{"id":42537,"date":"2021-08-26T17:00:10","date_gmt":"2021-08-26T17:00:10","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=96153"},"modified":"2021-08-26T17:00:10","modified_gmt":"2021-08-26T17:00:10","slug":"widespread-credential-phishing-campaign-abuses-open-redirector-links","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/","title":{"rendered":"Widespread credential phishing campaign abuses open redirector links"},"content":{"rendered":"<p>Microsoft has been actively tracking a widespread credential phishing campaign using open redirector links. Attackers combine these links with social engineering baits that impersonate well-known productivity tools and services to lure users into clicking. Doing so leads to a series of redirections\u2014including a CAPTCHA verification page that adds a sense of legitimacy and attempts to evade some automated analysis systems\u2014before taking the user to a fake sign-in page. This ultimately leads to credential compromise, which opens the user and their organization to other attacks.<\/p>\n<p>The use of open redirects in email communications is common among organizations for various reasons. For example, sales and marketing campaigns use this feature to lead customers to a desired landing web page and track click rates and other metrics. However, attackers could abuse open redirects to link to a URL in a trusted domain and embed the eventual final malicious URL as a parameter. Such abuse may prevent users and security solutions from quickly recognizing possible malicious intent.<\/p>\n<p>For instance, users trained to hover on links and inspect for malicious artifacts in emails may still see a domain they trust and thus click it. Likewise, traditional email gateway solutions may inadvertently allow emails from this campaign to pass through because their settings have been trained to recognize the primary URL without necessarily checking the malicious parameters hiding in plain sight.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-96159 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig1_openredirect.png\" alt=\"Diagram showing attack chain of phishing campaigns that use open redirect links\" width=\"1429\" height=\"334\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig1_openredirect.png 1429w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig1_openredirect-300x70.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig1_openredirect-1024x239.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig1_openredirect-768x180.png 768w\" sizes=\"auto, (max-width: 1429px) 100vw, 1429px\"><\/p>\n<p><em>Figure 1. Attack chain for the open redirect phishing campaign<\/em><\/p>\n<p>This phishing campaign is also notable for its use of a wide variety of domains for its sender infrastructure\u2014another attempt to evade detection. These include free email domains from numerous country code top-level domains (ccTLDs), compromised legitimate domains, and attacker-owned domain generated algorithm (DGA) domains. As of this writing, we have observed at least 350 unique phishing domains used for this campaign. This not only shows the scale with which this attack is being conducted, but it also demonstrates how much the attackers are investing in it, indicating potentially significant payoffs.<\/p>\n<p>Today\u2019s email threats rely on three things to be effective: a convincing social engineering lure, a well-crafted detection evasion technique, and a durable infrastructure to carry out an attack. This phishing campaign exemplifies the perfect storm of these elements in its attempt to steal credentials and ultimately infiltrate a network. And given that <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/03\/20\/protecting-against-coronavirus-themed-phishing-attacks\/\">91% of all cyberattacks originate with email<\/a>, Organizations must therefore have a security solution that will provide them multilayered defense against these types of attacks.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/office-365-defender\">Microsoft Defender for Office 365<\/a> detects these emails and prevents them from being delivered to user inboxes using multiple layers of dynamic protection technologies, including a built-in sandbox that examines and detonates all the open redirector links in the messages, even in cases where the landing page requires CAPTCHA verification. This ensures that even the embedded malicious URLs are detected and blocked. Microsoft Defender for Office 365 is backed by Microsoft experts who enrich the threat intelligence that feeds into our solutions through expert monitoring of email campaigns.<\/p>\n<h2>Attack analysis: Credential phishing via open redirector links<\/h2>\n<p>Credential phishing emails represent an extremely prevalent way for threat actors to gain a foothold in a network. The use of open redirects from legitimate domains is far from new, and actors continue to abuse its ability to overcome common precautions.<\/p>\n<p>Phishing continues to grow as a dominant attack vector with the goal of harvesting user credentials. From our <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/09\/29\/microsoft-digital-defense-report-2020-cyber-threat-sophistication-rise\/\">2020 Digital Defense Report<\/a>, we blocked over 13 billion malicious and suspicious mails in the previous year, with more than 1 billion of those emails classified as URL-based phishing threats.<\/p>\n<p>In this campaign, we noticed that the emails seemed to follow a general pattern that displayed all the email content in a box with a large button that led to credential harvesting pages when clicked. The subject lines for the emails varied depending on the tool they impersonated. In general, we saw that the subject lines contained the recipient\u2019s domain and a timestamp as shown in the examples below:<\/p>\n<ul>\n<li>[Recipient username] 1 New Notification<\/li>\n<li>Report Status for [Recipient Domain Name] at [Date and Time]<\/li>\n<li>Zoom Meeting for [Recipient Domain Name] at [Date and Time]<\/li>\n<li>Status for [Recipient Domain Name] at [Date and Time]<\/li>\n<li>Password Notification for [Recipient Domain Name] at [Date and Time]<\/li>\n<li>[Recipient username] eNotification<\/li>\n<\/ul>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-96162\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig2_openredirect.png\" alt=\"Screenshot of email that uses open redirect link\" width=\"1186\" height=\"748\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig2_openredirect.png 1186w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig2_openredirect-300x189.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig2_openredirect-1024x646.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig2_openredirect-768x484.png 768w\" sizes=\"auto, (max-width: 1186px) 100vw, 1186px\"><\/p>\n<p><em>Figure 2. Sample phishing email masquerading as an Office 365 notification<\/em><\/p>\n<p>Once recipients hover their cursor over the link or button in the email, they are shown the full URL. However, since the actors set up open redirect links using a legitimate service, users see a legitimate domain name that is likely associated with a company they know and trust. We believe that attackers abuse this open and reputable platform to attempt evading detection while redirecting potential victims to phishing sites.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-96165\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig3_openredirect.png\" alt=\"Screenshot of email showing open redirector link when mouse is hovered the link in the email\" width=\"1573\" height=\"1086\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig3_openredirect.png 1573w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig3_openredirect-300x207.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig3_openredirect-1024x707.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig3_openredirect-768x530.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig3_openredirect-1536x1060.png 1536w\" sizes=\"auto, (max-width: 1573px) 100vw, 1573px\"><\/p>\n<p><em>Figure 3. Hover tip showing an open redirect link with a legitimate domain and phishing link in the URL parameters<\/em><\/p>\n<p>The final domains used in the campaigns observed during this period mostly follow a specific domain-generation algorithm (DGA) pattern and use .xyz and .club TLDs. The \u201cRe-view invitation\u201d button in Figure 3 points to a URL with a trusted domain followed by parameters, with the actor-controlled domain (c-hi[.]xyz) hidden in plain sight.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-96186\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig4a_openredirect.png\" alt width=\"900\" height=\"195\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig4a_openredirect.png 900w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig4a_openredirect-300x65.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig4a_openredirect-768x166.png 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\"><\/p>\n<p><em>Figure 4. The actor-controlled domain uses a DGA pattern and a .XYZ top-level domain<\/em><\/p>\n<p>In August, we detected a fresh spam run from this campaign that used a slightly updated Microsoft-spoofing lure and redirect URL but leveraged the same infrastructure and redirection chain.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-96249\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/New-email-with-URL-hover-f.png\" alt width=\"768\" height=\"652\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/New-email-with-URL-hover-f.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/New-email-with-URL-hover-f-300x255.png 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\"><\/p>\n<p><em>Figure 5. Sample phishing email from a recent spam run from this phishing campaign<\/em><\/p>\n<p>These crafted URLs are made possible by open redirection services currently in use by legitimate organizations. Such redirection services typically allow organizations to send out campaign emails with links that redirect to secondary domains from their own domains. For example, a hotel might use open redirects to take email recipients to a third-party booking website, while still using their primary domain in links embedded in their campaign emails.<\/p>\n<p>Attackers abuse this functionality by redirecting to their own malicious infrastructure, while still maintaining the legitimate domain in the full URL. The organizations whose open redirects are being abused are possibly unaware that this is even occurring.<\/p>\n<h2>Redirecting to phishing pages<\/h2>\n<p>Users who clicked one of the crafted redirect links are sent to a page in attacker-owned infrastructure. These pages used Google reCAPTCHA services to possibly evade attempts at dynamically scanning and checking the contents of the page, preventing some analysis systems from advancing to the actual phishing page.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-96171\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig5_openredirect.png\" alt=\"Screenshot of landing page with CAPTCHA challenge\" width=\"1282\" height=\"435\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig5_openredirect.png 1282w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig5_openredirect-300x102.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig5_openredirect-1024x347.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig5_openredirect-768x261.png 768w\" sizes=\"auto, (max-width: 1282px) 100vw, 1282px\"><\/p>\n<p><em>Figure 6. reCAPTCHA service used by phishing page<\/em><\/p>\n<p>Upon completion of the CAPTCHA verification, the user is shown a site that impersonates a legitimate service, such as Microsoft Office 365, which asks the user for their password. The site is prepopulated with the recipient\u2019s email address to add legitimacy to the request. This technique leverages familiar single sign-on (SSO) behavior to trick users into keying in corporate credentials or other credentials associated with the email address.<\/p>\n<p>To do this, attackers send unique URLs to each recipient with PHP parameters that cause tailored information to render in the phishing page. In some instances, phishing pages are specially crafted to include company logos and other branding tied to the recipient\u2019s domain.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-96174\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig6_openredirect.png\" alt=\"Screenshnot of phishing page\" width=\"1867\" height=\"936\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig6_openredirect.png 1867w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig6_openredirect-300x150.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig6_openredirect-1024x513.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig6_openredirect-768x385.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig6_openredirect-1536x770.png 1536w\" sizes=\"auto, (max-width: 1867px) 100vw, 1867px\"><\/p>\n<p><em>Figure 7. Fake sign-in page prefilled with the recipient email address alongside a fake error message prompting users to re-enter their passwords<\/em><\/p>\n<p>If the user enters their password, the page refreshes and displays an error message stating that the page timed out or the password was incorrect and that they must enter their password again. This is likely done to get the user to enter their password twice, allowing attackers to ensure they obtain the correct password.<\/p>\n<p>Once the user enters their password a second time, the page directs to a legitimate Sophos website that claims the email message has been released. This adds another layer of false legitimacy to the phishing campaign.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-96177\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig7_openredirect.png\" alt=\"Screenshot of legitimate website that phishing page redirects to\" width=\"1615\" height=\"556\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig7_openredirect.png 1615w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig7_openredirect-300x103.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig7_openredirect-1024x353.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig7_openredirect-768x264.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/08\/Fig7_openredirect-1536x529.png 1536w\" sizes=\"auto, (max-width: 1615px) 100vw, 1615px\"><\/p>\n<p><em>Figure 8. Legitimate Sophos page displayed after users re-enter their passwords<\/em><\/p>\n<h2>Tracking attacker-controlled domains<\/h2>\n<p>Some of the domains used this campaign include the following:<\/p>\n<ul>\n<li>c-tl[.]xyz<\/li>\n<li>a-cl[.]xyz<\/li>\n<li>j-on[.]xyz<\/li>\n<li>p-at[.]club<\/li>\n<li>i-at[.]club<\/li>\n<li>f-io[.]online<\/li>\n<\/ul>\n<p>For the observed campaigns, the sender infrastructure was fairly unique and notable as the actors used a wide variety of sender domains, with most of the domains having at least one of the following characteristics:<\/p>\n<ul>\n<li>Free email domains<\/li>\n<li>Compromised legitimate domains<\/li>\n<li>Domains ending in <em>.co.jp<\/em><\/li>\n<li>Attacker-owned DGA domains<\/li>\n<\/ul>\n<p>Many of the final domains hosting the phishing pages follow a specific DGA pattern:<\/p>\n<ul>\n<li><em>[letter]-[letter][letter].xyz <\/em><\/li>\n<li><em>[letter]-[letter][letter].club<\/em><\/li>\n<\/ul>\n<p>The free email domains span a wide variety of ccTLDs, such as:<\/p>\n<ul>\n<li>de<\/li>\n<li>com.mx<\/li>\n<li>com.au<\/li>\n<li>ca<\/li>\n<\/ul>\n<p>The attacker-owned DGA domains follow a few distinct patterns, including:<\/p>\n<ul>\n<li><em>[word or string of characters]-[word][number], incrementing by one, for example: masihtidur-shoes08[.]com <\/em><\/li>\n<li><em>[number][word or string of characters]-[number], incrementing by one, for example: 23moesian-17[.]com<\/em><\/li>\n<li><em>[word][word][number], incrementing by one, for example: notoficationdeliveryamazon10[.]com<\/em><\/li>\n<li><em>[word or letters][number]-[number], incrementing by one, for example: dak12shub-3[.]com<\/em><\/li>\n<\/ul>\n<p>While these are the most prevalent patterns observed by Microsoft security researchers, over 350 unique domains have been observed during these campaigns.<\/p>\n<h2>How Microsoft Defender for Office 365 protects against modern email threats<\/h2>\n<p>The abuse of open redirectors represents an ongoing threat that Microsoft experts constantly monitor, along with other threat trends and attacker techniques used in attacks today. Microsoft\u2019s breadth of visibility into threats combined with our deep understanding of how attackers operate will continue to inform the advanced protection delivered by <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/office-365-defender\">Microsoft Defender for Office 365<\/a> &nbsp;against email-based attacks.<\/p>\n<p>For mitigations against the abuse of open redirector links via known third-party platforms or services, users are advised to follow the recommended best practices of their service providers, such as updating to the latest software version, if applicable, to prevent their domains from being abused in future phishing attempts.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/office-365-defender\">Microsoft Defender for Office 365<\/a> protects customers from this threat by leverages its deep visibility into email threats and advanced detection technologies powered by AI and machine learning. We strongly recommend that organizations configure <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/recommended-settings-for-eop-and-office365?view=o365-worldwide\">recommended settings in Microsoft Defender for Office 365<\/a>, such as applying anti-phishing, <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/set-up-safe-links-policies?view=o365-worldwide\">Safe Links<\/a>, and <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/set-up-safe-attachments-policies?view=o365-worldwide\">Safe Attachments<\/a> policies. We also recommend installing the <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/enable-the-report-message-add-in?view=o365-worldwide\">Report Message add-in for Outlook<\/a> to enable users to report suspicious messages to their security teams and optionally to Microsoft.<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/attack-simulator?view=o365-worldwide\">Attack simulation<\/a> lets organizations run realistic, yet safe, simulated phishing and password attack campaigns in your organization. These simulated attacks can help identify and find vulnerable users before a real attack makes a real impact.<\/p>\n<p>Investigation capabilities in <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/security\/microsoft-365-defender\">Microsoft Defender 365<\/a> allows organizations to respond phishing and other email-based attacks. Microsoft 365 Defender correlates signals from emails and other domains to deliver coordinated defense. &nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/security\/endpoint-defender\">Microsoft Defender for Endpoint blocks<\/a> malicious files and other malware as well as malicious behavior that result from initial access via email. <a href=\"https:\/\/docs.microsoft.com\/en-us\/deployedge\/microsoft-edge-security-smartscreen\">Microsoft Defender SmartScreen<\/a> integrates with Microsoft Edge to block malicious websites, including phishing sites, scam sites, and other malicious sites, while <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/network-protection?view=o365-worldwide\">Network protection<\/a> blocks connections to&nbsp; malicious domains and IP addresses.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/office-365-defender\">Learn how you can stop credential phishing and other email threats through comprehensive, industry-leading protection with Microsoft Defender for Office 365<\/a>.<\/p>\n<p><strong><em>&nbsp;<\/em><\/strong><em>Microsoft 365 Defender Threat Intelligence Team<\/em><\/p>\n<h2>Advanced hunting queries<\/h2>\n<p>To locate possible credential phishing activity, run the following advanced hunting queries in Microsoft 365 Defender.<\/p>\n<p><strong>Open redirect URLs in t-dot format<\/strong><\/p>\n<p>Find URLs in emails with a leading \u201ct\u201d, indicating possible open redirect URLs. Note: the use of a redirector URL does not necessitate malicious behavior. You must verify whether the emails surfaced via this AHQ are legitimate or malicious.<\/p>\n<p><code>EmailUrlInfo<br \/>| where Url matches regex @\"s?\\:\\\/\\\/(?:www\\.)?t\\.(?:[\\w\\-\\.]+\\\/+)+(?:r|redirect)\\\/?\\?\"<\/code><\/p>\n<p><strong>Open redirect URLs pointing to attacker infrastructure<\/strong><\/p>\n<p>Find URLs in emails possibly crafted to redirect to attacker-controlled URLs.<\/p>\n<p><code>EmailUrlInfo<br \/>\/\/This regex narrows in on emails that contain the known malicious domain pattern in the URL from the most recent campaigns<br \/>| where Url matches regex @\"^[a-zA-Z]\\-[a-zA-Z]{2}\\.(xyz|club|shop|online)\"<br \/><\/code><\/p>\n<h2>Indicators of compromise<\/h2>\n<p>Following is a list of domains that match the DGA pattern used in sender addresses in this and other malicious campaigns. Note that these have not all been observed in mail flow related to this campaign.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"208\">masihtidur-shoes08[.]com<\/td>\n<td width=\"208\">masihtidur-shoes07[.]com<\/td>\n<td width=\"208\">masihtidur-shoes04[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">masihtidur-shoes02[.]com<\/td>\n<td width=\"208\">masihtidur-shoes01[.]com<\/td>\n<td width=\"208\">wixclwardwual-updates9[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">wixclwardwual-updates8[.]com<\/td>\n<td width=\"208\">wixclwardwual-updates7[.]com<\/td>\n<td width=\"208\">wixclwardwual-updates6[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">wixclwardwual-updates5[.]com<\/td>\n<td width=\"208\">wixclwardwual-updates10[.]com<\/td>\n<td width=\"208\">wixclwardwual-updates1[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">zxcsaxb-good8[.]com<\/td>\n<td width=\"208\">zxcsaxb-good6[.]com<\/td>\n<td width=\"208\">zxcsaxb-good5[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">zxcsaxb-good4[.]com<\/td>\n<td width=\"208\">zxcsaxb-good3[.]com<\/td>\n<td width=\"208\">zxcsaxb-good10[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">trashxn-euyr9[.]com<\/td>\n<td width=\"208\">trashxn-euyr7[.]com<\/td>\n<td width=\"208\">trashxn-euyr6[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">trashxn-euyr5[.]com<\/td>\n<td width=\"208\">trashxn-euyr3[.]com<\/td>\n<td width=\"208\">trashxn-euyr20[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">trashxn-euyr2[.]com<\/td>\n<td width=\"208\">trashxn-euyr19[.]com<\/td>\n<td width=\"208\">trashxn-euyr18[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">trashxn-euyr17[.]com<\/td>\n<td width=\"208\">trashxn-euyr16[.]com<\/td>\n<td width=\"208\">trashxn-euyr15[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">trashxn-euyr14[.]com<\/td>\n<td width=\"208\">trashxn-euyr12[.]com<\/td>\n<td width=\"208\">trashxn-euyr11[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">trashxn-euyr10[.]com<\/td>\n<td width=\"208\">trashxn-euyr1[.]com<\/td>\n<td width=\"208\">berangberang-9[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">berangberang-7[.]com<\/td>\n<td width=\"208\">berangberang-12[.]com<\/td>\n<td width=\"208\">berangberang-6[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">notoficationdeliveryamazon8[.]com<\/td>\n<td width=\"208\">berangberang-8[.]com<\/td>\n<td width=\"208\">berangberang-3[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">berangberang-4[.]com<\/td>\n<td width=\"208\">berangberang-10[.]com<\/td>\n<td width=\"208\">berangberang-11[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">berangberang-13[.]com<\/td>\n<td width=\"208\">berangberang-5[.]com<\/td>\n<td width=\"208\">77support-update23-4[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">posher876ffffff-30[.]com<\/td>\n<td width=\"208\">posher876ffffff-5[.]com<\/td>\n<td width=\"208\">posher876ffffff-25[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">fenranutc0x24ai-11[.]com<\/td>\n<td width=\"208\">organix-xtc21[.]com<\/td>\n<td width=\"208\">fenranutc0x24ai-13[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">fenranutc0x24ai-4[.]com<\/td>\n<td width=\"208\">fenranutc0x24ai-17[.]com<\/td>\n<td width=\"208\">fenranutc0x24ai-18[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">adminsecurity102[.]com<\/td>\n<td width=\"208\">adminsecurity101[.]com<\/td>\n<td width=\"208\">23moesian-17[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">23moesian-10[.]com<\/td>\n<td width=\"208\">23moesian-11[.]com<\/td>\n<td width=\"208\">23moesian-26[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">23moesian-19[.]com<\/td>\n<td width=\"208\">23moesian-2[.]com<\/td>\n<td width=\"208\">cokils2ptys-3[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">cokils2ptys-1[.]com<\/td>\n<td width=\"208\">23moesian-20[.]com<\/td>\n<td width=\"208\">23moesian-15[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">23moesian-18[.]com<\/td>\n<td width=\"208\">23moesian-16[.]com<\/td>\n<td width=\"208\">sux71a37-net19[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">sux71a37-net1[.]com<\/td>\n<td width=\"208\">sux71a37-net25[.]com<\/td>\n<td width=\"208\">sux71a37-net14[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">sux71a37-net18[.]com<\/td>\n<td width=\"208\">sux71a37-net15[.]com<\/td>\n<td width=\"208\">sux71a37-net12[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">sux71a37-net13[.]com<\/td>\n<td width=\"208\">sux71a37-net20[.]com<\/td>\n<td width=\"208\">sux71a37-net11[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">sux71a37-net27[.]com<\/td>\n<td width=\"208\">sux71a37-net2[.]com<\/td>\n<td width=\"208\">sux71a37-net21[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">bimspelitskalix-xuer9[.]com<\/td>\n<td width=\"208\">account-info005[.]com<\/td>\n<td width=\"208\">irformainsition0971a8-net16[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">bas9oiw88remnisn-12[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-27[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-26[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">bas9oiw88remnisn-11[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-10[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-5[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">bas9oiw88remnisn-13[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-1[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-7[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">bas9oiw88remnisn-3[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-20[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-8[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">bas9oiw88remnisn-23[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-24[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-4[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">bas9oiw88remnisn-25[.]com<\/td>\n<td width=\"208\">romanseyilefreaserty0824r-2[.]com<\/td>\n<td width=\"208\">romanseyilefreaserty0824r-1[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">sux71a37-net26[.]com<\/td>\n<td width=\"208\">sux71a37-net10[.]com<\/td>\n<td width=\"208\">sux71a37-net17[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">maills-activitymove02[.]com<\/td>\n<td width=\"208\">maills-activitymove04[.]com<\/td>\n<td width=\"208\">solution23-servviue-26[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">maills-activitymove01[.]com<\/td>\n<td width=\"208\">copris7-yearts-6[.]com<\/td>\n<td width=\"208\">copris7-yearts-9[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">copris7-yearts-5[.]com<\/td>\n<td width=\"208\">copris7-yearts-8[.]com<\/td>\n<td width=\"208\">copris7-yearts-37[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">securityaccount102[.]com<\/td>\n<td width=\"208\">copris7-yearts-4[.]com<\/td>\n<td width=\"208\">copris7-yearts-40[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">copris7-yearts-7[.]com<\/td>\n<td width=\"208\">copris7-yearts-38[.]com<\/td>\n<td width=\"208\">copris7-yearts-39[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">romanseyilefreaserty0824r-6[.]com<\/td>\n<td width=\"208\">rick845ko-3[.]com<\/td>\n<td width=\"208\">rick845ko-2[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">rick845ko-10[.]com<\/td>\n<td width=\"208\">fasttuamz587-4[.]com<\/td>\n<td width=\"208\">winb2as-wwersd76-19[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">winb2as-wwersd76-4[.]com<\/td>\n<td width=\"208\">winb2as-wwersd76-6[.]com<\/td>\n<td width=\"208\">org77supp-minty662-8[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">winb2as-wwersd76-18[.]com<\/td>\n<td width=\"208\">winb2as-wwersd76-1[.]com<\/td>\n<td width=\"208\">winb2as-wwersd76-10[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">org77supp-minty662-9[.]com<\/td>\n<td width=\"208\">winb2as-wwersd76-12[.]com<\/td>\n<td width=\"208\">winb2as-wwersd76-20[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">account-info003[.]com<\/td>\n<td width=\"208\">account-info012[.]com<\/td>\n<td width=\"208\">account-info002[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">laser9078-ter17[.]com<\/td>\n<td width=\"208\">account-info011[.]com<\/td>\n<td width=\"208\">account-info007[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">notoficationdeliveryamazon1[.]com<\/td>\n<td width=\"208\">notoficationdeliveryamazon20[.]com<\/td>\n<td width=\"208\">notoficationdeliveryamazon7[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">notoficationdeliveryamazon17[.]com<\/td>\n<td width=\"208\">notoficationdeliveryamazon12[.]com<\/td>\n<td width=\"208\">contackamazon1[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">notoficationdeliveryamazon6[.]com<\/td>\n<td width=\"208\">notoficationdeliveryamazon5[.]com<\/td>\n<td width=\"208\">notoficationdeliveryamazon4[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">notoficationdeliveryamazon18[.]com<\/td>\n<td width=\"208\">notoficationdeliveryamazon13[.]com<\/td>\n<td width=\"208\">notoficationdeliveryamazon3[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">notoficationdeliveryamazon14[.]com<\/td>\n<td width=\"208\">gaplerr-xt5[.]com<\/td>\n<td width=\"208\">posher876ffffff-29[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">kenatipurecehkali-xt3[.]com<\/td>\n<td width=\"208\">kenatipurecehkali-xt13[.]com<\/td>\n<td width=\"208\">kenatipurecehkali-xt4[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">kenatipurecehkali-xt12[.]com<\/td>\n<td width=\"208\">kenatipurecehkali-xt5[.]com<\/td>\n<td width=\"208\">wtbwts-junet1[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">kenatipurecehkali-xt6[.]com<\/td>\n<td width=\"208\">hayalanphezor-2sit[.]com<\/td>\n<td width=\"208\">hayalanphezor-1sit[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">noticesumartyas-sc24[.]com<\/td>\n<td width=\"208\">noticesumartyas-sc13[.]com<\/td>\n<td width=\"208\">noticesumartyas-sc2[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">noticesumartyas-sc17[.]com<\/td>\n<td width=\"208\">noticesumartyas-sc22[.]com<\/td>\n<td width=\"208\">noticesumartyas-sc5[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">noticesumartyas-sc4[.]com<\/td>\n<td width=\"208\">noticesumartyas-sc21[.]com<\/td>\n<td width=\"208\">noticesumartyas-sc25[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">appgetbox3[.]com<\/td>\n<td width=\"208\">notoficationdeliveryamazon19[.]com<\/td>\n<td width=\"208\">notoficationdeliveryamazon10[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">appgetbox9[.]com<\/td>\n<td width=\"208\">appgetbox8[.]com<\/td>\n<td width=\"208\">appgetbox6[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">notoficationdeliveryamazon2[.]com<\/td>\n<td width=\"208\">appgetbox7[.]com<\/td>\n<td width=\"208\">appgetbox5[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">notoficationdeliveryamazon23[.]com<\/td>\n<td width=\"208\">appgetbox10[.]com<\/td>\n<td width=\"208\">notoficationdeliveryamazon16[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">hvgjgj-shoes08[.]com<\/td>\n<td width=\"208\">hvgjgj-shoes13[.]com<\/td>\n<td width=\"208\">jgkxjhx-shoes09[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">hvgjgj-shoes15[.]com<\/td>\n<td width=\"208\">hvgjgj-shoes16[.]com<\/td>\n<td width=\"208\">hvgjgj-shoes18[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">hvgjgj-shoes20[.]com<\/td>\n<td width=\"208\">hvgjgj-shoes12[.]com<\/td>\n<td width=\"208\">jgkxjhx-shoes02[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">hvgjgj-shoes10[.]com<\/td>\n<td width=\"208\">jgkxjhx-shoes03[.]com<\/td>\n<td width=\"208\">hvgjgj-shoes11[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">hvgjgj-shoes14[.]com<\/td>\n<td width=\"208\">jgkxjhx-shoes05[.]com<\/td>\n<td width=\"208\">jgkxjhx-shoes04[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">hvgjgj-shoes19[.]com<\/td>\n<td width=\"208\">jgkxjhx-shoes08[.]com<\/td>\n<td width=\"208\">hpk02h21yyts-6[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">romanseyilefreaserty0824r-7[.]com<\/td>\n<td width=\"208\">gets25-amz[.]net<\/td>\n<td width=\"208\">gets30-amz[.]net<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">gets27-amz[.]net<\/td>\n<td width=\"208\">gets28-amz[.]net<\/td>\n<td width=\"208\">gets29-amz[.]net<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">gets32-amz[.]net<\/td>\n<td width=\"208\">gets3-amz[.]net<\/td>\n<td width=\"208\">gets31-amz[.]net<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">noticesumartyas-sc19[.]com<\/td>\n<td width=\"208\">noticesumartyas-sc23[.]com<\/td>\n<td width=\"208\">noticesumartyas-sc18[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">noticesumartyas-sc15[.]com<\/td>\n<td width=\"208\">noticesumartyas-sc20[.]com<\/td>\n<td width=\"208\">noticesumartyas-sc16[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">noticesumartyas-sc29[.]com<\/td>\n<td width=\"208\">rick845ko-1[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-9[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">rick845ko-5[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-21[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-2[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">bas9oiw88remnisn-19[.]com<\/td>\n<td width=\"208\">rick845ko-6[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-22[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">bas9oiw88remnisn-17[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-16[.]com<\/td>\n<td width=\"208\">adminmabuk103[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">account-info008[.]com<\/td>\n<td width=\"208\">suppamz2-piryshj01-3[.]com<\/td>\n<td width=\"208\">dak12shub-1[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">securemanageprodio-02[.]com<\/td>\n<td width=\"208\">securemanageprodio-05[.]com<\/td>\n<td width=\"208\">securemanageprodio-01[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">dak12shub-3[.]com<\/td>\n<td width=\"208\">dak12shub-9[.]com<\/td>\n<td width=\"208\">dak12shub-8[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">dak12shub-6[.]com<\/td>\n<td width=\"208\">dak12shub-10[.]com<\/td>\n<td width=\"208\">dak12shub-4[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">securemanageprodio-03[.]com<\/td>\n<td width=\"208\">org77supp-minty662-7[.]com<\/td>\n<td width=\"208\">winb2as-wwersd76-7[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">org77supp-minty662-10[.]com<\/td>\n<td width=\"208\">bimspelitskalix-xuer2[.]com<\/td>\n<td width=\"208\">gets34-amz[.]net<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">gets35-amz[.]net<\/td>\n<td width=\"208\">service-account-7254[.]com<\/td>\n<td width=\"208\">service-account-76357[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">service-account-7247[.]com<\/td>\n<td width=\"208\">account-info004[.]com<\/td>\n<td width=\"208\">service-account-5315[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">bas9oiw88remnisn-14[.]com<\/td>\n<td width=\"208\">solution23-servviue-23[.]com<\/td>\n<td width=\"208\">organix-xtc18[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">romanseyilefreaserty0824r-4[.]com<\/td>\n<td width=\"208\">hayalanphezor-7sit[.]com<\/td>\n<td width=\"208\">bimspelitskalix-xuer7[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">securemanageprodio-04[.]com<\/td>\n<td width=\"208\">solution23-servviue-15[.]com<\/td>\n<td width=\"208\">solution23-servviue-1[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">suppamz2-piryshj01-9[.]com<\/td>\n<td width=\"208\">suppamz2-piryshj01-6[.]com<\/td>\n<td width=\"208\">solution23-servviue-25[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">solution23-servviue-7[.]com<\/td>\n<td width=\"208\">solution23-servviue-16[.]com<\/td>\n<td width=\"208\">solution23-servviue-11[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">solution23-servviue-27[.]com<\/td>\n<td width=\"208\">romanseyilefreaserty0824r-5[.]com<\/td>\n<td width=\"208\">cokils2ptys-6[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">solution23-servviue-9[.]com<\/td>\n<td width=\"208\">solution23-servviue-19[.]com<\/td>\n<td width=\"208\">solution23-servviue-8[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">solution23-servviue-17[.]com<\/td>\n<td width=\"208\">solution23-servviue-18[.]com<\/td>\n<td width=\"208\">suppamz2-piryshj01-1[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">solution23-servviue-30[.]com<\/td>\n<td width=\"208\">solution23-servviue-13[.]com<\/td>\n<td width=\"208\">solution23-servviue-12[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">solution23-servviue-10[.]com<\/td>\n<td width=\"208\">solution23-servviue-4[.]com<\/td>\n<td width=\"208\">solution23-servviue-20[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">solution23-servviue-24[.]com<\/td>\n<td width=\"208\">solution23-servviue-5[.]com<\/td>\n<td width=\"208\">solution23-servviue-14[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">service-account-7243[.]com<\/td>\n<td width=\"208\">service-account-735424[.]com<\/td>\n<td width=\"208\">service-account-8457845[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">service-account-374567[.]com<\/td>\n<td width=\"208\">service-account-764246[.]com<\/td>\n<td width=\"208\">service-account-762441[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">gxnhfghnjzh809[.]com<\/td>\n<td width=\"208\">xcfhjxfyxnhnjzh10[.]com<\/td>\n<td width=\"208\">accountservicealert002[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">accountservicealert003[.]com<\/td>\n<td width=\"208\">care887-yyrtconsumer23-24[.]com<\/td>\n<td width=\"208\">bas9oiw88remnisn-15[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">care887-yyrtconsumer23-23[.]com<\/td>\n<td width=\"208\">care887-yyrtconsumer23-27[.]com<\/td>\n<td width=\"208\">care887-yyrtconsumer23-25[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">care887-yyrtconsumer23-26[.]com<\/td>\n<td width=\"208\">laser9078-ter11[.]com<\/td>\n<td width=\"208\">bimspelitskalix-xuer6[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">laser9078-ter10[.]com<\/td>\n<td width=\"208\">hayalanphezor-6sit[.]com<\/td>\n<td width=\"208\">hayalanphezor-4sit[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">hayalanphezor-3sit[.]com<\/td>\n<td width=\"208\">romanseyilefreaserty0824r-3[.]com<\/td>\n<td width=\"208\">solution23-servviue-6[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">ressstauww-6279-3[.]com<\/td>\n<td width=\"208\">ressstauww-6279-10[.]com<\/td>\n<td width=\"208\">sytesss-tas7[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">ressstauww-6279-7[.]com<\/td>\n<td width=\"208\">ressstauww-6279-1[.]com<\/td>\n<td width=\"208\">hvgjgj-shoes01[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">ketiak-muser14[.]com<\/td>\n<td width=\"208\">ketiak-muser13[.]com<\/td>\n<td width=\"208\">ketiak-muser15[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">spammer-comingson01[.]com<\/td>\n<td width=\"208\">spammer-comingson02[.]com<\/td>\n<td width=\"208\">spammer-comingson04[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">spammer-comingson05[.]com<\/td>\n<td width=\"208\">spammer-comingson07[.]com<\/td>\n<td width=\"208\">posidma-posidjar01[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">posidma-posidjar03[.]com<\/td>\n<td width=\"208\">posidma-posidjar05[.]com<\/td>\n<td width=\"208\">posidma-posidjar06[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">tembuslah-bandar01[.]com<\/td>\n<td width=\"208\">tembuslah-bandar02[.]com<\/td>\n<td width=\"208\">tembuslah-bandar03[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">tembuslah-bandar04[.]com<\/td>\n<td width=\"208\">tembuslah-bandar05[.]com<\/td>\n<td width=\"208\">tembuslah-bandar06[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">tembuslah-bandar07[.]com<\/td>\n<td width=\"208\">tembuslah-bandar08[.]com<\/td>\n<td width=\"208\">tembuslah-bandar09[.]com<\/td>\n<\/tr>\n<tr>\n<td width=\"208\">tembuslah-bandar10[.]com<\/td>\n<td width=\"208\"><\/td>\n<td width=\"208\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/08\/26\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has been actively tracking a widespread credential phishing campaign using open redirector links, which allow attackers to use a URL in a trusted domain and embed the eventual final malicious URL as a parameter.<br \/>\nThe post Widespread credential phishing campaign abuses open redirector links appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42538,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,7221,9599,188],"class_list":["post-42537","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-microsoft-security-intelligence","tag-open-redirector-links","tag-phishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Widespread credential phishing campaign abuses open redirector links 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Widespread credential phishing campaign abuses open redirector links 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-26T17:00:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/widespread-credential-phishing-campaign-abuses-open-redirector-links.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1429\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Widespread credential phishing campaign abuses open redirector links\",\"datePublished\":\"2021-08-26T17:00:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links\\\/\"},\"wordCount\":2884,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links.png\",\"keywords\":[\"Cybersecurity\",\"Microsoft security intelligence\",\"open redirector links\",\"Phishing\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links\\\/\",\"name\":\"Widespread credential phishing campaign abuses open redirector links 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links.png\",\"datePublished\":\"2021-08-26T17:00:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links.png\",\"width\":1429,\"height\":334},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/widespread-credential-phishing-campaign-abuses-open-redirector-links\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Widespread credential phishing campaign abuses open redirector links\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Widespread credential phishing campaign abuses open redirector links 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/","og_locale":"en_US","og_type":"article","og_title":"Widespread credential phishing campaign abuses open redirector links 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-26T17:00:10+00:00","og_image":[{"width":1429,"height":334,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/widespread-credential-phishing-campaign-abuses-open-redirector-links.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Widespread credential phishing campaign abuses open redirector links","datePublished":"2021-08-26T17:00:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/"},"wordCount":2884,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/widespread-credential-phishing-campaign-abuses-open-redirector-links.png","keywords":["Cybersecurity","Microsoft security intelligence","open redirector links","Phishing"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/","url":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/","name":"Widespread credential phishing campaign abuses open redirector links 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/widespread-credential-phishing-campaign-abuses-open-redirector-links.png","datePublished":"2021-08-26T17:00:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/widespread-credential-phishing-campaign-abuses-open-redirector-links.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/widespread-credential-phishing-campaign-abuses-open-redirector-links.png","width":1429,"height":334},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/widespread-credential-phishing-campaign-abuses-open-redirector-links\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Widespread credential phishing campaign abuses open redirector links"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42537"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42537\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42538"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}