{"id":5974,"date":"2018-07-11T19:33:07","date_gmt":"2018-07-11T19:33:07","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/"},"modified":"2018-07-11T19:33:07","modified_gmt":"2018-07-11T19:33:07","slug":"us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/","title":{"rendered":"US military manuals hawked on dark web after files left rattling in insecure FTP server"},"content":{"rendered":"<div readability=\"30.533333333333\">\n<h2>Wow, so servicemen forget to change their default logins too<\/h2>\n<p> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/08\/18\/raf_reaper_crown_copyright.jpg?x=442&amp;y=293&amp;crop=1\" alt=\"A Royal Air Force MQ-9 Reaper drone. Crown copyright\" width=\"442\" height=\"293\" class=\"article_img\"\/><\/p>\n<p>MQ-9 Reaper manuals were among the leaked documents<\/p>\n<\/div>\n<div id=\"body\" readability=\"108.46847330292\">\n<p>Sensitive US Air Force documents have <a target=\"_blank\" href=\"https:\/\/www.recordedfuture.com\/reaper-drone-documents-leaked\/\">leaked onto the dark web<\/a> as part of an attempted sale of drone manuals.<\/p>\n<p>Threat intel firm Recorded Future picked up on an auction for purported export-controlled documents pertaining to the MQ-9 Reaper drone during its regular work monitoring the dark web for criminal activities last month. Recorded Future&#8217;s Insikt Group analysts, posing as potential buyers, <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.recordedfuture.com\/reaper-drone-documents-leaked\/\">said<\/a> they&#8217;d engaged the newly registered English-speaking hacker before confirming the validity of the compromised documents.<\/p>\n<p>Further interactions allowed analysts to discover other leaked military information available from the same threat actor. The hacker claimed he had access to a large number of military documents from an unidentified officer.<\/p>\n<p>These documents included a M1 Abrams tank maintenance manual, a tank platoon training course, a crew survival course, and documentation on improvised explosive device mitigation tactics.<\/p>\n<p>Subsequent work revealed that this info was actually pulled from at least one and more likely a series of insecure File Transfer Protocol (FTP) servers. &#8220;The attacker used a widely known tactic of gaining access to vulnerable Netgear routers with improperly setup FTP login credentials,&#8221; Recorded Future said.<\/p>\n<p>Two years ago researchers <a target=\"_blank\" href=\"https:\/\/www.sfgate.com\/business\/article\/Netgear-Add-a-password-or-risk-losing-your-data-6811071.php\">warned<\/a> that Netgear routers with remote data access capabilities were susceptible to attack if the default FTP authentication credentials were not updated. Despite the stretch of time, it&#8217;s still a common issue. During its research, Recorded Future identified more than 4,000 routers susceptible to attack.<\/p>\n<div class=\"CaptionedImage Border width_85\"><a href=\"https:\/\/regmedia.co.uk\/2018\/07\/11\/drone_sale_ad.jpg\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/07\/11\/drone_sale_ad.jpg\" alt=\"Drone sale dark web market ad [source Recorded Future blog post]\" title=\"Drone sale dark web market ad\" height=\"458\" width=\"600\"\/><\/a><\/p>\n<p class=\"text_center\">Dark web market drone ad<\/p>\n<\/div>\n<p>Exploitation was far from difficult. Utilising Shodan&#8217;s machine data search engine, the hacker scanned large segments of the internet for high-profile misconfigured routers that use a standard port 21 to hijack all valuable documents from compromised machines.<\/p>\n<p>The captain, whose computer had seemingly been compromised recently, had completed a cybersecurity awareness course, but he did not set a password for an FTP server hosting sensitive files. This allowed the hacker to easily download the drone manuals, said the researchers. The precise source of other the other dozen or so manuals the hacker offered for sale remains undetermined.<\/p>\n<p>&#8220;The source was never disclosed to Recorded Future. However, judging by the content, they appear to be stolen from the Pentagon or from a US Army official.&#8221;<\/p>\n<p>The hacker let slip that he was also in the habit of watching sensitive live footage from border surveillance cameras and airplanes. &#8220;The actor was even bragging about accessing footage from a MQ-1 Predator flying over Choctawhatchee Bay in the Gulf of Mexico.&#8221;<\/p>\n<p>Researchers identified the &#8220;name and country of residence&#8221; of an individual associated with a group it reckons is responsible for the illicit sale of US military manuals. Recorded Future has not identified the country responsible but said that it is continuing to &#8220;assist law enforcement in their investigation&#8221; of the trade in classified documents.<\/p>\n<p>Early indications suggest a single hacker or small group of associates, rather than organised crime or state-sponsored hackers.<\/p>\n<p>All sorts of bad stuff \u2013 including personal information \u2013 is hawked through dark web bazaars but classified material is seldom offered. Recorded Future said the latest case is almost unprecedented.<\/p>\n<p>&#8220;It is not uncommon to uncover sensitive data like personally identifiable information, login credentials, financial information, and medical records being offered for sale on the dark web. However, it is incredibly rare for criminal hackers to steal and then attempt to sell military documents on an open market.&#8221; \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<\/div>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/07\/11\/us_military_manual_dark_net_sale\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wow, so servicemen forget to change their default logins too Sensitive US Air Force documents have leaked onto the dark web as part of an attempted sale of drone manuals.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":5975,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-5974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>US military manuals hawked on dark web after files left rattling in insecure FTP server 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"US military manuals hawked on dark web after files left rattling in insecure FTP server 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-11T19:33:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"442\" \/>\n\t<meta property=\"og:image:height\" content=\"293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"US military manuals hawked on dark web after files left rattling in insecure FTP server\",\"datePublished\":\"2018-07-11T19:33:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\\\/\"},\"wordCount\":603,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\\\/\",\"name\":\"US military manuals hawked on dark web after files left rattling in insecure FTP server 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server.jpg\",\"datePublished\":\"2018-07-11T19:33:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server.jpg\",\"width\":442,\"height\":293},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"US military manuals hawked on dark web after files left rattling in insecure FTP server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"US military manuals hawked on dark web after files left rattling in insecure FTP server 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/","og_locale":"en_US","og_type":"article","og_title":"US military manuals hawked on dark web after files left rattling in insecure FTP server 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-11T19:33:07+00:00","og_image":[{"width":442,"height":293,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"US military manuals hawked on dark web after files left rattling in insecure FTP server","datePublished":"2018-07-11T19:33:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/"},"wordCount":603,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/","url":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/","name":"US military manuals hawked on dark web after files left rattling in insecure FTP server 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server.jpg","datePublished":"2018-07-11T19:33:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server.jpg","width":442,"height":293},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/us-military-manuals-hawked-on-dark-web-after-files-left-rattling-in-insecure-ftp-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"US military manuals hawked on dark web after files left rattling in insecure FTP server"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/5974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=5974"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/5974\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/5975"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=5974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=5974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=5974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}