{"id":50277,"date":"2023-01-26T13:21:00","date_gmt":"2023-01-26T13:21:00","guid":{"rendered":"http:\/\/48d1611a-ab71-44ae-be85-d386862a610d"},"modified":"2023-01-26T13:21:00","modified_gmt":"2023-01-26T13:21:00","slug":"nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/","title":{"rendered":"NSA and CISA alert: This phishing scam could give hackers control of your PC"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/027c67123e8c6217b9183e34d110108af497161c\/2023\/01\/26\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=768\" alt=\"a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/fba991cc7c5d43a18a79ebad01db611b3aa6ae37\/2023\/01\/26\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1024\" alt=\"a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/690d3bb3047f7789852622a0a34ddff67e20c26a\/2023\/01\/26\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1280\" alt=\"a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/690d3bb3047f7789852622a0a34ddff67e20c26a\/2023\/01\/26\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1280\" alt=\"a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern\" width=\"1280\" height=\"854.7428032090609\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Getty\/Jamie Grill<\/span><\/figcaption><\/figure>\n<p>Cyber criminals are actively exploiting remote management software to aid phishing scams and steal money from victims, a joint advisory by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) has warned.&nbsp;<\/p>\n<p>The warning comes following the discovery of an <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\" rel=\"follow\">email phishing campaign<\/a> that tricks victims into downloading legitimate remote monitoring and management (RMM) software, which allows attackers to gain access to bank accounts.&nbsp;<\/p>\n<p>Crucially, it does so without triggering antivirus alerts because the RMM tool is a genuine application with a verified case for use &#8212; and that&#8217;s something that cyber criminals can exploit as a workaround, rather than attempting to trick victims into downloading <a href=\"https:\/\/www.zdnet.com\/article\/what-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\/\" rel=\"follow\">malware<\/a>&nbsp;that could set off warnings.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\" rel=\"follow\"><strong>What is phishing? Everything you need to know to protect against scam emails &#8211; and worse<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2023\/01\/25\/cisa-nsa-and-ms-isac-release-advisory-malicious-use-rmm-software\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">According to CISA and the NSA<\/a>, while this campaign is specifically targeting finances, the remote access gained means attackers could use it for other malicious purposes, such as stealing usernames and passwords, and installing backdoors to compromise systems, which could be used to launch <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-has-now-become-a-problem-for-everyone-and-not-just-tech\/\" rel=\"follow\">ransomware attacks<\/a>.&nbsp;<\/p>\n<p>The attacks, believed to be the work of a financially motivated cyber-criminal gang, have been ongoing since at least June 2022, and begin with phishing emails designed to manipulate victims.&nbsp;<\/p>\n<p>According to the advisory, <a href=\"https:\/\/www.zdnet.com\/article\/fbi-warning-pc-and-tech-support-scams-are-back-heres-what-to-watch-out-for\/\" rel=\"follow\">one common phishing template being leveraged in these attacks<\/a> is a message that claims an annual subscription is about to be automatically renewed at a cost of hundreds of dollars.&nbsp;<\/p>\n<p>This is designed to panic victims into calling the &#8216;help desk&#8217; listed in the email. If they do this, the help desk &#8212; operated by scammers &#8212; will attempt to convince the victim to download remote management software to &#8216;help&#8217; them with their query and cancel the payment.&nbsp;<\/p>\n<p>But in reality, no payment is about to occur and all the attackers want to do is convince the victim to log in to their online bank account while the remote management software is active. The attackers use this access to the bank account to steal money from the victim.&nbsp;<\/p>\n<p>In this campaign, the attackers are using ScreenConnect and AnyDesk, but the advisory warns that they can use any legitimate remote management software. And because attackers can download legitimate RMM software as self-contained, portable executables, they can bypass both administrative privilege requirements and software management control policies.&nbsp;<\/p>\n<p>&#8220;Threat actors often target legitimate users of RMM software. Targets can include managed service providers (MSPs) and IT help desks, who regularly use legitimate RMM software for technical and security end-user support, network management, endpoint monitoring, and to interact remotely with hosts for IT-support functions,&#8221; warns the advisory.<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/email-is-our-greatest-productivity-tool-thats-why-phishing-is-so-dangerous-to-everyone\/\" rel=\"follow\"><strong>Email is our greatest productivity tool. That&#8217;s why phishing is so dangerous to everyone<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa23-025a\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">According to CISA<\/a>, actions that can be taken to help avoid falling victim to this and similar campaigns include implementing best practices to block phishing emails, and to carefully monitor activity to identify suspicious or unwarranted use of software on the network.&nbsp;<\/p>\n<p>The agency also suggests implementing a user-training program and running phishing exercises to raise awareness among users about the risks of visiting suspicious websites, clicking on suspicious links, and opening suspicious attachments.&nbsp;<\/p>\n<h3><strong>MORE ON CYBERSECURITY<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber criminals are convincing people to install legitimate remote monitoring software &#8211; which they use to steal money from victims.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-50277","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NSA and CISA alert: This phishing scam could give hackers control of your PC 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NSA and CISA alert: This phishing scam could give hackers control of your PC 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-26T13:21:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/690d3bb3047f7789852622a0a34ddff67e20c26a\/2023\/01\/26\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"NSA and CISA alert: This phishing scam could give hackers control of your PC\",\"datePublished\":\"2023-01-26T13:21:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\\\/\"},\"wordCount\":564,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/690d3bb3047f7789852622a0a34ddff67e20c26a\\\/2023\\\/01\\\/26\\\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\\\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\\\/\",\"name\":\"NSA and CISA alert: This phishing scam could give hackers control of your PC 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/690d3bb3047f7789852622a0a34ddff67e20c26a\\\/2023\\\/01\\\/26\\\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\\\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-01-26T13:21:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/690d3bb3047f7789852622a0a34ddff67e20c26a\\\/2023\\\/01\\\/26\\\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\\\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/690d3bb3047f7789852622a0a34ddff67e20c26a\\\/2023\\\/01\\\/26\\\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\\\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NSA and CISA alert: This phishing scam could give hackers control of your PC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NSA and CISA alert: This phishing scam could give hackers control of your PC 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/","og_locale":"en_US","og_type":"article","og_title":"NSA and CISA alert: This phishing scam could give hackers control of your PC 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-01-26T13:21:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/690d3bb3047f7789852622a0a34ddff67e20c26a\/2023\/01\/26\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"NSA and CISA alert: This phishing scam could give hackers control of your PC","datePublished":"2023-01-26T13:21:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/"},"wordCount":564,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/690d3bb3047f7789852622a0a34ddff67e20c26a\/2023\/01\/26\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/","url":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/","name":"NSA and CISA alert: This phishing scam could give hackers control of your PC 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/690d3bb3047f7789852622a0a34ddff67e20c26a\/2023\/01\/26\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1280","datePublished":"2023-01-26T13:21:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/690d3bb3047f7789852622a0a34ddff67e20c26a\/2023\/01\/26\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/690d3bb3047f7789852622a0a34ddff67e20c26a\/2023\/01\/26\/6bf1de0e-5df0-4953-b4b5-63608a05cdf1\/a-woman-holding-a-baby-while-looking-at-a-laptop-with-concern.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nsa-and-cisa-alert-this-phishing-scam-could-give-hackers-control-of-your-pc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"NSA and CISA alert: This phishing scam could give hackers control of your PC"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50277"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50277\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}