{"id":57314,"date":"2024-10-07T13:32:27","date_gmt":"2024-10-07T13:32:27","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36439\/Apple-Couldnt-Tell-Fake-iPhones-From-Real-Ones-Lost-2.5M-In-Scam.html"},"modified":"2024-10-07T13:32:27","modified_gmt":"2024-10-07T13:32:27","slug":"apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/","title":{"rendered":"Apple Couldn&#8217;t Tell Fake iPhones From Real Ones, Lost $2.5M In Scam"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/10\/GettyImages-869590636.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Two men involved in an elaborate scheme duping Apple into replacing about 6,000 counterfeit iPhones with genuine iPhones were sentenced to prison this week, the US Department of Justice <a href=\"https:\/\/www.justice.gov\/opa\/pr\/two-foreign-nationals-sentenced-multimillion-dollar-scheme-defraud-apple-inc-out-6000\">announced<\/a> Thursday.<\/p>\n<p>Together with their co-conspirators, the 34-year-old scammers, Haotian Sun and Pengfei Xue, squeezed Apple for about $2.5 million, as employees for years failed to detect what the DOJ <a href=\"https:\/\/www.justice.gov\/usao-dc\/pr\/two-maryland-residents-found-guilty-multimillion-dollar-scheme-defraud-apple-inc-out\">described<\/a> as a rather &#8220;sophisticated&#8221; scheme between 2017 and 2019.<\/p>\n<p>Now Sun has been sentenced to 57 months in prison and must pay more than $1 million to Apple in restitution. For his part, Xue was sentenced to 54 months and ordered to pay $397,800 in restitution, the DOJ said. Additionally, both men must also serve three years of supervised release and forfeit thousands more following the judgment.<\/p>\n<p>The scheme depended on tricking Apple into accepting bogus phones during returns by spoofing serial numbers or International Mobile Equipment Identity (IMEI) numbers linked to real customers&#8217; iPhones that were still under warranty. (Apple provides a one-year warranty for new iPhones discovered to have defects and sells insurance plans to extend the warranties.)<\/p>\n<p>The scammers were caught and convicted of mail fraud and conspiracy to commit mail fraud after an Apple investigator tipped law enforcement off, a 2019 <a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/10\/US-v-Sun-Criminal-Complaint-Affidavit-12-2-19.pdf\">affidavit<\/a> from postal inspector Stephen Cohen said.<\/p>\n<p>Law enforcement intercepted packages and confirmed that thousands of counterfeit phones were being shipped from China, then submitted to Apple for repairs either by mail or in person. These counterfeit phones, Cohen said, were either out of warranty or contained counterfeit parts, but Apple &#8220;wrongly&#8221; believed that they were real phones under real warranties, often replacing dozens of fake phones fraudulently returned in a single shipment, Cohen said.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36439\/Apple-Couldnt-Tell-Fake-iPhones-From-Real-Ones-Lost-2.5M-In-Scam.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57315,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[11074],"class_list":["post-57314","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinephonecybercrimefraudapple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple Couldn&#039;t Tell Fake iPhones From Real Ones, Lost $2.5M In Scam 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Couldn&#039;t Tell Fake iPhones From Real Ones, Lost $2.5M In Scam 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-07T13:32:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/10\/GettyImages-869590636.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apple Couldn&#8217;t Tell Fake iPhones From Real Ones, Lost $2.5M In Scam\",\"datePublished\":\"2024-10-07T13:32:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\\\/\"},\"wordCount\":287,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam.jpg\",\"keywords\":[\"headline,phone,cybercrime,fraud,apple\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\\\/\",\"name\":\"Apple Couldn't Tell Fake iPhones From Real Ones, Lost $2.5M In Scam 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam.jpg\",\"datePublished\":\"2024-10-07T13:32:27+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam.jpg\",\"width\":1024,\"height\":683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,phone,cybercrime,fraud,apple\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinephonecybercrimefraudapple\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Apple Couldn&#8217;t Tell Fake iPhones From Real Ones, Lost $2.5M In Scam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple Couldn't Tell Fake iPhones From Real Ones, Lost $2.5M In Scam 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/","og_locale":"en_US","og_type":"article","og_title":"Apple Couldn't Tell Fake iPhones From Real Ones, Lost $2.5M In Scam 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-10-07T13:32:27+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/10\/GettyImages-869590636.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apple Couldn&#8217;t Tell Fake iPhones From Real Ones, Lost $2.5M In Scam","datePublished":"2024-10-07T13:32:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/"},"wordCount":287,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam.jpg","keywords":["headline,phone,cybercrime,fraud,apple"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/","url":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/","name":"Apple Couldn't Tell Fake iPhones From Real Ones, Lost $2.5M In Scam 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam.jpg","datePublished":"2024-10-07T13:32:27+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam.jpg","width":1024,"height":683},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apple-couldnt-tell-fake-iphones-from-real-ones-lost-2-5m-in-scam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,phone,cybercrime,fraud,apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinephonecybercrimefraudapple\/"},{"@type":"ListItem","position":3,"name":"Apple Couldn&#8217;t Tell Fake iPhones From Real Ones, Lost $2.5M In Scam"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57314"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57314\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57315"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}