{"id":51271,"date":"2023-03-31T14:48:11","date_gmt":"2023-03-31T14:48:11","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34484\/Hacking-Campaign-Exploited-Zero-Day-Tied-To-Spyware-Firm.html"},"modified":"2023-03-31T14:48:11","modified_gmt":"2023-03-31T14:48:11","slug":"hacking-campaign-exploited-zero-day-tied-to-spyware-firm","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/","title":{"rendered":"Hacking Campaign Exploited Zero Day Tied To Spyware Firm"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/03\/032923_spyware.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A spyware campaign driven by &#8220;mercenary&#8221; hackers exploited a zero-day vulnerability in Android devices, reported Amnesty International\u2019s Security Labs.<\/p>\n<p>In its report, released Wednesday, security researchers said they notified Google of the spyware campaign in December, which sparked software updates that prevented the hack from being executed on the \u201cbillions of Android, Chrome and Linux users\u201d vulnerable to the zero-day flaw.<\/p>\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.amnesty.org\/en\/latest\/news\/2023\/03\/new-android-hacking-campaign-linked-to-mercenary-spyware-company\/\" target=\"_blank\">The human rights organization<\/a> did not name the spyware company while it continues to investigate and track its activities. However, Amnesty International said \u201cthe attack showed all the hallmarks of an advanced spyware campaign developed by a commercial cyber-surveillance company and sold to governments hackers to carry out targeted spyware attacks.\u201d<\/p>\n<p>Also on Wednesday, Google\u2019s <a rel=\"noreferrer noopener\" href=\"https:\/\/blog.google\/threat-analysis-group\/spyware-vendors-use-0-days-and-n-days-against-popular-platforms\/\" target=\"_blank\">Threat Analysis Group <\/a>(TAG) detailed the zero-day reported by Amnesty International, as well as a zero-day in iOS devices used in a separate spyware campaign.<\/p>\n<p>The reports of the spyware campaigns that governments are using against dissidents, journalists, human rights workers and political opposition members come the same week that U.S. President Joe Biden issued <a href=\"https:\/\/www.scmagazine.com\/news\/threat-intelligence\/biden-order-bans-government-purchase-commercial-spyware\" target=\"_blank\" rel=\"noreferrer noopener\">a ban on federal agencies from using commercial spyware<\/a> except in certain cases, such as research.<\/p>\n<p>Amnesty International shared its technical findings with Google TAG and other vendors, including Samsung, which released security updates for devices affected by the exploit.<\/p>\n<p>\u201cUnscrupulous spyware companies pose a real danger to the privacy and security of everyone. We urge people to ensure they have the latest security updates on their devices,\u201d said Donncha \u00d3 Cearbhaill, head of Amnesty International\u2019s Security Lab, in a press release. He also called for a global moratorium on the sale, transfer and use of spyware until safeguards are in place for human rights.<\/p>\n<p>Google captured the zero-day exploit chain used to hack Android devices in December. The campaign has been active since at least 2020, according to Amnesty International, and targeted mobile and desktop devices, including Google\u2019s Android OS. The spyware and exploits came from a network of over 1,000 malicious domains, which included spoofed media sites in multiple countries.&nbsp;<\/p>\n<p>Android users in United Arab Emirates were targeted with links sent via SMS, which installed the spyware on the target\u2019s phone if clicked, and identified activity related to the campaign in Indonesia, Belarus and Italy.&nbsp;<\/p>\n<p>According to Amnesty International, Google TAG determined that the exploit chain used multiple zero-days in a fully patched Samsung Android device, as well as in the Linux kernel to gain root privileges on the phone, and Linux desktop and embedded systems.<\/p>\n<h2>Google details spyware campaigns, zero-day exploits<\/h2>\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/blog.google\/threat-analysis-group\/spyware-vendors-use-0-days-and-n-days-against-popular-platforms\/\" target=\"_blank\">Google TAG detailed two campaigns<\/a> in a March 29 blog post. The first campaign \u2014 CVE-2022-42856; CVE-2022-4135 \u2014 was discovered in November affecting Android and iOS devices via bit.ly links sent via SMS to users in Italy, Malaysia and Kazakhstan.<\/p>\n<p>The iOS exploit chain targeted versions before 15.1 and included CVE-2022-42856, which is a WebKit remote code execution exploiting a type of confusion within the JIT compiler. Also exploited was a PAC bypass technique, which Apple fixed in March 2022.<\/p>\n<p>The Android exploit targeted users on phones with an ARM GPU running Chrome versions prior to 106, and consisted of three zero-day exploits: CVE-2022-3723, CVE-2022-4135, and CVE-2022-38181.<\/p>\n<p>The second campaign, reported to TAG by Amnesty International, targeted zero-days and n-days in the latest version of Samsung Internet Browser (CVE-2022-4262; CVE-2023-0266). The exploit chain, Google explained, delivered a fully featured Android spyware suit written in C++ that includes libraries for decrypting and capturing data from various chat and browser applications.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34484\/Hacking-Campaign-Exploited-Zero-Day-Tied-To-Spyware-Firm.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51272,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10448],"class_list":["post-51271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermalwarephonegooglespyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacking Campaign Exploited Zero Day Tied To Spyware Firm 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking Campaign Exploited Zero Day Tied To Spyware Firm 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-31T14:48:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/03\/032923_spyware.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hacking Campaign Exploited Zero Day Tied To Spyware Firm\",\"datePublished\":\"2023-03-31T14:48:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\\\/\"},\"wordCount\":594,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm.jpg\",\"keywords\":[\"headline,hacker,malware,phone,google,spyware\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\\\/\",\"name\":\"Hacking Campaign Exploited Zero Day Tied To Spyware Firm 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm.jpg\",\"datePublished\":\"2023-03-31T14:48:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm.jpg\",\"width\":1280,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,malware,phone,google,spyware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermalwarephonegooglespyware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hacking Campaign Exploited Zero Day Tied To Spyware Firm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking Campaign Exploited Zero Day Tied To Spyware Firm 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/","og_locale":"en_US","og_type":"article","og_title":"Hacking Campaign Exploited Zero Day Tied To Spyware Firm 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-31T14:48:11+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/03\/032923_spyware.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hacking Campaign Exploited Zero Day Tied To Spyware Firm","datePublished":"2023-03-31T14:48:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/"},"wordCount":594,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm.jpg","keywords":["headline,hacker,malware,phone,google,spyware"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/","url":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/","name":"Hacking Campaign Exploited Zero Day Tied To Spyware Firm 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm.jpg","datePublished":"2023-03-31T14:48:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/03\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm.jpg","width":1280,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hacking-campaign-exploited-zero-day-tied-to-spyware-firm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,malware,phone,google,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwarephonegooglespyware\/"},{"@type":"ListItem","position":3,"name":"Hacking Campaign Exploited Zero Day Tied To Spyware Firm"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51271"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51271\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51272"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}