{"id":44633,"date":"2021-12-30T14:05:00","date_gmt":"2021-12-30T14:05:00","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/takedowns-prove-temporary-tactic-in-cybercrime-fight"},"modified":"2021-12-30T14:05:00","modified_gmt":"2021-12-30T14:05:00","slug":"in-the-fight-against-cybercrime-takedowns-are-only-temporary","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/","title":{"rendered":"In the Fight Against Cybercrime, Takedowns Are Only Temporary"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt224271db9ec56091\/61cc6b12e910bc2c4bf3c6fa\/botnettakedown_alamy.jpeg\" class=\"ff-og-image-inserted\"><\/div>\n<p>In November, 10 months after an international task force shut down Emotet&#8217;s servers and infrastructure, the botnet came back online.<\/p>\n<p>The new Emotet, which spread malware in a spurt of Spanish-language messages in the latter half of the month,&nbsp;consisted of two botnets using different encryption for communication and additional commands than the previous version, which was taken down in January. At the time of the takedown, the threat had accounted for <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/emotet-takedown-short-term-celebration-long-term-concerns\" target=\"_blank\" rel=\"noopener\">7% of attacks on organizations worldwide<\/a> and often delivered malware or ransomware to the 1.6 million machines compromised by attackers.<\/p>\n<p>Emotet&#8217;s revival highlightshow many botnet takedowns lack permanence. Along with the resuscitation of TrickBot in 2020, the resurgence of Emotet demonstrates that the industry and government agencies should take a hard look at whether the tactic needs to be revisited or revised, says David Monnier, a fellow with threat intelligence firm&nbsp;Team Cymru.<\/p>\n<p>&#8220;It is an incredibly valid question that we should be asking, as we do with anything: If you are not getting the results you want, should [you] be doing something different instead?&#8221; he says. &#8220;Are we getting better or is this [the movie] &#8216;Groundhog Day&#8217;?&#8221;<\/p>\n<p><strong>Temporary Disruptions<\/strong><br \/>More than a decade ago, Microsoft pioneered using legal measures to allow private companies to take down botnets. More than a score of takedowns later, multi-organizational efforts \u2014 which now often include law enforcement and private-industry partners \u2014 often only temporarily disrupt botnet infrastructures. Trickbot&#8217;s operators, for example, <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\" target=\"_blank\" rel=\"noopener\">started reviving the network within a few weeks of the initial takedown<\/a>. <\/p>\n<p>In Emotet&#8217;s case, <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/emotet-is-back-and-it-s-more-dangerous-than-before\" target=\"_blank\" rel=\"noopener\">the takedown led to a 10-month hiatus<\/a>, during which the botnet&#8217;s operators appear to have made changes, such as moving away from the increasing use of cybercriminal services for parts of the infection and payload chain, says Scott Scheferman, a principal cyber strategist at Eclypsium, a firmware- and hardware-security firm.<\/p>\n<p>&#8220;These actors have a lot of resilience and a ton of money. As a result, they can adapt easily,&#8221; he says. &#8220;They are going back to the triad of distribution, a Trickbot loader, and ransomware drop. They are pulling back into themselves centrally, rather than using everything as a service.&#8221;<\/p>\n<p>The fundamental problem for defenders is that while infrastructure can be disrupted, the people behind the attacks \u2014 often protected by complicit nations with liberal cybercrime laws \u2014 are unfettered and remain able to work to rebuild their malicious distribution networks. While the United States&#8217; and other nations&#8217; focus on more aggressive measures to curtail cybercrime, in general, and ransomware, in particular, will help, cybercrime is too profitable for many groups to pare back their operations. <\/p>\n<p>&#8220;A lot of these sophisticated actors that have become prolific \u2014 the Emotet groups and REvil groups \u2014 they are really operating out of places where the West can&#8217;t touch them,&#8221; says Michael DeBolt, chief intelligence officer of threat-intelligence firm Intel 471, adding that such downsides do not make the activity not worthwhile. &#8220;From a higher level, though, obviously disruption efforts against sophisticated groups should be the target of not just law enforcement, but also of private-industry groups.&#8221;<\/p>\n<p>In addition to taking down the infrastructure of specific actors, focusing on identifying and disrupting critical criminal&nbsp;infrastructure \u2014 such as bulletproof hosting \u2014 could also result in more long-term benefits, he adds. In 2011, for example, researchers discovered&nbsp;<a href=\"https:\/\/www.darkreading.com\/risk\/3-banks-service-majority-of-spam-driven-sales\" target=\"_blank\" rel=\"noopener\">95% of the sales revenues of spam-advertised products were handled by about a dozen banks<\/a>, which allowed financial authorities to disrupt a wide swath of criminal groups.<\/p>\n<p>Defenders and government officials need to identify similar keystones in the current cybercrime landscape. <\/p>\n<p>&#8220;What this comes down to is really identifying pain points that can increase the time, money, and effort that the cybercriminals need to do business,&#8221; DeBolt says. &#8220;If we identify a server or back-end infrastructure and we take that down, we see, great, it does not completely cut the head off the snake, but it causes them to back off a little bit and rejig, and that is time, money, and effort for them.&#8221;<\/p>\n<p><strong>Consistent Effort<\/strong><br \/>Some takedown efforts have led to success. The takedown of the Necurs botnet \u2014 which acted as a distribution platform for other malware, such as GameOver Zeus and Trickbot \u2014 appears to have largely worked. The botnet, which had gone silent and previously&nbsp;returned, largely disappeared in March 2020 following <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/bitsight-and-microsoft-disrupt-necurs-botnet\" target=\"_blank\" rel=\"noopener\">a takedown spearheaded by Microsoft and Bitsight<\/a>.<\/p>\n<p>Still, many attackers learn from such actions and return, improving their tactics, techniques, and procedures (TTPs). Fortunately, defenders and law enforcement are also getting more efficient in takedown efforts, says Team Cymru&#8217;s Monnier. While the balance currently seems to favor attackers, if disruption efforts take less time for defenders to accomplish and more time and effort for attackers to recover from, taking down servers and infrastructure \u2014 while temporary \u2014 will be worth it, he says.<\/p>\n<p>There isn&#8217;t necessarily a silver bullet or a single event that can disrupt these efforts, but consistent effort will keep up the pressure on groups and make cybercrime less profitable, the former US Marine says.<\/p>\n<p>&#8220;We have a saying in the Marine Corps: You have a choice between the pain of discipline or the pain of regret,&#8221; Monnier says. &#8220;We have to take the same approach, the same tenacity. As long as we make it harder for them, we have to do so.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/takedowns-prove-temporary-tactic-in-cybercrime-fight\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Disrupting access to servers and infrastructure continues to interfere with cybercrime activity, but it&#8217;s far from a perfect strategy.Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/takedowns-prove-temporary-tactic-in-cybercrime-fight\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-44633","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>In the Fight Against Cybercrime, Takedowns Are Only Temporary 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In the Fight Against Cybercrime, Takedowns Are Only Temporary 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-30T14:05:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt224271db9ec56091\/61cc6b12e910bc2c4bf3c6fa\/botnettakedown_alamy.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"In the Fight Against Cybercrime, Takedowns Are Only Temporary\",\"datePublished\":\"2021-12-30T14:05:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/\"},\"wordCount\":886,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt224271db9ec56091\\\/61cc6b12e910bc2c4bf3c6fa\\\/botnettakedown_alamy.jpeg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/\",\"name\":\"In the Fight Against Cybercrime, Takedowns Are Only Temporary 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt224271db9ec56091\\\/61cc6b12e910bc2c4bf3c6fa\\\/botnettakedown_alamy.jpeg\",\"datePublished\":\"2021-12-30T14:05:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt224271db9ec56091\\\/61cc6b12e910bc2c4bf3c6fa\\\/botnettakedown_alamy.jpeg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt224271db9ec56091\\\/61cc6b12e910bc2c4bf3c6fa\\\/botnettakedown_alamy.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"In the Fight Against Cybercrime, Takedowns Are Only Temporary\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"In the Fight Against Cybercrime, Takedowns Are Only Temporary 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/","og_locale":"en_US","og_type":"article","og_title":"In the Fight Against Cybercrime, Takedowns Are Only Temporary 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-30T14:05:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt224271db9ec56091\/61cc6b12e910bc2c4bf3c6fa\/botnettakedown_alamy.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"In the Fight Against Cybercrime, Takedowns Are Only Temporary","datePublished":"2021-12-30T14:05:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/"},"wordCount":886,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt224271db9ec56091\/61cc6b12e910bc2c4bf3c6fa\/botnettakedown_alamy.jpeg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/","url":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/","name":"In the Fight Against Cybercrime, Takedowns Are Only Temporary 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt224271db9ec56091\/61cc6b12e910bc2c4bf3c6fa\/botnettakedown_alamy.jpeg","datePublished":"2021-12-30T14:05:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt224271db9ec56091\/61cc6b12e910bc2c4bf3c6fa\/botnettakedown_alamy.jpeg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt224271db9ec56091\/61cc6b12e910bc2c4bf3c6fa\/botnettakedown_alamy.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/in-the-fight-against-cybercrime-takedowns-are-only-temporary\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"In the Fight Against Cybercrime, Takedowns Are Only Temporary"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44633"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44633\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}