{"id":50995,"date":"2023-03-13T14:10:03","date_gmt":"2023-03-13T14:10:03","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34412\/Emotet-Attempts-To-Sell-Access-After-Infiltrating-High-Value-Networks.html"},"modified":"2023-03-13T14:10:03","modified_gmt":"2023-03-13T14:10:03","slug":"emotet-attempts-to-sell-access-after-infiltrating-high-value-networks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/","title":{"rendered":"Emotet Attempts To Sell Access After Infiltrating High Value Networks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/03\/031023_trojan_malware.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The notorious trojan Emotet re-emerged this week after a three-month hiatus with a specific goal: send malicious emails to infiltrate high-value corporate networks and then try to sell that access to ransomware groups.<\/p>\n<p>Instead of just sending <a href=\"https:\/\/www.scmagazine.com\/analysis\/malware\/updated-emotet-banking-trojan-more-effective-proliferates-through-excel-macros\" target=\"_blank\" rel=\"noreferrer noopener\">malicious Excel files<\/a>, Emotet is now sending malware in Word files with macros that, if enabled, could start the infection chain and execute the Emotet.dll.<\/p>\n<p>Deep Instinct&#8217;s Threat Research team on Friday reported that the first page of the malicious email contains an image that tries to lure the receiver to enable macros. <a rel=\"noreferrer noopener\" href=\"https:\/\/www.deepinstinct.com\/blog\/emotet-again-the-first-malspam-wave-of-2023\" target=\"_blank\">The Deep Instinct team<\/a> observed malicious emails sent to companies around the globe, including in Japan, an image of which they posted on March 10.<\/p>\n<p>Initially conceived as a banking trojan in 2014, Emotet evolved into an all-purpose loader two years later. While the botnet had its infrastructure dismantled in January 2021, it has been resurrected through the help of the TrickBot malware by the mostly defunct Conti group. In security circles, Emotet gets tracked at Mummy Spider, or <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/threat-actor-profile-ta542-banker-malware-distribution-service\" target=\"_blank\" rel=\"noreferrer noopener\">TA542.<\/a><\/p>\n<p>Simon Kenin, a security researcher at Deep Instinct, explained that over the years, <a href=\"https:\/\/www.scmagazine.com\/news\/malware\/emotets-return-underscores-that-some-threat-groups-never-go-away-for-good\" target=\"_blank\" rel=\"noreferrer noopener\">Emotet shifted<\/a> to being a botnet of infected computers that will load any other malware the operator decides on, and that&#8217;s why the malicious spam now gets sent to corporate email addresses and not individuals at homes.<\/p>\n<p>\u201cWhen the operator of the botnet sees a high value target infected, he can sell access to a ransomware group, which will have initial access and try to hack the whole network,\u201d explained Kenin. \u201cThe return on investment is much higher for ransomware than banking trojans these days. For other less valuable targets, a method of pay-per-install can be used and the operator just loads other cybercriminals malware in bulk.\u201d<\/p>\n<h2>Emotet malware inflating payload to avoid detection<\/h2>\n<p>The initial attack file and the final payload are artificially inflated to more than 500 megabytes, a technique that can \u201cdrastically decrease\u201d the chance of security products to block the file pre-execution, Deep Instinct reported about the new Emotet campaign.<\/p>\n<p>Kenin explained that the technique deployed by Emotet can cause serious performance issues for scanning big files from some vendors, or it can cause static detections to stop working properly and miss those files.<\/p>\n<p>\u201cSolely based on the initial detections in VirusTotal, we could see that most vendors didn\u2019t detect those files and it took them some tweaking to properly start detecting them,\u201d said Kenin. \u201cI would recommend security teams test the security product they use in a lab environment against the samples we provided to understand better how they are protected.\u201d<\/p>\n<h2>Emotet resumed malicious activity March 7<\/h2>\n<p>Cofense reported in <a rel=\"noreferrer noopener\" href=\"https:\/\/cofense.com\/blog\/emotet-sending-malicious-emails-after-three-month-hiatus\/\" target=\"_blank\">a March 7 blog post <\/a>that malicious email activity by Emotet resumed at 8 a.m. Eastern that day. The Cofense researchers said the malicious emails contain attached .zip files that are not password protected.<\/p>\n<p>Emotet last appeared in November and June of 2022 and the Cofense researchers said it was unclear how long this attack period will last.<\/p>\n<p>The recent resurgence of Emotet, along with new modules and evasion techniques being added, indicates active development of the malware, said Zane Bond, head of product at Keeper Security.<\/p>\n<p>\u201cIt\u2019s unlikely Emotet will become the world&#8217;s top botnet as it was in the past, because the vulnerabilities that enabled its explosive growth have largely been patched,\u201d said Bond. \u201cHowever, it\u2019s still a very capable adversary tool that defenders need to protect against. Without zero-days or critical vulnerabilities enabling a global widespread infection, adversaries are relying on common tactics to get initial footholds.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34412\/Emotet-Attempts-To-Sell-Access-After-Infiltrating-High-Value-Networks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":50996,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10415],"class_list":["post-50995","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermalwarecybercrimefraudbackdoor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Emotet Attempts To Sell Access After Infiltrating High Value Networks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emotet Attempts To Sell Access After Infiltrating High Value Networks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-13T14:10:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/03\/031023_trojan_malware.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Emotet Attempts To Sell Access After Infiltrating High Value Networks\",\"datePublished\":\"2023-03-13T14:10:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\\\/\"},\"wordCount\":601,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks.jpg\",\"keywords\":[\"headline,hacker,malware,cybercrime,fraud,backdoor\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\\\/\",\"name\":\"Emotet Attempts To Sell Access After Infiltrating High Value Networks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks.jpg\",\"datePublished\":\"2023-03-13T14:10:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks.jpg\",\"width\":1280,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,malware,cybercrime,fraud,backdoor\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermalwarecybercrimefraudbackdoor\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Emotet Attempts To Sell Access After Infiltrating High Value Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emotet Attempts To Sell Access After Infiltrating High Value Networks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/","og_locale":"en_US","og_type":"article","og_title":"Emotet Attempts To Sell Access After Infiltrating High Value Networks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-13T14:10:03+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/03\/031023_trojan_malware.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Emotet Attempts To Sell Access After Infiltrating High Value Networks","datePublished":"2023-03-13T14:10:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/"},"wordCount":601,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks.jpg","keywords":["headline,hacker,malware,cybercrime,fraud,backdoor"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/","url":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/","name":"Emotet Attempts To Sell Access After Infiltrating High Value Networks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks.jpg","datePublished":"2023-03-13T14:10:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks.jpg","width":1280,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/emotet-attempts-to-sell-access-after-infiltrating-high-value-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,malware,cybercrime,fraud,backdoor","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwarecybercrimefraudbackdoor\/"},{"@type":"ListItem","position":3,"name":"Emotet Attempts To Sell Access After Infiltrating High Value Networks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=50995"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/50995\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/50996"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=50995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=50995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=50995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}