{"id":47712,"date":"2022-07-27T11:25:00","date_gmt":"2022-07-27T11:25:00","guid":{"rendered":"http:\/\/975a206c-ad40-4423-bbc5-078513e2e217"},"modified":"2022-07-27T11:25:00","modified_gmt":"2022-07-27T11:25:00","slug":"these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/","title":{"rendered":"These ransomware hackers gave up when they hit multi-factor authentication"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/\" alt=\"hands-at-a-green-lit-up-keyboard.jpg\" height=\"801.3213780084945\" width=\"1200\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall g-color-gray70 u-block g-text-xsmall\">Image: Getty<\/span><\/figcaption><\/figure>\n<p>A <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\" rel=\"follow\">ransomware attack<\/a> was prevented just because the intended victim was using&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/better-than-the-best-password-how-to-use-2fa-to-improve-your-security\/\" rel=\"follow\">multi-factor authentication<\/a>&nbsp;(MFA) and the attackers decided it wasn&#8217;t worth the effort to attempt to bypass it.&nbsp;<\/p>\n<p>It&#8217;s often said that using MFA, also known as two-factor authentication (2FA), is one of the best things you can do to help protect your accounts and computer networks from cyberattacks because it creates an effective barrier \u2013 and now Europol has seen this in action while investigating ransomware gangs. &nbsp;<\/p>\n<p>&#8220;We&#8217;ve done investigations where ransomware criminals were monitored. In certain investigations, we saw them trying to access companies \u2013 but as soon as they would hit two-factor authentication in this process, they would immediately drop this victim and go to the next,&#8221; said Marijn Schuurbiers, head of operations at Europol&#8217;s European Cybercrime Centre (EC3), speaking about an undisclosed incident the agency investigated. &nbsp;<\/p>\n<p><strong>SEE:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-why-its-still-a-big-threat-and-where-the-gangs-are-going-next\/\" rel=\"follow\"><strong>Ransomware: Why it&#8217;s still a big threat, and where the gangs are going next<\/strong><\/a><\/p>\n<p>It demonstrates how useful MFA can be in preventing ransomware and other cyberattacks. Even if the attacker has the legitimate password for the account \u2013 either because it&#8217;s been guessed or it&#8217;s been stolen \u2013 using MFA usually prevents them from being able to log in. &nbsp;<\/p>\n<p>An unexpected alert from an MFA authenticator app can also notify the intended victim that something is wrong and should be investigated, which can also help to prevent further attacks and incidents.&nbsp;<\/p>\n<p>Not only can cyber criminals exploit hacked accounts to&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-warning-to-law-firms-stop-encouraging-victims-to-pay-ransoms-to-cyber-criminals\/\" rel=\"follow\">gain initial access to the network and install ransomware<\/a>, the access they gain can also be used as part of <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-theres-been-a-big-rise-in-double-extortion-attacks-as-gangs-try-out-new-tricks\/\" rel=\"follow\">double-extortion attacks<\/a>, where criminals steal information before encrypting it, with threats to publish the data if a ransom isn&#8217;t received.&nbsp;<\/p>\n<p>However, if attackers can&#8217;t access that data due to the use of MFA, they can&#8217;t attempt to exploit it for extortion.&nbsp;<\/p>\n<p>&#8220;This is really crucial information that companies can use for their counter strategies. Know that if you implement two-factor authentication for your systems in general \u2013 or maybe specifically, your crown jewels \u2013 you will significantly reduce your chances of falling victim to a ransomware group, which uses double extortion,&#8221; said Schuurbiers, who was speaking at <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/\" rel=\"follow\">the sixth anniversary of No More Ransom<\/a>.&nbsp;<\/p>\n<p>No More Ransom is an initiative by Europol, additional law enforcement agencies, cybersecurity companies, academia and others that provides victims of ransomware attacks with decryption keys for free. So far, the scheme has helped 1.5 million people get their files back without paying ransomware gangs.<\/p>\n<p>Implementing 2FA is one of several recommendations Europol recommends to help prevent ransomware attacks. Others include&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/best-backup-software\/\" rel=\"follow\">regularly backing up data on devices, so it can be recovered without paying a ransom in the event of an attack encrypting files,<\/a>&nbsp;as well as ensuring that&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/this-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\/\" rel=\"follow\">security software and operating systems are up to date with the latest security patches<\/a>.<\/p>\n<h3><strong>MORE ON CYBERSECURITY<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More evidence that multi-factor authentication works. Police explain how they have seen ransomware gangs abandon attacks when they hit MFA security.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-47712","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>These ransomware hackers gave up when they hit multi-factor authentication 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"These ransomware hackers gave up when they hit multi-factor authentication 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-27T11:25:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"These ransomware hackers gave up when they hit multi-factor authentication\",\"datePublished\":\"2022-07-27T11:25:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\\\/\"},\"wordCount\":506,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\\\/\",\"name\":\"These ransomware hackers gave up when they hit multi-factor authentication 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\\\/\",\"datePublished\":\"2022-07-27T11:25:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"These ransomware hackers gave up when they hit multi-factor authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"These ransomware hackers gave up when they hit multi-factor authentication 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/","og_locale":"en_US","og_type":"article","og_title":"These ransomware hackers gave up when they hit multi-factor authentication 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-07-27T11:25:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"These ransomware hackers gave up when they hit multi-factor authentication","datePublished":"2022-07-27T11:25:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/"},"wordCount":506,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/","url":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/","name":"These ransomware hackers gave up when they hit multi-factor authentication 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/","datePublished":"2022-07-27T11:25:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/","contentUrl":"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/these-ransomware-hackers-gave-up-when-they-hit-multi-factor-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"These ransomware hackers gave up when they hit multi-factor authentication"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47712"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47712\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}