{"id":53025,"date":"2023-08-01T15:44:43","date_gmt":"2023-08-01T15:44:43","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34852\/Cloud-Company-Assisted-17-Different-Hacking-Groups.html"},"modified":"2023-08-01T15:44:43","modified_gmt":"2023-08-01T15:44:43","slug":"cloud-company-assisted-17-different-hacking-groups","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/","title":{"rendered":"Cloud Company Assisted 17 Different Hacking Groups"},"content":{"rendered":"<div data-testid=\"primary-image\" role=\"figure\" aria-describedby=\"primary-image-caption\" readability=\"33\">\n<figure class=\"primary-image__container__3_KhI\" readability=\"6\">\n<div data-testid=\"Image\" class=\"primary-image__image__1zwAE\">\n<div class=\"styles__image-container__skIG1 styles__fill__3xCr1 styles__center_center__1AaPV styles__apply-ratio__1_FYQ\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/JYESPLFHM5OKPHMNYCT4FCICYE.jpg\" srcset=\"https:\/\/www.reuters.com\/resizer\/ciK_GJjrAphtfvn2aZ01LZrKJQo=\/480x0\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/JYESPLFHM5OKPHMNYCT4FCICYE.jpg 480w, https:\/\/www.reuters.com\/resizer\/RXC6ycbWMPHL8rDSf3UX_7b5t7U=\/960x0\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/JYESPLFHM5OKPHMNYCT4FCICYE.jpg 960w, https:\/\/www.reuters.com\/resizer\/YWcEwXiBfM7miVLuTNLWjI_KvCw=\/1080x0\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/JYESPLFHM5OKPHMNYCT4FCICYE.jpg 1080w, https:\/\/www.reuters.com\/resizer\/FnlCU6YVaNnEtAWbtDCu4HrveBA=\/1200x0\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/JYESPLFHM5OKPHMNYCT4FCICYE.jpg 1200w\" sizes=\"auto, (min-width: 1024px) 560px, (min-width: 1440px) 700px, 100vw\" width=\"5412\" height=\"3608\" alt=\"The home page of the Cloudzy internet service provider is seen in this photo illustration\"><\/div>\n<\/div>\n<p data-testid=\"Body\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__ultra_small__37j9j body__full_width__ekUdw body__ultra_small_body__1lUQl primary-image__caption__3Ayt0\">The home page of the Cloudzy internet service provider is seen in this photo illustration taken in Washington, U.S., July 31, 2023. REUTERS\/Raphael Satter\/Illustration<\/p>\n<\/figure>\n<\/div>\n<div readability=\"121.00132872708\">\n<p data-testid=\"paragraph-0\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Aug 1 (Reuters) &#8211; An obscure cloud service company has been providing state-sponsored hackers with internet services to spy on and extort their victims, a cybersecurity firm said in <a data-testid=\"Link\" href=\"http:\/\/www.halcyon.ai\/blog\/report-ransomware-command-and-control-providers-unmasked-by-halcyon-researchers\" target=\"_blank\" class=\"text__text__1FZLe text__inherit-color__3208F text__inherit-font__1Y8w3 text__inherit-size__1DZJi link__underline_default__2prE_\" rel=\"noopener\">a report to be published<\/a> on Tuesday.<\/p>\n<p data-testid=\"paragraph-1\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Researchers at Texas-based Halcyon said a company called Cloudzy had been leasing server space and reselling it to no fewer than 17 different state-sponsored hacking groups from China, Russia, Iran, North Korea, India, Pakistan and Vietnam.<\/p>\n<p data-testid=\"paragraph-2\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Cloudzy CEO Hannan Nozari disputed Halcyon\u2019s assessment, saying that his firm couldn\u2019t be held responsible for its clients, of which he estimated only 2% were malicious.<\/p>\n<p data-testid=\"paragraph-3\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">In an exchange over LinkedIn, Nozari told Reuters: \u201cIf you are a knife factory, are you responsible if someone misuses the knife? Trust me I hate those criminals and we do everything we can to get rid of them.\u201d<\/p>\n<p data-testid=\"paragraph-4\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Digital defenders say the case is an example of how hackers and ransomware gangs use small firms operating at the fringes of cyberspace to enable big hacks.<\/p>\n<p data-testid=\"paragraph-5\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Halcyon estimated that roughly half of Cloudzy\u2019s business was malicious, including renting services to two ransomware groups.<\/p>\n<p data-testid=\"paragraph-6\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">\u201cIt&#8217;s a rogues\u2019 gallery on that through one provider,\u201d said Halcyon executive Ryan Golden ahead of the report\u2019s publication.<\/p>\n<p data-testid=\"paragraph-7\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Halcyon arrived at its conclusion by mapping out Cloudzy\u2019s digital footprint, in part by renting servers directly from the firm and by tying it to known hacking operations.<\/p>\n<p data-testid=\"paragraph-8\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">The cybersecurity firm CrowdStrike, which wasn\u2019t involved in the research, said that it hadn\u2019t seen state-sponsored hackers using Cloudzy. But it had seen other cybercriminal activity connected to it.<\/p>\n<p data-testid=\"paragraph-9\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Cloudzy&#8217;s geographic base of operations is unclear.<\/p>\n<p data-testid=\"paragraph-10\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Halcyon researchers analyzed Cloudzy\u2019s employees\u2019 social media, including LinkedIn and Facebook postings, and found the firm is \u201calmost certainly&#8221; a front for another internet hosting company called abrNOC, which Nozari runs from Tehran.<\/p>\n<p data-testid=\"paragraph-11\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Nozari, who says he lives outside Iran but would not be more specific, told Reuters the companies are separate, although he acknowledged that abrNOC employees helped with Cloudzy\u2019s operations. He didn\u2019t provide details.<\/p>\n<p data-testid=\"paragraph-12\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Cloudzy is registered under its previous name, RouterHosting, in Cyprus and the U.S. state of Wyoming, according to corporate records reviewed by Reuters and confirmed by Nozari. He said the company needed U.S. domicile to be able to register internet protocol addresses in America.<\/p>\n<p data-testid=\"paragraph-13\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">It\u2019s not clear whether Nozari\u2019s registered agent \u2013 CloudPeak Law, a Wyoming law firm based in the small city of Sheridan \u2013 was aware of the allegations against its client.<\/p>\n<p data-testid=\"paragraph-14\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">A woman who answered at CloudPeak Law\u2019s office confirmed that her firm was RouterHosting\u2019s agent but said that, due to client confidentiality, \u201cthat is the extent of what anyone in our firm is going to be able to tell you.\u201d The firm didn\u2019t respond to a follow-up email.<\/p>\n<p data-testid=\"paragraph-15\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">Cloudzy\u2019s business model is typical of several small virtual private server providers that rent internet hosting services in exchange for cryptocurrency, no questions-asked, said Adam Meyers, an executive with CrowdStrike.<\/p>\n<p data-testid=\"paragraph-16\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__full_width__ekUdw body__small_body__2vQyf article-body__paragraph__2-BtD\">\u201cThere\u2019s a whole ecosystem of ne\u2019er-do-well kind of folks who are in this business,\u201d he said.<\/p>\n<p><span data-testid=\"Text\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__default__UPMUu sign-off__text__PU3Aj\">Reporting by Christopher Bing; Editing by Cynthia Osterman<\/span><\/p>\n<p data-testid=\"Body\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__base__22dCE body__small_body__2vQyf article-body__element__2p5pI trust-badge\">Our Standards: <a data-testid=\"Link\" href=\"https:\/\/www.thomsonreuters.com\/en\/about-us\/trust-principles.html\" target=\"_blank\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__medium__1kbOh text__small__1kGq2 link__underline_default__2prE_\" rel=\"noopener\">The Thomson Reuters Trust Principles.<\/a><\/p>\n<div class=\"article-body__element__2p5pI author-bio__multiple-authors__5YGrG\" readability=\"32.575057736721\">\n<address class=\"author-bio__author-card__3h9uA\" readability=\"3.7488789237668\">\n<div class=\"author-bio__author-wrapper__3HHLV\"><a class=\"author-bio__author-image__3uDqF\" href=\"https:\/\/www.reuters.com\/authors\/raphael-satter\/\"><\/p>\n<div data-testid=\"Image\"><noscript><img decoding=\"async\" src=\"https:\/\/s3.amazonaws.com\/arc-authors\/reuters\/fdae37cc-f469-4f9b-a0be-7227a68598fb.jpg\"><\/noscript><\/div>\n<p><\/a><\/div>\n<p data-testid=\"Body\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__base__22dCE body__small_body__2vQyf author-bio__description__3uv33\">Reporter covering cybersecurity, surveillance, and disinformation for Reuters. Work has included investigations into state-sponsored espionage, deepfake-driven propaganda, and mercenary hacking.<\/p>\n<\/address>\n<address class=\"author-bio__author-card__3h9uA\" readability=\"0\">\n<div class=\"author-bio__author-wrapper__3HHLV\"><a class=\"author-bio__author-image__3uDqF\" href=\"https:\/\/www.reuters.com\/authors\/christopher-bing\/\"><\/p>\n<div data-testid=\"Image\"><noscript><img decoding=\"async\" src=\"https:\/\/s3.amazonaws.com\/arc-authors\/reuters\/ca088c83-d0c6-45f2-86b1-3e14a71415d1.png\"><\/noscript><\/div>\n<p><\/a><\/div>\n<p data-testid=\"Body\" class=\"text__text__1FZLe text__dark-grey__3Ml43 text__regular__2N1Xr text__small__1kGq2 body__base__22dCE body__small_body__2vQyf author-bio__description__3uv33\">Award-winning reporter covering the intersection between technology and national security with a focus on how the evolving cybersecurity landscape affects government and business.<\/p>\n<\/address>\n<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34852\/Cloud-Company-Assisted-17-Different-Hacking-Groups.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53026,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10617],"class_list":["post-53025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackermalwarecybercrimeiran"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud Company Assisted 17 Different Hacking Groups 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Company Assisted 17 Different Hacking Groups 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-01T15:44:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/JYESPLFHM5OKPHMNYCT4FCICYE.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-company-assisted-17-different-hacking-groups\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-company-assisted-17-different-hacking-groups\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cloud Company Assisted 17 Different Hacking Groups\",\"datePublished\":\"2023-08-01T15:44:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-company-assisted-17-different-hacking-groups\\\/\"},\"wordCount\":607,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-company-assisted-17-different-hacking-groups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cloud-company-assisted-17-different-hacking-groups-scaled.jpg\",\"keywords\":[\"headline,hacker,malware,cybercrime,iran\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-company-assisted-17-different-hacking-groups\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-company-assisted-17-different-hacking-groups\\\/\",\"name\":\"Cloud Company Assisted 17 Different Hacking Groups 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-company-assisted-17-different-hacking-groups\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-company-assisted-17-different-hacking-groups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cloud-company-assisted-17-different-hacking-groups-scaled.jpg\",\"datePublished\":\"2023-08-01T15:44:43+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-company-assisted-17-different-hacking-groups\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-company-assisted-17-different-hacking-groups\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-company-assisted-17-different-hacking-groups\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cloud-company-assisted-17-different-hacking-groups-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cloud-company-assisted-17-different-hacking-groups-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cloud-company-assisted-17-different-hacking-groups\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,malware,cybercrime,iran\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermalwarecybercrimeiran\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud Company Assisted 17 Different Hacking Groups\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Company Assisted 17 Different Hacking Groups 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Company Assisted 17 Different Hacking Groups 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-01T15:44:43+00:00","og_image":[{"url":"https:\/\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/JYESPLFHM5OKPHMNYCT4FCICYE.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cloud Company Assisted 17 Different Hacking Groups","datePublished":"2023-08-01T15:44:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/"},"wordCount":607,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/cloud-company-assisted-17-different-hacking-groups-scaled.jpg","keywords":["headline,hacker,malware,cybercrime,iran"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/","url":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/","name":"Cloud Company Assisted 17 Different Hacking Groups 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/cloud-company-assisted-17-different-hacking-groups-scaled.jpg","datePublished":"2023-08-01T15:44:43+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/cloud-company-assisted-17-different-hacking-groups-scaled.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/cloud-company-assisted-17-different-hacking-groups-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cloud-company-assisted-17-different-hacking-groups\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,malware,cybercrime,iran","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwarecybercrimeiran\/"},{"@type":"ListItem","position":3,"name":"Cloud Company Assisted 17 Different Hacking Groups"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53025"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53025\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53026"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}