{"id":57388,"date":"2024-10-14T13:11:58","date_gmt":"2024-10-14T13:11:58","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36468\/Lynx-Ransomware-Analyses-Reveal-Similarities-To-INC-Ransom.html"},"modified":"2024-10-14T13:11:58","modified_gmt":"2024-10-14T13:11:58","slug":"lynx-ransomware-analyses-reveal-similarities-to-inc-ransom","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/","title":{"rendered":"Lynx Ransomware Analyses Reveal Similarities To INC Ransom"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.cyberriskalliance.com\/wp-content\/uploads\/2024\/10\/AdobeStock_349176221.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Lynx ransomware, a newer ransomware-as-a-service (RaaS) that emerged around July may have stemmed from the INC Ransom source code that was reportedly sold in May, according to multiple analyses of the Lynx strain.<\/p>\n<p>The Lynx gang maintains both clear web and dark web leak sites and has claimed more than 20 victims since it first appeared, according to analyses by <a href=\"https:\/\/www.nextron-systems.com\/2024\/10\/11\/in-depth-analysis-of-lynx-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nextron Systems<\/a> and <a href=\"https:\/\/unit42.paloaltonetworks.com\/inc-ransomware-rebrand-to-lynx\/\" target=\"_blank\" rel=\"noreferrer noopener\">Palo Alto Networks\u2019 Unit 42, both published this week<\/a>.<\/p>\n<p>So far, the RaaS group has claimed victims in the retail, real estate, architecture, financial services and environmental services in the United States and United Kingdom, Unit 42 reported, and claims on its website that it does not target governmental organizations, hospitals or nonprofits.<\/p>\n<p>Connections between Lynx and INC Ransom were <a href=\"https:\/\/www.rapid7.com\/blog\/post\/2024\/09\/12\/ransomware-groups-demystified-lynx-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">previously drawn by Rapid7<\/a>, which first analyzed the ransomware in September. Both Rapid7 and Unit 42 performed a binary diff analysis on the Lynx and INC Ransom strains, which showed an overall 48% similarity between the two versions, and a 70.8% similarity in functions specifically.<\/p>\n<p>Rapid7 opined that the comparison was \u201cnot enough to prove fully that Lynx was derived from INC ransomware\u2019s source code,\u201d while Unit 42 stated the overlap in functions \u201cstrongly suggests that the developers of Lynx ransomware have borrowed and repurposed a considerable portion of the INC codebase.\u201d<\/p>\n<p>INC Ransom\u2019s source code was purportedly <a href=\"https:\/\/www.scworld.com\/brief\/cybercriminal-puts-inc-ransom-source-code-up-for-sale\" target=\"_blank\" rel=\"noreferrer noopener\">put on sale<\/a> in May for a price of $300,000, which included both Windows and Linux\/ESXi versions of the ransomware. INC Ransom, which first appeared in August 2023, has claimed at least 64 victims and <a href=\"https:\/\/www.scworld.com\/brief\/us-healthcare-sector-subjected-to-attacks-with-inc-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">frequently targeted healthcare organizations<\/a>, including <a href=\"https:\/\/www.scworld.com\/brief\/inc-ransom-attack-disrupts-mclaren-health-care\" target=\"_blank\" rel=\"noreferrer noopener\">McLaren Health Care<\/a> and the <a href=\"https:\/\/www.scworld.com\/brief\/over-800k-impacted-by-city-of-hope-systems-breach\" target=\"_blank\" rel=\"noreferrer noopener\">City of Hope cancer hospital operator and clinical research organization<\/a>.<\/p>\n<p>While a Linux version of INC ransomware was included in the purported sale, no such version of the Lynx ransomware has yet been discovered. Unit 42 reported discovering both Lynx and INC ransomware samples in July and August 2024, and Lynx samples only in September 2024.<\/p>\n<p>The Lynx ransomware itself incorporates several techniques, including termination of processes and services containing terms such as \u201csql,\u201d \u201cveeam,\u201d \u201cbackup,\u201d \u201cjava\u201d and \u201cexchange,\u201d privilege escalation through enabling of \u201cSeTakeOwnershipPrivilege\u201d on the current process token, and deletion of shadow copies through DeviceIoControl, according to Nextron.<\/p>\n<p>The ransomware encrypts files using AES-128 in CTR mode and Curve25519 Donna encryption algorithms, and also uses the Restart Manager API \u201cRstrtMgr\u201d to enable encryption of files that are currently in use or locked by other applications, Unit 42 reports. Encrypted files are given the file extension .lynx.<\/p>\n<p>The Lynx ransom notes instructs victims to install the Tor browser to contact the threat actors and provides addresses for the group\u2019s dark web sites along with a victim ID that can be used to log in to the leak site.<\/p>\n<p>One unique feature of Lynx is that it includes a function to print the ransom note on any printer connected to the compromised system, Nextron Systems found. It first uses EnumPrintersW to retrieve a list of connected printers, then uses StartDocPrinterW and StartPagePrinter to start the printing process for the ransom note document before using WritePrinter to complete the print.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36468\/Lynx-Ransomware-Analyses-Reveal-Similarities-To-INC-Ransom.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57389,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8989],"class_list":["post-57388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemalwarecybercrimecryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lynx Ransomware Analyses Reveal Similarities To INC Ransom 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lynx Ransomware Analyses Reveal Similarities To INC Ransom 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-14T13:11:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.cyberriskalliance.com\/wp-content\/uploads\/2024\/10\/AdobeStock_349176221.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Lynx Ransomware Analyses Reveal Similarities To INC Ransom\",\"datePublished\":\"2024-10-14T13:11:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\\\/\"},\"wordCount\":516,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom.jpg\",\"keywords\":[\"headline,malware,cybercrime,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\\\/\",\"name\":\"Lynx Ransomware Analyses Reveal Similarities To INC Ransom 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom.jpg\",\"datePublished\":\"2024-10-14T13:11:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom.jpg\",\"width\":800,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware,cybercrime,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemalwarecybercrimecryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Lynx Ransomware Analyses Reveal Similarities To INC Ransom\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lynx Ransomware Analyses Reveal Similarities To INC Ransom 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/","og_locale":"en_US","og_type":"article","og_title":"Lynx Ransomware Analyses Reveal Similarities To INC Ransom 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-10-14T13:11:58+00:00","og_image":[{"url":"https:\/\/files.cyberriskalliance.com\/wp-content\/uploads\/2024\/10\/AdobeStock_349176221.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Lynx Ransomware Analyses Reveal Similarities To INC Ransom","datePublished":"2024-10-14T13:11:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/"},"wordCount":516,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom.jpg","keywords":["headline,malware,cybercrime,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/","url":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/","name":"Lynx Ransomware Analyses Reveal Similarities To INC Ransom 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom.jpg","datePublished":"2024-10-14T13:11:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/10\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom.jpg","width":800,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/lynx-ransomware-analyses-reveal-similarities-to-inc-ransom\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware,cybercrime,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwarecybercrimecryptography\/"},{"@type":"ListItem","position":3,"name":"Lynx Ransomware Analyses Reveal Similarities To INC Ransom"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57388"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57388\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57389"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}