{"id":45130,"date":"2022-02-03T16:20:30","date_gmt":"2022-02-03T16:20:30","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33069\/Wormhole-Blockchain-Bridge-Taken-For-More-Than-300-Million.html"},"modified":"2022-02-03T16:20:30","modified_gmt":"2022-02-03T16:20:30","slug":"wormhole-blockchain-bridge-taken-for-more-than-300-million","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/","title":{"rendered":"Wormhole Blockchain Bridge Taken For More Than $300 Million"},"content":{"rendered":"<div>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/cdn.scmagazine.com\/wp-content\/uploads\/2020\/07\/GettyImages-934468608-e1595535419176-1024x614.jpg\" alt class=\"wp-image-106339\"><figcaption>A technician inspects the backside of a cryptocurrency mining farm ein Saint Hyacinthe, Quebec. Wormhole, a popular bridge to move cryptocurrency from one blockchain to another, saw approximately $325 million stolen by hacker. (LARS HAGBERG\/AFP via Getty Images)<\/figcaption><\/figure>\n<\/div>\n<p>Wormhole, a popular bridge to move cryptocurrency from one blockchain to another, saw 120,000 Ether \u2014 approximately $325 million \u2014 stolen by hackers in a move that could destabilize the bridge.<\/p>\n<p>&#8220;The wormhole network was exploited for 120k wETH [Wormhole Ether]. ETH will be added over the next hours to ensure wETH is backed 1:1. More details to come shortly,&#8221; <a href=\"https:\/\/twitter.com\/wormholecrypto\/status\/1489001949881978883\">tweeted Wormhole<\/a> at 5:30 pm ET. &#8220;ETH will be added over the next hours to ensure wETH is backed 1:1&#8221;<\/p>\n<p>Wormhole shut down service to investigate. Two hours later, Wormhole followed up with a tweet saying <a href=\"https:\/\/twitter.com\/wormholecrypto\/status\/1489036273012682753\">the vulnerability had been patched<\/a>. What the vulnerability had been remains unclear.<\/p>\n<p>The popular bridge allows interoperability between the Ether and Solana blockchains through smart contracts. But the value is contingent on holding the assets on both chains to back each other in a one-to-one ratio.<\/p>\n<p>If the assets disappear, \u201cthere are no assets backing the cross-chain token, and then the token no longer has any value. The cross-chain token is of the asset on the other chain. So essentially, it makes the wrap tokens worthless,&#8221; said Max Galka, CEO of the blockchain forensics firm Elementus.<\/p>\n<p>Galka said that replacing $325 million in Ether would be complicated without negotiating the return of the stolen funds; it would be a lot of coins to try to purchase in a short period. It would amount to 3.5% of the daily volume of Ether transactions.<\/p>\n<p>But, he added, laundering $325 million in cryptocurrency in a way that would allow the criminals to cash out without being caught would be extremely difficult.<\/p>\n<p>&#8220;I would not immediately assume that the funds are completely gone,&#8221; he said. &#8220;That these days it is not trivial to be able to cash out crypto in this size. There have been a lot of cases recently where the funds have been returned.&#8221;<\/p>\n<p>Galka noted that the first transactions on the criminal wallets took place Tuesday morning and were from the anonymization service Tornado cash, meaning the thieves had at minimum experimented with one such service. Mixers are not, however, designed to handle hundreds of millions of dollars in funds at a time.<\/p>\n<p>In <a href=\"https:\/\/www.scmagazine.com\/analysis\/cybercrime\/what-can-we-learn-from-the-poly-network-cryptocurrency-heist\">several recent cases<\/a>, large cryptocurrency and DeFi services have been able to negotiate the return of funds with an attacker for a reduced rate after exchanges, coins and other services agree not to accept the stolen loot.<\/p>\n<p>The long-term prospects of bridges have been questioned before. Vitalik Buterin, creator of Ethereum, argued last month that it was always safer to hold coins on a <a href=\"https:\/\/twitter.com\/VitalikButerin\/status\/1479501366192132099?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1479501366192132099%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fwww.coindesk.com%2Ftech%2F2022%2F02%2F02%2Fblockchain-bridge-wormhole-suffers-possible-exploit-worth-over-250m%2F\">specific cryptocurrency blockchain rather than a bridge<\/a> due to the potential of instability of either of the two currencies.<\/p>\n<p>&#8220;I don&#8217;t think that these bridges are really the future of crypto and are viable long term for really just this reason,\u201d said Galka. \u201cHolding ether on the Ethereum blockchain is quite secure. Holding Solana on the Solana blockchain is quite secure. But once you get into these, these cross chain assets, you run all sorts of different risks.&#8221;<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33069\/Wormhole-Blockchain-Bridge-Taken-For-More-Than-300-Million.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45131,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[1460],"class_list":["post-45130","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackercybercrimedata-lossfraudcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wormhole Blockchain Bridge Taken For More Than $300 Million 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wormhole Blockchain Bridge Taken For More Than $300 Million 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-03T16:20:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.scmagazine.com\/wp-content\/uploads\/2020\/07\/GettyImages-934468608-e1595535419176-1024x614.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Wormhole Blockchain Bridge Taken For More Than $300 Million\",\"datePublished\":\"2022-02-03T16:20:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million\\\/\"},\"wordCount\":541,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million.jpg\",\"keywords\":[\"headline,hacker,cybercrime,data loss,fraud,cryptography\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million\\\/\",\"name\":\"Wormhole Blockchain Bridge Taken For More Than $300 Million 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million.jpg\",\"datePublished\":\"2022-02-03T16:20:30+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million.jpg\",\"width\":1024,\"height\":614},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wormhole-blockchain-bridge-taken-for-more-than-300-million\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,cybercrime,data loss,fraud,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackercybercrimedata-lossfraudcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Wormhole Blockchain Bridge Taken For More Than $300 Million\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wormhole Blockchain Bridge Taken For More Than $300 Million 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/","og_locale":"en_US","og_type":"article","og_title":"Wormhole Blockchain Bridge Taken For More Than $300 Million 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-03T16:20:30+00:00","og_image":[{"url":"https:\/\/cdn.scmagazine.com\/wp-content\/uploads\/2020\/07\/GettyImages-934468608-e1595535419176-1024x614.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Wormhole Blockchain Bridge Taken For More Than $300 Million","datePublished":"2022-02-03T16:20:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/"},"wordCount":541,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/wormhole-blockchain-bridge-taken-for-more-than-300-million.jpg","keywords":["headline,hacker,cybercrime,data loss,fraud,cryptography"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/","url":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/","name":"Wormhole Blockchain Bridge Taken For More Than $300 Million 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/wormhole-blockchain-bridge-taken-for-more-than-300-million.jpg","datePublished":"2022-02-03T16:20:30+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/wormhole-blockchain-bridge-taken-for-more-than-300-million.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/02\/wormhole-blockchain-bridge-taken-for-more-than-300-million.jpg","width":1024,"height":614},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/wormhole-blockchain-bridge-taken-for-more-than-300-million\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,cybercrime,data loss,fraud,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackercybercrimedata-lossfraudcryptography\/"},{"@type":"ListItem","position":3,"name":"Wormhole Blockchain Bridge Taken For More Than $300 Million"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45130"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45130\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45131"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}