{"id":43702,"date":"2021-11-02T22:21:53","date_gmt":"2021-11-02T22:21:53","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/attackers-flaunt-remote-access-credentials-threaten-supply-chain"},"modified":"2021-11-02T22:21:53","modified_gmt":"2021-11-02T22:21:53","slug":"attackers-flaunt-remote-access-credentials-threaten-supply-chain","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/","title":{"rendered":"Attackers Flaunt Remote Access Credentials, Threaten Supply Chain"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf4552937a0350962\/6181bb098a0585636d7149fb\/SupplyChainAlamy_sleepyfellow.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Network access brokers, the cybercriminals who trade in credentials needed to compromise corporate computers, have advertised and sold credentials for a variety of global shipping and logistics companies in the past few months, threatening the already-overburdened supply chain infrastructure.&nbsp;<\/p>\n<p>Threat intelligence firm Intel 471 reports that targeted organizations&nbsp;include a Japanese container shipping firm, trucking and transportation companies in the United States, and a logistics firm in the United Kingdom. The attackers purportedly used vulnerabilities in, or insecure configurations of, remote access infrastructure&nbsp;such as Citrix, Cisco, Fortinet, and PulseSecure virtual private network technology, as well as Microsoft&#8217;s remote desktop protocol (RDP) software.<\/p>\n<p>While the advertised credentials may not presage an attack, the fact that they are advertised in cybercriminal forums does not bode well for the companies, says Greg Otto, a security researcher with Intel 471.<\/p>\n<p>&#8220;We have seen attacks go from compromise or sale of credentials on the underground to a ransomware attack,&#8221; he says. &#8220;Not every credential sale results in an attack, but it&#8217;s never a good sign if your company is suddenly included in a cybercrime underground advertisement.&#8221;<\/p>\n<p>The global supply chain is suffering from shortages as consumer demand has skyrocketed following the coronavirus pandemic. In October, the port of Los Angeles \u2014 the gateway to manufacturers in the Asia-Pacific region \u2014&nbsp;<a href=\"https:\/\/www.bbc.com\/news\/business-58901777\" target=\"_blank\" rel=\"noopener\">moved to 24-hour operations<\/a> to try and reduce the backlog. <\/p>\n<p>Ransomware has disrupted shipping operations in the past. In 2017, the NotPetya wiper worm infected critical domain controllers at shipping conglomerate A.P. Moller Maersk, which claimed&nbsp;the resulting disruptions <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/-act-of-war-clause-could-nix-cyber-insurance-payouts\" target=\"_blank\" rel=\"noopener\">caused more than $300 million in damages<\/a>.<\/p>\n<p>Intel 471 researchers point to a late-September incident in which&nbsp;credentials for access to a Malaysian shipping company&#8217;s computers were advertised on the underground. A week later, attackers encrypted the company&#8217;s data and demanded a ransom, Intel 471&#8217;s Otto <a href=\"https:\/\/intel471.com\/blog\/shipping-companies-ransomware-credentials\" target=\"_blank\" rel=\"noopener\">wrote in a Nov. 2 blog post<\/a>.<\/p>\n<p>While these incidents indicate attackers see tempting targets in&nbsp;companies that form the backbone of the global supply chain, he says, adversaries&nbsp;don&#8217;t&nbsp;specifically prefer to&nbsp;compromise shipping and logistics companies. <\/p>\n<p>&#8220;There has not been any direct conversation that we have observed that point to RaaS [ransomware-as-a-service] crews going after shipping or logistics companies solely for the notion that it will cause further chaos in the global supply chain,&#8221; he says. &#8220;RaaS crews go after any and all targets largely for financial gain.&#8221;<\/p>\n<p>The evidence of credential sales mainly focuses on access credentials advertised for sale by various members of an underground forum. In July, for example, a new member claimed to have credentials for 50 companies,&nbsp;stolen after compromising a variety of virtual private networking appliances and software. In October, a new member in another cybercrime forum boasted about access to a score of computers in a US-based freight-forwarding firm. <\/p>\n<p>Another organization in the United Kingdom suffered an attack through its SonicWall installation, while a Bangladesh-based shipping and logistics company was compromised using a vulnerability in PulseSecure, Intel 471 claimed, based on the evidence in cybercrime forums.<\/p>\n<p>Even though attackers do not appear to be narrowly focused on compromising supply chain companies, the credential theft suggests the increase in attacks on maritime and transportation networks will continue. Since 2019, the number of cyberattacks on shipping and logistics companies has tripled, with supply chain disruptions expected to cause delays for approximately one month every four years, according to a <a href=\"https:\/\/www.bluevoyant.com\/resources\/gated-resource\/cyber-security-and-attacks-in-logistics\/\" target=\"_blank\" rel=\"noopener\">report on cybersecurity attacks on logistics firms<\/a> by security firm BlueVoyant.<\/p>\n<p>&#8220;Unfortunately, these widespread vulnerabilities are still unaddressed in a time of increased scrutiny and reliance on supply chains \u2014 as countries wait for efficient and safe vaccine distribution programs, and as entire work-from-home economies rely on global shipping more than ever,&#8221; the BlueVoyant report states.<\/p>\n<p>Both companies argue that businesses need to better protect their credentials, use additional factors of authentication, and monitor cybercrime forums to detect breaches as early as possible. <\/p>\n<p>&#8220;[G]iven that attackers like to spend time conducting reconnaissance inside corporate networks, monitoring credentials can be the first signal that a ransomware attack could be close,&#8221; Intel 471&#8217;s Otto says. &#8220;Being proactive can go a long way to thwarting a ransomware attack, so seeing your company&#8217;s credentials on the cybercrime underground should be a huge signal that something needs to be done in your network.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attackers advertise access to computers within shipping and logistics companies as the global supply chain struggles to meet post-COVID demands.Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-43702","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attackers Flaunt Remote Access Credentials, Threaten Supply Chain 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attackers Flaunt Remote Access Credentials, Threaten Supply Chain 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-02T22:21:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf4552937a0350962\/6181bb098a0585636d7149fb\/SupplyChainAlamy_sleepyfellow.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Attackers Flaunt Remote Access Credentials, Threaten Supply Chain\",\"datePublished\":\"2021-11-02T22:21:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/\"},\"wordCount\":723,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltf4552937a0350962\\\/6181bb098a0585636d7149fb\\\/SupplyChainAlamy_sleepyfellow.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/\",\"name\":\"Attackers Flaunt Remote Access Credentials, Threaten Supply Chain 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltf4552937a0350962\\\/6181bb098a0585636d7149fb\\\/SupplyChainAlamy_sleepyfellow.jpg\",\"datePublished\":\"2021-11-02T22:21:53+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltf4552937a0350962\\\/6181bb098a0585636d7149fb\\\/SupplyChainAlamy_sleepyfellow.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltf4552937a0350962\\\/6181bb098a0585636d7149fb\\\/SupplyChainAlamy_sleepyfellow.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attackers Flaunt Remote Access Credentials, Threaten Supply Chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attackers Flaunt Remote Access Credentials, Threaten Supply Chain 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/","og_locale":"en_US","og_type":"article","og_title":"Attackers Flaunt Remote Access Credentials, Threaten Supply Chain 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-02T22:21:53+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf4552937a0350962\/6181bb098a0585636d7149fb\/SupplyChainAlamy_sleepyfellow.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Attackers Flaunt Remote Access Credentials, Threaten Supply Chain","datePublished":"2021-11-02T22:21:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/"},"wordCount":723,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf4552937a0350962\/6181bb098a0585636d7149fb\/SupplyChainAlamy_sleepyfellow.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/","url":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/","name":"Attackers Flaunt Remote Access Credentials, Threaten Supply Chain 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf4552937a0350962\/6181bb098a0585636d7149fb\/SupplyChainAlamy_sleepyfellow.jpg","datePublished":"2021-11-02T22:21:53+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf4552937a0350962\/6181bb098a0585636d7149fb\/SupplyChainAlamy_sleepyfellow.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltf4552937a0350962\/6181bb098a0585636d7149fb\/SupplyChainAlamy_sleepyfellow.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/attackers-flaunt-remote-access-credentials-threaten-supply-chain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Attackers Flaunt Remote Access Credentials, Threaten Supply Chain"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43702"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43702\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}