<figure class=\"image image-large shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/\" class=\"lazy\" alt=\"help-desk.jpg\" height=\"auto\" width=\"470\" data-original=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/06\/04\/9638ef5b-c61b-4ae8-be40-001e42fd11aa\/resize\/470xauto\/b4545983cd3bb13ec922fb0e940d5f06\/help-desk.jpg\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/06\/04\/9638ef5b-c61b-4ae8-be40-001e42fd11aa\/resize\/470xauto\/b4545983cd3bb13ec922fb0e940d5f06\/help-desk.jpg\" class alt=\"help-desk.jpg\" height=\"auto\" width=\"470\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> INKY <\/span><\/figcaption><\/figure>\n<p>The people behind the attack were able to make the fake websites look even more convincing by designing them with the logo and images from the target company. A download button on the page downloads a &#8220;Cobalt Strike&#8221; file onto the user&#8217;s computer called &#8220;Ransomware_Update.exe.&#8221;<\/p>\n<p>In March, Red Canary&#8217;s <a href=\"https:\/\/redcanary.com\/threat-detection-report\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">2021 Threat Detection Report<\/a> listed &#8220;Cobalt Strike&#8221; as the second most frequently detected threat and the INKY report notes that Talos Intelligence found it was involved in 66% of all ransomware attacks in Q4 of 2020.&nbsp;<\/p>\n<p>Bukar Alibe, data analyst for INKY, said they began to see the phishing attack just a few weeks after news broke that the pipeline <a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-paid-close-to-5-million-in-ransomware-blackmail-payment\/\" target=\"_blank\" rel=\"noopener noreferrer\">paid millions to the DarkSide ransomware group<\/a> in order to restore the company&#8217;s systems. &nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>&#8220;In this environment, phishers tried to exploit people&#8217;s anxiety, offering them a software update that would &#8216;fix&#8217; the problem via a highly targeted email that used design language that could plausibly be the recipient&#8217;s company&#8217;s own,&#8221; Alibe wrote. &#8220;All the recipient had to do was click the big blue button, and the malware would be injected.&#8221;<\/p>\n<p>In addition to capitalizing on the fear around ransomware, the attackers made the emails and fake website look like it came from the user&#8217;s own company, giving them an air of legitimacy, Alibe added.&nbsp;<\/p>\n<p>The attackers were also able to get past many phishing systems by using new domains.&nbsp;<\/p>\n<figure class=\"image image-large shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/\" class=\"lazy\" alt=\"click-the-download-button-and-execute-the-patch-executable-to-ensure.jpg\" height=\"auto\" width=\"470\" data-original=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/06\/04\/398c7dd0-6101-45f6-97ff-ac134b7473e5\/resize\/470xauto\/6a66f86bd12b0a697b3a7bce138afe6e\/click-the-download-button-and-execute-the-patch-executable-to-ensure.jpg\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/06\/04\/398c7dd0-6101-45f6-97ff-ac134b7473e5\/resize\/470xauto\/6a66f86bd12b0a697b3a7bce138afe6e\/click-the-download-button-and-execute-the-patch-executable-to-ensure.jpg\" class alt=\"click-the-download-button-and-execute-the-patch-executable-to-ensure.jpg\" height=\"auto\" width=\"470\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> INKY <\/span><\/figcaption><\/figure>\n<p>&#8220;If it looks as if it was sent by the company itself (e.g., from HR, IT or Finance), does it in fact originate from an email server under the company&#8217;s control? If it looks like the HR or IT Departments but deviates from the norm, that should be a flag,&#8221; the blog post said.&nbsp;<\/p>\n<p>Alibe urged IT teams to notify employees that they will &#8220;not be asked to download certain file types&#8221; because these kinds of phishing emails seek to exploit employees desire to do the right thing by following purported security guidelines. Alibe noted that the attack was targeted toward two companies and said IT teams should expect more attacks along the same lines.&nbsp;<\/p>\n<p>&#8220;We would not be surprised if we see attackers use the recent Nobelium-USAID phishing campaign as a lure,&#8221; Alibe said.&nbsp;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The emails ask employees to download a \u201cransomware update\u201d that is actually malware.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-41225","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers use Colonial pipeline ransomware news for phishing attack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers use Colonial pipeline ransomware news for phishing attack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-04T13:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hackers use Colonial pipeline ransomware news for phishing attack\",\"datePublished\":\"2021-06-04T13:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/\"},\"wordCount\":534,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/\",\"name\":\"Hackers use Colonial pipeline ransomware news for phishing attack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/\",\"datePublished\":\"2021-06-04T13:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers use Colonial pipeline ransomware news for phishing attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers use Colonial pipeline ransomware news for phishing attack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/","og_locale":"en_US","og_type":"article","og_title":"Hackers use Colonial pipeline ransomware news for phishing attack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-06-04T13:00:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hackers use Colonial pipeline ransomware news for phishing attack","datePublished":"2021-06-04T13:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/"},"wordCount":534,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/","url":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/","name":"Hackers use Colonial pipeline ransomware news for phishing attack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/","datePublished":"2021-06-04T13:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/","contentUrl":"https:\/\/www.zdnet.com\/article\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers use Colonial pipeline ransomware news for phishing attack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41225"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41225\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}