{"id":56742,"date":"2024-08-02T13:22:16","date_gmt":"2024-08-02T13:22:16","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36173\/Fake-Google-Authenticator-Used-To-Deliver-Malware-On-GitHub.html"},"modified":"2024-08-02T13:22:16","modified_gmt":"2024-08-02T13:22:16","slug":"fake-google-authenticator-used-to-deliver-malware-on-github","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/","title":{"rendered":"Fake Google Authenticator Used To Deliver Malware On GitHub"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/08\/080124_google_authenticator.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Google <a href=\"https:\/\/www.scmagazine.com\/brief\/malicious-google-ads-for-messaging-apps-leveraged-for-malware-distribution\" target=\"_blank\" rel=\"noreferrer noopener\">brand abuse <\/a>is more popular than ever as attackers were observed over the past few days setting up fake ads to lure users to download the popular <a href=\"https:\/\/www.scmagazine.com\/news\/google-authenticators-syncing-security-concerns\" target=\"_blank\" rel=\"noreferrer noopener\">Google Authenticator<\/a> multi-factor authentication app only to find out they downloaded malware from a <a href=\"https:\/\/www.scmagazine.com\/news\/3000-github-accounts-found-distributing-malware\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub site.<\/a><\/p>\n<p>Malwarebytes researchers explained in <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/07\/threat-actor-impersonates-google-via-fake-ad-for-authenticator\" target=\"_blank\" rel=\"noreferrer noopener\">a July 30 blog post<\/a> that hosting the malware file on GitHub let the threat actor use a trusted cloud resource that\u2019s unlikely to get blocked via conventional means.<\/p>\n<p>The researchers explained that while GitHub has become the de facto software repository, not all applications or scripts hosted on it are legitimate. Anyone can create an account and upload files, and the Malwarebytes researchers said that\u2019s exactly what the threat actor did under the username&nbsp;&#8220;<a href=\"https:\/\/github.com\/authe-gogle\/\" target=\"_blank\" rel=\"noreferrer noopener\">authe-gogle<\/a>,&#8221; creating the&nbsp;&#8220;authgg&#8221;&nbsp;repository that contains the malicious&nbsp;Authenticator.exe.<\/p>\n<p>\u201cWe should note that Google Authenticator is a well-known and trusted multi-factor authentication tool, so there\u2019s some irony in potential victims getting compromised while trying to improve their security posture,\u201d wrote the researchers. \u201cWe recommend avoiding clicking on ads to download any kind of software and instead visiting the official repositories directly.\u201d<\/p>\n<p>Anne Cutler, cybersecurity expert at Keeper Security, said the rapid advancement in technological tools, including AI, has significantly amplified the sophistication and scale of cybercriminal tactics. Cutler said AI allows for the creation of highly convincing malware ads and deep fakes, which flood digital spaces with malicious content.<\/p>\n<p>\u201cRecent cases where malicious ads appear official \u2014 and have even been verified by Google \u2014 illustrate the increasingly sophisticated methods used by threat actors,\u201d said Cutler. \u201cThese criminals are evading detection by creating numerous accounts and using techniques like text manipulation and cloaking to deceive both automated systems and human reviewers.\u201d<\/p>\n<p>Cutler said to effectively combat these threats, cybersecurity teams must adopt a multi-faceted approach that addresses both technological and human elements. Awareness campaigns and regular training are critical to keeping employees and users informed about the risks of malvertising and the latest tactics employed by threat actors. Teams also need to adopt enhanced endpoint security, including up-to-date antivirus software, and a robust endpoint protection platform. Regular audits and policy updates also help ensure compliance and adaptability to the ever-changing threat landscape, said Cutler.<\/p>\n<p>Ken Dunham, cyber threat director&nbsp;at the Qualys Threat Research Unit, added that users are forced into a horrible game of \u201ctruth or dare\u201d every day, never sure if what they are clicking on is legitimate or not. The ability to identify if an advertisement is legitimate has gotten increasingly difficult as adversaries mature their tactics, techniques and procedures to trick users into falling for a phishing or malware attack.<\/p>\n<p>\u201cEmployees, and consumers alike, are strongly advised not to jailbreak their phones and only install apps from official marketplace locations to best lower their risk from fraudulent advertisements or applications,\u201d said Dunham.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36173\/Fake-Google-Authenticator-Used-To-Deliver-Malware-On-GitHub.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":56743,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9334],"class_list":["post-56742","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemalwaregoogle"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fake Google Authenticator Used To Deliver Malware On GitHub 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fake Google Authenticator Used To Deliver Malware On GitHub 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T13:22:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/08\/080124_google_authenticator.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-google-authenticator-used-to-deliver-malware-on-github\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-google-authenticator-used-to-deliver-malware-on-github\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fake Google Authenticator Used To Deliver Malware On GitHub\",\"datePublished\":\"2024-08-02T13:22:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-google-authenticator-used-to-deliver-malware-on-github\\\/\"},\"wordCount\":488,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-google-authenticator-used-to-deliver-malware-on-github\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/fake-google-authenticator-used-to-deliver-malware-on-github.jpg\",\"keywords\":[\"headline,malware,google\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-google-authenticator-used-to-deliver-malware-on-github\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-google-authenticator-used-to-deliver-malware-on-github\\\/\",\"name\":\"Fake Google Authenticator Used To Deliver Malware On GitHub 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-google-authenticator-used-to-deliver-malware-on-github\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-google-authenticator-used-to-deliver-malware-on-github\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/fake-google-authenticator-used-to-deliver-malware-on-github.jpg\",\"datePublished\":\"2024-08-02T13:22:16+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-google-authenticator-used-to-deliver-malware-on-github\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-google-authenticator-used-to-deliver-malware-on-github\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-google-authenticator-used-to-deliver-malware-on-github\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/fake-google-authenticator-used-to-deliver-malware-on-github.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/fake-google-authenticator-used-to-deliver-malware-on-github.jpg\",\"width\":1280,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-google-authenticator-used-to-deliver-malware-on-github\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware,google\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemalwaregoogle\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fake Google Authenticator Used To Deliver Malware On GitHub\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fake Google Authenticator Used To Deliver Malware On GitHub 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/","og_locale":"en_US","og_type":"article","og_title":"Fake Google Authenticator Used To Deliver Malware On GitHub 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-08-02T13:22:16+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/08\/080124_google_authenticator.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fake Google Authenticator Used To Deliver Malware On GitHub","datePublished":"2024-08-02T13:22:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/"},"wordCount":488,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/08\/fake-google-authenticator-used-to-deliver-malware-on-github.jpg","keywords":["headline,malware,google"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/","url":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/","name":"Fake Google Authenticator Used To Deliver Malware On GitHub 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/08\/fake-google-authenticator-used-to-deliver-malware-on-github.jpg","datePublished":"2024-08-02T13:22:16+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/08\/fake-google-authenticator-used-to-deliver-malware-on-github.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/08\/fake-google-authenticator-used-to-deliver-malware-on-github.jpg","width":1280,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fake-google-authenticator-used-to-deliver-malware-on-github\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware,google","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwaregoogle\/"},{"@type":"ListItem","position":3,"name":"Fake Google Authenticator Used To Deliver Malware On GitHub"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56742"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56742\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/56743"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}