{"id":50493,"date":"2023-02-09T17:00:00","date_gmt":"2023-02-09T17:00:00","guid":{"rendered":"https:\/\/www.networkworld.com\/article\/3687610\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released.html#tk.rss_security"},"modified":"2023-02-09T17:00:00","modified_gmt":"2023-02-09T17:00:00","slug":"vmware-esxi-server-ransomware-evolves-after-recovery-script-released","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/","title":{"rendered":"VMware ESXi server ransomware evolves, after recovery script released"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2016\/12\/12_ransomware-100698482-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>After the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday released a recovery script for organizations affected by a <a href=\"https:\/\/www.csoonline.com\/article\/3687095\/massive-ransomware-attack-targets-vmware-esxi-servers-worldwide.html\">massive ransomware attack targeting VMWare ESXi servers worldwide<\/a>, reports surfaced that the malware evolved in a way that made earlier recovery procedures ineffective.<\/p>\n<p>The attacks, aimed at VMware\u2019s ESXi bare metal <a href=\"https:\/\/www.networkworld.com\/article\/3243262\/what-is-a-hypervisor.html\">hypervisor<\/a>, were first made public February 3 by the French Computer Emergency Response Team (CERT-FR), and target ESXi instances running older versions of the software, or those that have not been patched to current standards. Some 3,800 servers have been affected globally, CISA and the FBI said.<\/p>\n<p>The<a href=\"https:\/\/www.csoonline.com\/article\/3236183\/what-is-ransomware-how-it-works-and-how-to-remove-it.html\"> ransomware<\/a> encrypts configuration files on vulnerable virtual machines, making them potentially unusable. One ransom note issued to an affected company asked for about $23,000 in bitcoin.<\/p>\n<p>CISA, in conjunction with the FBI, <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa23-039a\" rel=\"nofollow\">has released a recovery script<\/a>. The group said that the script does not delete the affected configuration files, but attempts to create new ones. It\u2019s not a guaranteed way to circumvent the ransom demands, and doesn\u2019t fix the root vulnerability that allowed the ESXiArgs attack to function in the first place, but it could be a crucial first step for affected companies.<\/p>\n<p>CISA notes that after running the script, organizations should immediately update their servers to the latest versions, disable the Service Location Protocol (SLP) service that the ESXiArgs attackers used to compromise the <a href=\"https:\/\/www.networkworld.com\/article\/3583508\/what-is-a-virtual-machine-and-why-are-they-so-useful.html\">virtual machines<\/a>, and cut the ESXi hypervisors off from the public Internet before reinitializing systems.<\/p>\n<p>After CISA released its guidance, however, reports surfaced that a new version of the ransomware was infecting servers and rendering prior recovery methods ineffective. The new version of the ransomware was first reported by <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-esxiargs-ransomware-version-prevents-vmware-esxi-recovery\/\" rel=\"nofollow\">Bleeping Computer<\/a>.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>One major change is that the ransomware now encrypts a larger percentage of the configuration files that it generally targets, making it difficult, if not impossible, for the CISA script to create a clean alternative.<\/p>\n<p>In addition, the new wave of ESXiArgs attacks may work even on systems that don\u2019t have SLP enabled, according to a system administrator&#8217;s post on Bleeping Computer, although that was not immediately confirmed by cybersecurity experts.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>\u201c[I] have not been able to personally verify that this is the case, nor have any other well-known security research organizations that I would imagine are looking into this,\u201d said Gartner senior director analyst Jon Amato. \u201cIt\u2019s certainly plausible, but there\u2019s a lot of daylight between plausible and confirmed.\u201d<\/p>\n<p>Attempting the recovery script is still a good idea for affected organizations, he added.<\/p>\n<p>\u201cIt\u2019s worth a shot \u2014 it costs nothing but a few minutes of an admin\u2019s time,\u201d Amato said.<\/p>\n<h2>CISA: Take these server security procedures<\/h2>\n<p>Whether or not the CISA script is usable in a specific organization\u2019s situation, the FBI and CISA recommend that affected organizations follow the last three steps anyway \u2014 if at all possible, patching the machines to the latest standard (which is not vulnerable to the ESXiArgs attack), shutting down the SLP service and cutting them off from the public Internet are all important steps for mitigation. The root vulnerability was first reported in CVE-2021-21974, and a patch has been available for almost a year.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>The attacks primarily targeted servers in France, the US, and Germany, with substantial numbers of victims in Canada and the UK as well, <a href=\"https:\/\/search.censys.io\/search?resource=hosts&amp;sort=RELEVANCE&amp;per_page=25&amp;virtual_hosts=EXCLUDE&amp;q=services.http.response.body%3A+%22How+to+Restore+Your+Files%22+and+services.http.response.html_title%3A%22How+to+Restore+Your+Files%22&amp;cursor=eyJBZnRlciI6WyI4OS43ODE4MTUiLCJTeGpRcE5mU1orOVJlcEJnOENoTTJRPT0iXSwiUmV2ZXJzZSI6ZmFsc2UsIlNlZWQiOjB9\" rel=\"nofollow\">according to cybersecurity company Censys<\/a>. To forestall further attacks, CISA and the FBI issued a list of additional steps to be taken, including maintaining regular and robust offline backups, restricting known malware vectors like early versions of the SMB network protocol, and requiring a generally high level of internal security \u2014 phishing-resistant 2FA, user account auditing and several other techniques were particularly recommended.<\/p>\n<p><em>(This story has been updated to include information about SLPs, and an analyst comment.)<\/em><\/p>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">\n<p> <strong>Next read this:<\/strong> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3687610\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nAfter the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday released a recovery script for organizations affected by a massive ransomware attack targeting VMWare ESXi servers worldwide, reports surfaced that the malware evolved in a way that made earlier recovery procedures ineffective.The attacks, aimed at VMware\u2019s ESXi bare metal hypervisor, were first made public February 3 by the French Computer Emergency Response Team (CERT-FR), and target ESXi instances running older versions of the software, or those that have not been patched to current standards. Some 3,800 servers have been affected globally, CISA and the FBI said.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":50494,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[91,307,1002],"class_list":["post-50493","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-ransomware","tag-security","tag-server"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VMware ESXi server ransomware evolves, after recovery script released 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VMware ESXi server ransomware evolves, after recovery script released 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-09T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.techhive.com\/images\/article\/2016\/12\/12_ransomware-100698482-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"VMware ESXi server ransomware evolves, after recovery script released\",\"datePublished\":\"2023-02-09T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/\"},\"wordCount\":640,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released.jpg\",\"keywords\":[\"ransomware\",\"Security\",\"Server\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/\",\"name\":\"VMware ESXi server ransomware evolves, after recovery script released 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released.jpg\",\"datePublished\":\"2023-02-09T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released.jpg\",\"width\":150,\"height\":113},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ransomware\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/ransomware\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"VMware ESXi server ransomware evolves, after recovery script released\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VMware ESXi server ransomware evolves, after recovery script released 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/","og_locale":"en_US","og_type":"article","og_title":"VMware ESXi server ransomware evolves, after recovery script released 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-02-09T17:00:00+00:00","og_image":[{"url":"https:\/\/images.techhive.com\/images\/article\/2016\/12\/12_ransomware-100698482-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"VMware ESXi server ransomware evolves, after recovery script released","datePublished":"2023-02-09T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/"},"wordCount":640,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released.jpg","keywords":["ransomware","Security","Server"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/","url":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/","name":"VMware ESXi server ransomware evolves, after recovery script released 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released.jpg","datePublished":"2023-02-09T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/02\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released.jpg","width":150,"height":113},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/vmware-esxi-server-ransomware-evolves-after-recovery-script-released\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"ransomware","item":"https:\/\/www.threatshub.org\/blog\/tag\/ransomware\/"},{"@type":"ListItem","position":3,"name":"VMware ESXi server ransomware evolves, after recovery script released"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50493"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50493\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/50494"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}