{"id":54766,"date":"2023-12-05T14:25:55","date_gmt":"2023-12-05T14:25:55","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35264\/Cyber-Av3ngers-Gang-Hacks-Industrial-Controllers-Across-US.html"},"modified":"2023-12-05T14:25:55","modified_gmt":"2023-12-05T14:25:55","slug":"cyber-av3ngers-gang-hacks-industrial-controllers-across-us","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/","title":{"rendered":"Cyber Av3ngers Gang Hacks Industrial Controllers Across US"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/12\/industrial-controls-water.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>U.S. federal agencies have confirmed the Iranian threat group that breached a Pennsylvanian water authority pump station controller also compromised similar systems at facilities in other states.<\/p>\n<p>The <a href=\"https:\/\/www.scmagazine.com\/brief\/pennsylvania-water-authority-subjected-to-iranian-cyberattack\" target=\"_blank\" rel=\"noreferrer noopener\">Municipal Water Authority of Aliquippa<\/a> (MWAA) was forced to temporarily shut down one of its remote pump stations, supplying two towns, following an Oct. 25 attack on a programmable logic controller (PLC) used to regulate water pressure.<\/p>\n<p>The PLC, manufactured by Israeli company Unitronics, is commonly used in water and wastewater facilities, and in industrial plants across a range of other industries.<\/p>\n<p>The attack was carried out by Cyber Av3ngers, an advanced persistent threat (APT) group linked to the Iranian Government\u2019s Islamic Revolutionary Guard Corps (IRGC). The towns\u2019 water supply was unaffected by the attack, but the APT group left a message on the PLC console which read: \u201cEvery equipment \u2018made in Israel\u2019 is Cyber Av3ngers legal target\u201d.<\/p>\n<p><a href=\"https:\/\/x.com\/fullpintbeerpgh\/status\/1729568323455594998\" target=\"_blank\" rel=\"noreferrer noopener\">An identical message<\/a> was left on a Unitronics PLC at Pittsburgh\u2019s Full Pint Beer brewery which was also hacked over Thanksgiving weekend. MWAA chairman Matthew Mottes was reported saying authorities told him four other utilities and a public aquarium were also hacked.<\/p>\n<h2>Feds confirm gang hit \u2018multiple\u2019 facilities<\/h2>\n<p>The occurrence of multiple attacks was confirmed in a Dec. 1 <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/12\/01\/cisa-and-partners-release-joint-advisory-irgc-affiliated-cyber-actors-exploiting-plcs\" target=\"_blank\" rel=\"noreferrer noopener\">joint cybersecurity advisory<\/a> released by the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Environmental Protection Agency (EPA), and the Israel National Cyber Directorate (INCD).<\/p>\n<p>\u201cThe victims span multiple U.S. states,\u201d the advisory said, although it did not name any, other than the MWAA, or confirm how many there were.<\/p>\n<p>The agencies said Unitronics PLCs and related controllers were often exposed to the internet because they were commonly used in situations where remote control and monitoring was required.<\/p>\n<p>The Cyber Av3ngers attacks were centered around defacing the controller\u2019s user interface and possibly rendering the PLC inoperative, but it was conceivable further network access could have been gained, they said.<\/p>\n<p>\u201cIt is not known if additional cyber activities deeper into these PLCs or related control networks and components were intended or achieved. Organizations should consider and evaluate their systems for these possibilities.\u201d<\/p>\n<h2>Hackers take advantage of default passwords<\/h2>\n<p>The breached devices were using the default Unitronics PLC password (\u201c1111\u201d) and the default port (20256), the advisory said.<\/p>\n<p>The agencies said organizations should change all default passwords on PLCs and human machine interfaces (HMIs) use strong passwords and implement multifactor authentication for access to operational technology networks.<\/p>\n<p>\u201cIf you require remote access, implement a firewall and\/or virtual private network (VPN) in front of the PLC to control network access. A VPN or gateway device can enable multifactor authentication for remote access even if the PLC does not support multifactor authentication.\u201d<\/p>\n<p>They said organizations should create strong backups of the logic and configurations of PLCs to enable fast recovery.<\/p>\n<p>\u201cFamiliarize yourself with factory resets and backup deployment as preparation in the event of ransomware activity.\u201d<\/p>\n<h2>Lawmakers call for inquiry<\/h2>\n<p>In a Nov. 28 <a href=\"https:\/\/deluzio.house.gov\/media\/press-releases\/deluzio-casey-fetterman-call-doj-investigation-cyberattack-aliquippa-water\" target=\"_blank\" rel=\"noreferrer noopener\">letter to U.S. Attorney General Merrick Garland<\/a>, Pennsylvania Congressman Chris Deluzio and the state\u2019s Senators, Bob Casey and John Fetterman, called for the Department of Justice to investigate the MWAA attack.<\/p>\n<p>\u201cAny attack on our nation\u2019s critical infrastructure is unacceptable. If a hack like this can happen here in Western Pennsylvania, it can happen elsewhere in the United States,\u201d the letter said.<\/p>\n<p>\u201cFolks in Pennsylvania and across the country deserve peace of mind that basic infrastructure such as their drinking water is safe from nation-state adversaries and terrorist organizations.\u201d<\/p>\n<p>In October the EPA withdraw its guidance <a href=\"https:\/\/www.scmagazine.com\/brief\/water-cybersecurity-regulations-withdrawn\" target=\"_blank\" rel=\"noreferrer noopener\">requiring cybersecurity audits for water utilities<\/a> across the country following a lawsuit filed by Arkansas, Iowa, and Missouri, and supported by trade groups.<\/p>\n<p>\u201cEPA continues to believe that adopting cybersecurity best practices at public water systems is essential to providing safe and reliable drinking water,\u201d the agency <a href=\"https:\/\/www.awwa.org\/Portals\/0\/AWWA\/Government\/101323Insiders\/Action-Memo-Rescinding-Cyber-Memo-October-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">said in a memo<\/a> confirming the withdrawal of its guidance. \u201cCybersecurity attacks on water and wastewater systems occur frequently and are a significant threat to their operations.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35264\/Cyber-Av3ngers-Gang-Hacks-Industrial-Controllers-Across-US.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":54767,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10516],"class_list":["post-54766","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerscada"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Av3ngers Gang Hacks Industrial Controllers Across US 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Av3ngers Gang Hacks Industrial Controllers Across US 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-05T14:25:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/12\/industrial-controls-water.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyber Av3ngers Gang Hacks Industrial Controllers Across US\",\"datePublished\":\"2023-12-05T14:25:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/\"},\"wordCount\":681,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us.jpg\",\"keywords\":[\"headline,hacker,scada\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/\",\"name\":\"Cyber Av3ngers Gang Hacks Industrial Controllers Across US 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us.jpg\",\"datePublished\":\"2023-12-05T14:25:55+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,scada\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerscada\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Av3ngers Gang Hacks Industrial Controllers Across US\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Av3ngers Gang Hacks Industrial Controllers Across US 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Av3ngers Gang Hacks Industrial Controllers Across US 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-12-05T14:25:55+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/12\/industrial-controls-water.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyber Av3ngers Gang Hacks Industrial Controllers Across US","datePublished":"2023-12-05T14:25:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/"},"wordCount":681,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us.jpg","keywords":["headline,hacker,scada"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/","url":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/","name":"Cyber Av3ngers Gang Hacks Industrial Controllers Across US 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us.jpg","datePublished":"2023-12-05T14:25:55+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyber-av3ngers-gang-hacks-industrial-controllers-across-us\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,scada","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerscada\/"},{"@type":"ListItem","position":3,"name":"Cyber Av3ngers Gang Hacks Industrial Controllers Across US"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54766"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54766\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/54767"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}