{"id":47179,"date":"2022-06-20T14:36:33","date_gmt":"2022-06-20T14:36:33","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33559\/This-Phone-Wiping-Android-Banking-Trojan-Is-Getting-Nastier.html"},"modified":"2022-06-20T14:36:33","modified_gmt":"2022-06-20T14:36:33","slug":"this-phone-wiping-android-banking-trojan-is-getting-nastier","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/","title":{"rendered":"This Phone-Wiping Android Banking Trojan Is Getting Nastier"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/\" alt=\"Woman using smartphone. The concept of using the phone is essential in everyday life.\" height=\"763.5514018691589\" width=\"1200\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall g-color-gray70 u-block g-text-xsmall\">Image: Getty Images\/iStockphoto<\/span><\/figcaption><\/figure>\n<p>A nasty Android banking trojan that is best known for wiping smartphones to cover its tracks has gained several new features to improve its ability at phishing online-banking credentials, intercepting SMS two-factor authentication codes, and more. &nbsp;&nbsp;<\/p>\n<p>The BRATA or the &#8216;Brazilian Remote Access Tool, Android&#8217; has been circulating since at least 2019, initially as spyware although it later became a banking trojan.&nbsp;<\/p>\n<div class=\"c-shortcodePinbox c-shortcodePinbox-single g-border-thin-light-top g-border-thin-light-bottom g-outer-spacing-top-medium g-outer-spacing-bottom-medium g-inner-spacing-bottom-small\">\n<h3 class=\"c-sectionHeading\"> ZDNet Recommends <\/h3>\n<\/p><\/div>\n<p>Researchers at Cleafy, an Italian cybersecurity firm, <a href=\"https:\/\/www.zdnet.com\/article\/this-cruel-android-malware-wipes-phones-after-stealing-money\/\" rel=\"follow\">last year discovered BRATA&#8217;s makers had started abusing Android&#8217;s factory reset<\/a> to prevent victims from discovering, reporting and preventing unauthorized wire transfers.&nbsp;<\/p>\n<p>The factory reset was executed after a successful illicit wire transfer or when the malware detected analysis by installed security software. &nbsp;<\/p>\n<p>BRATA originally targeted customers from Brazilian banks only, but Cleafy reported that it started targeting customers of UK, Spanish and British banking brands more recently.<\/p>\n<p>The malware was spread through fraudulent SMS messages purporting to be from a target&#8217;s bank, but which actually contained a link that would download BRATA.&nbsp;<\/p>\n<p><strong>SEE:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-5g-phone\/\" rel=\"follow\"><strong>The best 5G phones: Which flagship comes out on top?<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.cleafy.com\/cleafy-labs\/brata-is-evolving-into-an-advanced-persistent-threat#2\" target=\"_blank\" rel=\"noopener\">According to Cleafy researchers<\/a>, a new variant spreading across Europe features new phishing pages mimicking targeted banks, new methods of acquiring permissions to access GPS location data, and new ways to send and receive SMS, and gain device management permissions. It also gained the ability to sideload a second-stage piece of malware from its command and control server to perform event logging.&nbsp;<\/p>\n<p>The combination of the phishing pages and the ability to receive and read the victim&#8217;s SMS could be used to take over a victim&#8217;s bank account, notes Cleafy.&nbsp;<\/p>\n<p>Cleafy discovered a related SMS-stealing app that shared some code with the BRATA malware. They believe this app is used to harvest contacts from devices in the UK, Italy and Spain.&nbsp;<\/p>\n<p>The malicious app asks the user to change the default messaging app to the malicious one in order to intercept incoming messages, including two-factor authentication codes or one-time passcodes.<\/p>\n<p><strong>SEE: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/make-time-for-casual-collisions-six-ways-to-stay-productive-with-remote-work\/#link=%7B%22linkText%22:%22Six%20ways%20to%20stay%20productive%20when%20working%20remote%22,%22target%22:%22_blank%22,%22href%22:%22https:\/\/www.zdnet.com\/article\/make-time-for-casual-collisions-six-ways-to-stay-productive-with-remote-work\/%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D\" rel=\"follow\"><strong>Six ways to stay productive when working remote<\/strong><\/a><\/p>\n<p>Cleafy notes the threat actors are targeting customers of specific banks for a few months before moving on to customers of another target.&nbsp;<\/p>\n<p>&#8220;The modus operandi now fits into an Advanced Persistent Threat (APT) activity pattern. This term is used to describe an attack campaign in which criminals establish a long-term presence on a targeted network to steal sensitive information,&#8221; Cleafy said.<\/p>\n<p>&#8220;Threat actors behind BRATA now target a specific financial institution at a time, and change their focus only once the targeted victim starts to implement consistent countermeasures against them. Then, they move away from the spotlight, to come out with a different target and strategies of infections,&#8221; it warned.&nbsp;<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33559\/This-Phone-Wiping-Android-Banking-Trojan-Is-Getting-Nastier.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10057],"class_list":["post-47179","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinemalwarebanklinuxphonetrojangoogle"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This Phone-Wiping Android Banking Trojan Is Getting Nastier 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Phone-Wiping Android Banking Trojan Is Getting Nastier 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-20T14:36:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This Phone-Wiping Android Banking Trojan Is Getting Nastier\",\"datePublished\":\"2022-06-20T14:36:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/\"},\"wordCount\":476,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/\",\"keywords\":[\"headline,malware,bank,linux,phone,trojan,google\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/\",\"name\":\"This Phone-Wiping Android Banking Trojan Is Getting Nastier 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/\",\"datePublished\":\"2022-06-20T14:36:33+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-phone-wiping-android-banking-trojan-is-getting-nastier\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware,bank,linux,phone,trojan,google\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemalwarebanklinuxphonetrojangoogle\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This Phone-Wiping Android Banking Trojan Is Getting Nastier\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Phone-Wiping Android Banking Trojan Is Getting Nastier 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/","og_locale":"en_US","og_type":"article","og_title":"This Phone-Wiping Android Banking Trojan Is Getting Nastier 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-06-20T14:36:33+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This Phone-Wiping Android Banking Trojan Is Getting Nastier","datePublished":"2022-06-20T14:36:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/"},"wordCount":476,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/","keywords":["headline,malware,bank,linux,phone,trojan,google"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/","url":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/","name":"This Phone-Wiping Android Banking Trojan Is Getting Nastier 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/","datePublished":"2022-06-20T14:36:33+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/","contentUrl":"https:\/\/www.zdnet.com\/article\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-phone-wiping-android-banking-trojan-is-getting-nastier\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware,bank,linux,phone,trojan,google","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwarebanklinuxphonetrojangoogle\/"},{"@type":"ListItem","position":3,"name":"This Phone-Wiping Android Banking Trojan Is Getting Nastier"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47179"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47179\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}