{"id":54764,"date":"2023-12-05T14:26:01","date_gmt":"2023-12-05T14:26:01","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35265\/MIPS-Chips-Targeted-By-New-P2Pinfect-Malware-In-Multiple-Attacks.html"},"modified":"2023-12-05T14:26:01","modified_gmt":"2023-12-05T14:26:01","slug":"mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/","title":{"rendered":"MIPS Chips Targeted By New P2Pinfect Malware In Multiple Attacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/12\/CPU-MIPS.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A new variant of P2Pinfect has been observed targeting embedded IoT devices based on 32-bit MIPS processors, malware that aims to bruteforce Secure Shell (SSH) access to these devices.<\/p>\n<p>Written in <a href=\"https:\/\/www.scmagazine.com\/brief\/novel-rust-based-agenda-ransomware-variant-discovered\">Rust<\/a>, the P2Pinfect malware acts as a botnet agent, connecting infected hosts in a peer-to-peer topology. In early samples <a href=\"https:\/\/www.scmagazine.com\/news\/p2pinfect-botnet-targets-redis-and-ssh-services\">reported on by SC Media September 20,<\/a> the malware exploited Redis servers for initial access \u2013 a relatively common technique in cloud environments.&nbsp;<\/p>\n<p>In explaining the attack, Cado Security Labs said in a Monday <a href=\"https:\/\/www.cadosecurity.com\/p2pinfect-new-variant-targets-mips-devices\/\">blog post<\/a> it\u2019s highly likely that by targeting MIPS, the P2Pinfect developers intend to infect routers and IoT devices with the malware. The researchers explained that MIPS processors are commonly used for embedded IoT devices and the architecture has been previously targeted by botnet malware, including high-profile families such as&nbsp;<a href=\"https:\/\/unit42.paloaltonetworks.com\/mirai-variant-iz1h9\/\">Mirai<\/a> and its variants.<\/p>\n<p>Matt Muir, threat intelligence lead at Cado Security, said his team believes the targeting of MIPS suggests that that threat actors behind P2Pinfect has begun to move beyond just attacking generic servers. Muir pointed out that the team found that it\u2019s possible to run the Redis server on MIPS devices via a project provided by OpenWrt, an open source router firmware project.<\/p>\n<p>\u201cOpenWrt also supports MIPS processors, so in light of this, we believe that compromised MIPS devices are being used to propagate the malware to a wider range of targets, resulting in a more powerful botnet overall,\u201d said Muir, \u201cIt\u2019s also worth noting that previous high-profile botnet families \u2013 Mirai and its derivatives \u2013 have targeted MIPS devices with great success.\u201d<\/p>\n<p>Anurag Gurtu, CPO at StrikeReady, added that the recent discovery of a new P2Pinfect variant targeting MIPS devices \u2013 especially IoT devices \u2013 &nbsp;indicates a strategic shift by the malware developers. Gurtu agreed with Muir that they are now exploiting vulnerabilities in IoT devices likely because of the widespread use of MIPS processors in these devices.<\/p>\n<p>\u201cThis move demonstrates the developers\u2019 intention to expand their botnet by infecting a broader range of devices,\u201d said Gurtu. \u201cThe sophistication of the malware, evidenced by advanced evasion techniques like VM and debugger detection, anti-forensics on Linux hosts, and the use of Rust for cross-platform development, suggests that the actors behind P2Pinfect are highly-skilled and intent on creating a robust, hard-to-detect botnet. This expansion in targeting and enhanced evasion tactics points to a strategic effort to increase the botnet&#8217;s resilience and impact while complicating analysis and mitigation efforts by security researchers.\u201d<\/p>\n<p>Emily Phelps, Director at Cyware, said shift in focus from Redis servers to embedded IoT devices suggests a strategic evolution. Phelps said many attackers are increasingly exploiting the vast, often under secured network of IoT devices, partly attributed to the widespread use of IoT devices in critical infrastructure and everyday applications, which presents a lucrative target for malicious activities.<\/p>\n<p>&nbsp;\u201cThe updated evasion mechanisms in the new P2Pinfect variant indicate a more calculated approach, possibly aimed at establishing sustained control over infected devices or creating a resilient botnet,\u201d said Phelps. \u201cThese tactics could also suggest that the attackers are anticipating and countering cybersecurity methods, showcasing a high level of awareness and adaptability.\u201d<\/p>\n<p>Andrew Barratt, vice president at Coalfire, said if the P2Pinfect malware can land in a number of common IoT devices, it\u2019s very possible that it can create its own mesh among the devices, making it incredibly hard to completely remove them, also giving multiple options for persistence, and command and control with devices typically not routinely accessible by XDR technology.<\/p>\n<p>\u201cIt\u2019s also possible that these capabilities are part of a showcasing of capability, making the malware more saleable to threat actors targeting different industry segments,\u201d noted Barratt.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35265\/MIPS-Chips-Targeted-By-New-P2Pinfect-Malware-In-Multiple-Attacks.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":54765,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[256],"class_list":["post-54764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MIPS Chips Targeted By New P2Pinfect Malware In Multiple Attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MIPS Chips Targeted By New P2Pinfect Malware In Multiple Attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-05T14:26:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/12\/CPU-MIPS.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"MIPS Chips Targeted By New P2Pinfect Malware In Multiple Attacks\",\"datePublished\":\"2023-12-05T14:26:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/\"},\"wordCount\":631,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks.jpg\",\"keywords\":[\"headline,hacker,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/\",\"name\":\"MIPS Chips Targeted By New P2Pinfect Malware In Multiple Attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks.jpg\",\"datePublished\":\"2023-12-05T14:26:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks.jpg\",\"width\":800,\"height\":462},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"MIPS Chips Targeted By New P2Pinfect Malware In Multiple Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MIPS Chips Targeted By New P2Pinfect Malware In Multiple Attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/","og_locale":"en_US","og_type":"article","og_title":"MIPS Chips Targeted By New P2Pinfect Malware In Multiple Attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-12-05T14:26:01+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/12\/CPU-MIPS.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"MIPS Chips Targeted By New P2Pinfect Malware In Multiple Attacks","datePublished":"2023-12-05T14:26:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/"},"wordCount":631,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks.jpg","keywords":["headline,hacker,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/","name":"MIPS Chips Targeted By New P2Pinfect Malware In Multiple Attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks.jpg","datePublished":"2023-12-05T14:26:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks.jpg","width":800,"height":462},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/mips-chips-targeted-by-new-p2pinfect-malware-in-multiple-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/"},{"@type":"ListItem","position":3,"name":"MIPS Chips Targeted By New P2Pinfect Malware In Multiple Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54764"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54764\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/54765"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}