{"id":45901,"date":"2022-03-25T11:16:18","date_gmt":"2022-03-25T11:16:18","guid":{"rendered":"http:\/\/471cfaed-5534-4e87-9b71-1e0ea2d2e651"},"modified":"2022-03-25T11:16:18","modified_gmt":"2022-03-25T11:16:18","slug":"google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/","title":{"rendered":"Google: We stopped these hackers who were targeting job hunters and crypto firms"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4344fe99adcf37ee8484d55dc550bcc21b444f53\/2018\/05\/24\/9025d206-8b2f-403b-9c62-fd64a9a04faf\/google-2015-logo-9.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Google has detailed its work to thwart not one but two North Korean hacking groups using a Chrome zero-day bug.<\/p>\n<p>Google patched the bug in February but it was being exploited a month earlier. At the time, Google said it <a href=\"https:\/\/chromereleases.googleblog.com\/2022\/02\/stable-channel-update-for-desktop_14.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">knew of reports<\/a> that hackers were exploiting the Chrome bug CVE-2022-0609. The US Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.zdnet.com\/article\/cisa-adds-vulnerabilities-in-adobe-magento-google-chrome-and-internet-explorer-to-catalog\/\">mandated federal agencies to patch the Chrome bug in February<\/a>. Google&#8217;s Threat Analyst Group (TAG) says the exploit kit was being actively deployed from January 4, 2022.&nbsp;<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">ZDNet Recommends<\/span> <\/h3>\n<\/p><\/div>\n<p>According to Google, the North Korean hacking groups who were using this exploit are linked to Lazarus, the North Korean hacking group accused of both the Sony Pictures hack and massive theft via an attack on the SWIFT international bank-messaging system.&nbsp;<\/p>\n<p><strong>SEE: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/this-sneaky-type-of-phishing-is-growing-fast-because-hackers-are-seeing-big-paydays\/#link=%7B%22linkText%22:%22This%20sneaky%20type%20of%20phishing%20is%20growing%20fast%20because%20hackers%20are%20seeing%20big%20paydays%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.zdnet.com\/article\/this-sneaky-type-of-phishing-is-growing-fast-because-hackers-are-seeing-big-paydays\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D\"><strong>This sneaky type of phishing is growing fast because hackers are seeing big paydays<\/strong><\/a><\/p>\n<p>These groups&#8217; work have been referenced by researchers at other cybersecurity firms as <a href=\"https:\/\/www.clearskysec.com\/operation-dream-job\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Operation Dream Job<\/a> and <a href=\"https:\/\/www.zdnet.com\/article\/north-korean-hackers-stole-a-record-breaking-amount-of-cryptocurrency-last-year\/\">Operation AppleJeus<\/a>.<\/p>\n<p>&#8220;We suspect that these groups work for the same entity with a shared supply chain, hence the use of the same exploit kit, but each operate with a different mission set and deploy different techniques. It is possible that other North Korean government-backed attackers have access to the same exploit kit,&#8221; <a href=\"https:\/\/blog.google\/threat-analysis-group\/countering-threats-north-korea\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">said TAG&#8217;s Adam Weidemann in a blogpost<\/a>. &nbsp;<\/p>\n<p>&#8220;In line with our current disclosure policy, we are providing these details 30 days after the patch release.&#8221;&nbsp;<\/p>\n<p>The attackers made use of an exploit kit that contained multiple stages and components. The attackers placed links to the exploit kit within hidden iframes, which they embedded on both websites they owned as well as some websites they compromised, according to the security researchers.<\/p>\n<p>The group has targeted US organizations in news media, tech, cryptocurrency and fintech sectors, according to Google. Organizations in other countries may have been targeted too, it notes. &nbsp;<\/p>\n<p>According to Google, one of the groups targeted 250 people from 10 organizations in news media, domain registrars, web-hosting providers and software vendors with bogus job offers in emails impersonating recruiters from Disney, Google and Oracle. The emails contained links to spoofed versions of Indeed and ZipRecruiter \u2014 two popular sites used in the US for recruiting tech talent.&nbsp; &nbsp;<\/p>\n<p>Blockchain analysis firm Chainalysis <a href=\"https:\/\/www.zdnet.com\/article\/north-korean-hackers-stole-a-record-breaking-amount-of-cryptocurrency-last-year\/\">estimates that North Korean hackers linked to Lazarus stole nearly $400 million worth of cryptocurrency in 2021<\/a>. A United Nations panel of experts in 2018 <a href=\"https:\/\/documents-dds-ny.un.org\/doc\/UNDOC\/GEN\/N21\/034\/37\/PDF\/N2103437.pdf?OpenElement\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">concluded<\/a> that its cryptocurrency hacks contributed to North Korea&#8217;s ballistic missile programs.<\/p>\n<p>Google says the other group targeted over 85 users in cryptocurrency and fintech industries using the same exploit kit.<\/p>\n<p>Once they were discovered, all identified websites and domains were added to Google&#8217;s Safe Browsing service to protect users from further exploitation, and Google also sent all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity.&nbsp;<\/p>\n<p>Mandiant, which <a href=\"https:\/\/www.zdnet.com\/article\/google-is-buying-cybersecurity-company-mandiant-for-5-4-billion\/\">Google is buying for $5.4 billion<\/a>, also released a new report this week on North Korean hacking. It says North Korea is <a href=\"https:\/\/twitter.com\/Mandiant\/status\/1506690505115115524\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">borrowing China&#8217;s strategy<\/a> of corralling hacker groups to work within the government.&nbsp; &nbsp;<\/p>\n<p>Mandiant identifies the Lazarus-linked hacking groups as Lab 110, TEMP.Hermit, APT38, Andariel, and Bureau 325. They operate under North Korea&#8217;s foreign intelligence agency, the Reconnaissance General Bureau, which has seven sub-organizations that handle operations, reconnaissance, foreign intelligence, relations with South Korea, technology, and support.&nbsp;<\/p>\n<p>Each group is specialized to target different industries and gather intelligence from organizations about geopolitical events or raise revenues through cryptocurrency theft.&nbsp;<\/p>\n<p>&#8220;TEMP.Hermit, APT38, and Andariel are likely subordinate to <a href=\"https:\/\/ccdcoe.org\/uploads\/2019\/06\/Art_08_The-All-Purpose-Sword.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\"><strong>Lab 110<\/strong><\/a>. Lab 110 is likely an expanded and reorganized version of &#8220;<a href=\"https:\/\/ccdcoe.org\/uploads\/2019\/06\/Art_08_The-All-Purpose-Sword.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\"><strong>Bureau 121<\/strong><\/a>,&#8221; <a href=\"https:\/\/www.mandiant.com\/resources\/mapping-dprk-groups-to-government\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Mandiant researchers said<\/a>.<\/p>\n<p>&#8220;The country&#8217;s espionage operations are believed to be reflective of the regime&#8217;s immediate concerns and priorities, which is likely currently focused on acquiring financial resources through crypto heists, targeting of media, news, and political entities, information on foreign relations and nuclear information, and a slight decline in the once spiked stealing of COVID-19 vaccine research. Information collected in these campaigns will possibly be used to develop or produce internal items and strategies, as in vaccines, mitigations to bypass sanctions, funding for the country&#8217;s weapons programs, and so on.&#8221;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google and Mandiant detail North Korea&#8217;s efforts to organize its offensive cyber capabilities within the government.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-45901","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google: We stopped these hackers who were targeting job hunters and crypto firms 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google: We stopped these hackers who were targeting job hunters and crypto firms 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-25T11:16:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4344fe99adcf37ee8484d55dc550bcc21b444f53\/2018\/05\/24\/9025d206-8b2f-403b-9c62-fd64a9a04faf\/google-2015-logo-9.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google: We stopped these hackers who were targeting job hunters and crypto firms\",\"datePublished\":\"2022-03-25T11:16:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\\\/\"},\"wordCount\":710,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4344fe99adcf37ee8484d55dc550bcc21b444f53\\\/2018\\\/05\\\/24\\\/9025d206-8b2f-403b-9c62-fd64a9a04faf\\\/google-2015-logo-9.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\\\/\",\"name\":\"Google: We stopped these hackers who were targeting job hunters and crypto firms 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4344fe99adcf37ee8484d55dc550bcc21b444f53\\\/2018\\\/05\\\/24\\\/9025d206-8b2f-403b-9c62-fd64a9a04faf\\\/google-2015-logo-9.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2022-03-25T11:16:18+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4344fe99adcf37ee8484d55dc550bcc21b444f53\\\/2018\\\/05\\\/24\\\/9025d206-8b2f-403b-9c62-fd64a9a04faf\\\/google-2015-logo-9.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/4344fe99adcf37ee8484d55dc550bcc21b444f53\\\/2018\\\/05\\\/24\\\/9025d206-8b2f-403b-9c62-fd64a9a04faf\\\/google-2015-logo-9.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google: We stopped these hackers who were targeting job hunters and crypto firms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google: We stopped these hackers who were targeting job hunters and crypto firms 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/","og_locale":"en_US","og_type":"article","og_title":"Google: We stopped these hackers who were targeting job hunters and crypto firms 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-25T11:16:18+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/4344fe99adcf37ee8484d55dc550bcc21b444f53\/2018\/05\/24\/9025d206-8b2f-403b-9c62-fd64a9a04faf\/google-2015-logo-9.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google: We stopped these hackers who were targeting job hunters and crypto firms","datePublished":"2022-03-25T11:16:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/"},"wordCount":710,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4344fe99adcf37ee8484d55dc550bcc21b444f53\/2018\/05\/24\/9025d206-8b2f-403b-9c62-fd64a9a04faf\/google-2015-logo-9.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/","url":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/","name":"Google: We stopped these hackers who were targeting job hunters and crypto firms 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4344fe99adcf37ee8484d55dc550bcc21b444f53\/2018\/05\/24\/9025d206-8b2f-403b-9c62-fd64a9a04faf\/google-2015-logo-9.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2022-03-25T11:16:18+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/4344fe99adcf37ee8484d55dc550bcc21b444f53\/2018\/05\/24\/9025d206-8b2f-403b-9c62-fd64a9a04faf\/google-2015-logo-9.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/4344fe99adcf37ee8484d55dc550bcc21b444f53\/2018\/05\/24\/9025d206-8b2f-403b-9c62-fd64a9a04faf\/google-2015-logo-9.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/google-we-stopped-these-hackers-who-were-targeting-job-hunters-and-crypto-firms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Google: We stopped these hackers who were targeting job hunters and crypto firms"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45901"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45901\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}