{"id":45244,"date":"2022-02-11T12:10:03","date_gmt":"2022-02-11T12:10:03","guid":{"rendered":"http:\/\/8cdc92a5-6a3d-4680-a187-0a036a28457f"},"modified":"2022-02-11T12:10:03","modified_gmt":"2022-02-11T12:10:03","slug":"these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/","title":{"rendered":"These cybercriminals plant criminal evidence on human rights defender, lawyer devices"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cybercriminals are hijacking the devices of civil rights activists and planting &#8220;incriminating evidence&#8221; in covert cyberattacks, researchers warn.<\/p>\n<p>According <a href=\"https:\/\/www.sentinelone.com\/labs\/modifiedelephant-apt-and-a-decade-of-fabricating-evidence\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">to SentinelLabs<\/a>, an advanced persistent threat (APT) group dubbed ModifiedElephant has been responsible for widespread attacks targeting human rights activists and defenders, academics, journalists, and lawyers across India.&nbsp;<\/p>\n<p>The APT is thought to have been in operation since at least 2012, and over the past decade, ModifiedElephant has continually and persistently targeted specific, high-profile people of interest.&nbsp; <\/p>\n<p>However, rather than focusing on data theft, the APT&#8217;s activities are far more sinister: once inside a victim&#8217;s machine, the group conducts surveillance and may plant incriminating files later used to prosecute individuals. <\/p>\n<p>&#8220;The objective of ModifiedElephant is long-term surveillance that at times concludes with the delivery of &#8216;evidence&#8217; \u2013 files that incriminate the target in specific crimes \u2013 prior to conveniently coordinated arrests,&#8221; the researchers say. <\/p>\n<p>SentinelLabs has identified &#8220;hundreds of groups and individuals&#8221; targeted by the APT. <\/p>\n<p>ModifiedElephant starts an infection chain with spear phishing emails. These emails contain documents laden with malware including the NetWire and DarkComet remote access trojans (RATs), as well as keyloggers and an Android Trojan.&nbsp; <\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>SentinelLabs has connected the dots between previously unattributable attacks and says that while ModifiedElephant has operated under the radar for so long, there is an &#8220;observable correlation between ModifiedElephant attacks and the arrests of individuals in controversial, politically-charged cases.&#8221; <\/p>\n<p>While the malware used by the threat actors is considered &#8220;mundane&#8221; and not particularly sophisticated, a number of the APT&#8217;s victims have also been targeted with NSO Group&#8217;s Pegasus surveillanceware, the subject of an <a href=\"https:\/\/www.zdnet.com\/article\/nso-groups-pegasus-spyware-used-against-journalists-political-activists-worldwide-report\/\" target=\"_blank\" rel=\"noopener\">explosive investigation<\/a> by Amnesty International, Forbidden Stories, and various media outlets in 2021. <\/p>\n<p>While attribution isn&#8217;t concrete, the team says that ModifiedElephant activity &#8220;aligns sharply with Indian state interests.&#8221;&nbsp; <\/p>\n<p>&#8220;Many questions about this threat actor and their operations remain; however, one thing is clear: Critics of authoritarian governments around the world must carefully understand the technical capabilities of those who would seek to silence them,&#8221; SentinelLabs cautioned. &#8220;A threat actor willing to frame and incarcerate vulnerable opponents is a critically underreported dimension of the cyber threat landscape that brings up uncomfortable questions about the integrity of devices introduced as evidence.&#8221; <\/p>\n<h3> Previous and related coverage <\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/these-cybercriminals-plant-criminal-evidence-on-human-rights-activists-lawyer-pcs\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s more than one way to silence civil rights activists, it seems.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-45244","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>These cybercriminals plant criminal evidence on human rights defender, lawyer devices 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"These cybercriminals plant criminal evidence on human rights defender, lawyer devices 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-11T12:10:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"These cybercriminals plant criminal evidence on human rights defender, lawyer devices\",\"datePublished\":\"2022-02-11T12:10:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\\\/\"},\"wordCount\":400,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\\\/2021\\\/11\\\/16\\\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\\\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\\\/\",\"name\":\"These cybercriminals plant criminal evidence on human rights defender, lawyer devices 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\\\/2021\\\/11\\\/16\\\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\\\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2022-02-11T12:10:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\\\/2021\\\/11\\\/16\\\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\\\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\\\/2021\\\/11\\\/16\\\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\\\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"These cybercriminals plant criminal evidence on human rights defender, lawyer devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"These cybercriminals plant criminal evidence on human rights defender, lawyer devices 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/","og_locale":"en_US","og_type":"article","og_title":"These cybercriminals plant criminal evidence on human rights defender, lawyer devices 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-02-11T12:10:03+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"These cybercriminals plant criminal evidence on human rights defender, lawyer devices","datePublished":"2022-02-11T12:10:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/"},"wordCount":400,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/","url":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/","name":"These cybercriminals plant criminal evidence on human rights defender, lawyer devices 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2022-02-11T12:10:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4d6efe55c71ac9e4a8a686519ae71817dfddff45\/2021\/11\/16\/7c0cdc25-9d34-4c8b-958a-14ae16877a83\/the-hands-of-a-computer-hacker-over-a-keyboard.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/these-cybercriminals-plant-criminal-evidence-on-human-rights-defender-lawyer-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"These cybercriminals plant criminal evidence on human rights defender, lawyer devices"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45244"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45244\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}