{"id":3554,"date":"2022-08-31T08:34:09","date_gmt":"2022-08-31T03:04:09","guid":{"rendered":"https:\/\/www.trendstechblog.com\/?p=3554"},"modified":"2022-08-31T08:34:12","modified_gmt":"2022-08-31T03:04:12","slug":"id11-cyber-threat","status":"publish","type":"post","link":"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/","title":{"rendered":"ID11 Cyber Threat Actors Branch Out to New Forms of Extortion"},"content":{"rendered":"\n<p>Cybercriminals continue to target hard-working businesses at any opportune moment with an increasingly complex patchwork quilt of attack vectors. Following the latest trend in low-risk, high-profit extortion, DDoS attacks are now regularly being combined with ransom attacks. <a href=\"https:\/\/www.imperva.com\/learn\/ddos\/ransom-ddos-rddos\/\">What is RDDoS<\/a> and how can you protect yourself against this growing threat?<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655dcbf80dad8\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655dcbf80dad8\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/#Ransomware_The_King_of_Ransom\" title=\"Ransomware: The King of Ransom\">Ransomware: The King of Ransom<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/#The_Rise_of_Encryption-Free_Ransom\" title=\"The Rise of Encryption-Free Ransom\">The Rise of Encryption-Free Ransom<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/#The_RDDoS_Hit_List_Grows\" title=\"The RDDoS Hit List Grows\">The RDDoS Hit List Grows<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/#How_to_Protect_Yourself_From_RDDoS\" title=\"How to Protect Yourself From RDDoS\">How to Protect Yourself From RDDoS<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ransomware_The_King_of_Ransom\"><\/span><strong>Ransomware: The King of Ransom<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The concept of taking sensitive data hostage is quite old. The original ransomware &#8211; dubbed the AIDS trojan &#8211; cropped up in 1989, as its creator distributed a floppy disk at the World AIDS convention. Claiming to include information on the titular virus, the disk instead contained a payload that would first count the number of boot cycles, then &#8211; upon the number hitting 90 &#8211; proceeded to encrypt system files with a simple <a href=\"https:\/\/www.trendstechblog.com\/zoom-releases-draft-end-to-end-encryption-at-design-offering\/\">encryption <\/a>method. To have their files decrypted, victims were told to send to an address in Panama. Thankfully, the encryption was fairly simple, and decryption programs were soon commercially available.\u00a0<\/p>\n\n\n\n<p>Ransomware attacks did not hit their stride until well into the 2000s. This was partially due to a lack of suitably anonymous payment. By the time Bitcoin hit the scene in 2010, encryption technology had advanced to an almost irreversible state. Military-grade encryption is now easily available for the aspiring criminal, and the rapid adoption of cryptocurrency perfectly set the stage for major ransom attacks.&nbsp;<\/p>\n\n\n\n<p>Individuals and businesses the world over were totally unprepared for the explosion of CryptoLocker in 2013. This brand-new breed of ransomware made use of cryptography key pairs, generated from a command-and-control server, making sure victims had no way out unless they sent the ransom of $300.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Rise_of_Encryption-Free_Ransom\"><\/span>The Rise of Encryption-Free Ransom<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Ransomware\u2019s sheer profitability predicted its meteoric rise in popularity. A key component to the ransom process is removing the target\u2019s control over their data via encryption. Increasingly, however, cybercriminals have achieved this through remote data theft. Part of the success of this technique relies upon the spiraling cost of data breaches: the average cost of which has already increased by 2.6% this year, from $4.24 million in 2021 to $4.35 million now.<\/p>\n\n\n\n<p>The number of ransom attacks that are veering away from encryption shows that cybercriminals are rapidly exploring an easier, less demanding form of ransom. By exfiltrating unencrypted data, and threatening to leak it publicly, the legibility of the data means a company must make the choice between paying the ransom and letting their customers\u2019 data be publicly leaked and sold to other criminals.<\/p>\n\n\n\n<p>Karakurt is a new extortion gang that relies purely on these unencrypted ransoms. With victims\u2019 losses as high as $13 million, the group attacks indiscriminately. Karakurt attackers will steal sensitive data including security numbers, email addresses, company blueprints, and more. Once they\u2019ve stolen this data, they reach out to victims\u2019 employees, business partners and clients, demanding the ransom to be paid. The threat of a data breach hanging heavy, many organizations cave to the incessant harassment and pressure to pay up.<br><\/p>\n\n\n\n<p>Ransom Distributed Denial of Service (RDDoS) attacks heighten the stakes even further: the business is not offered a choice between paying the ransom or suffering a data breach. Instead, the business must pay extortionate fees to simply remain online. RDDoS groups extort victims via large scale DDoS attacks that are even easier to pull off than data exfiltration attacks. Requiring absolutely no access to company systems, and with operational botnets plentiful on underground marketplaces, it is now easier than ever to commit high-profit extortion attacks on unsuspecting victims. Consider the fact that DDoS attacks cost US businesses an average of<a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/the-true-cost-of-ddos-attacks\/\"> $218,000 per attack<\/a>: any ransom priced below this presents a genuinely tempting option.&nbsp;<\/p>\n\n\n\n<p>Attackers may launch DDoS attacks first, then send a ransom note later &#8211; lazy criminals may opt for a note first. It is never wise to assume the latter is telling the truth, as opportunistic scammers are more than happy to profit off the technical capabilities of real cybercriminals.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_RDDoS_Hit_List_Grows\"><\/span><strong>The RDDoS Hit List Grows<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>RDDoS attacks hit the scene in 2020, and rapidly made waves. The New Zealand stock exchange battled multiple instances as their network service provider was struck from overseas. This greatly impacted NZX connectivity, causing a complete halt in the cash trading markets by mid-afternoon.&nbsp;<\/p>\n\n\n\n<p>A second attack proceeded to bring down the NZX\u2019s website, their announcement platform, the NZX debt and Fonterra shareholders\u2019 markets. For this time, many organizations and individuals were unable to participate in the market. Connection was restored four hours later, once the attack had ended and connection was finally re-established.<\/p>\n\n\n\n<p>An active DDoS attack can be incredibly alarming to both customers and organizations alike. Whilst it\u2019s unclear whether the NZX decided to pay up for the ransom or mitigate the attackers\u2019 attempts, a growing number of cybercrime gangs are simply opting for the easy way out. This perfectly describes the so-called Armada Collective. This group follows a very recognizable set of steps.<\/p>\n\n\n\n<p>First, they find a company &#8211; any will do, though the bigger and more public-focused, the better. They then reach out to any email address available, with a highly alarming message.<\/p>\n\n\n\n<p>Introducing themselves as the Armada Collective, the email explains how the victim\u2019s network will be DDoS-ed, starting at a specified date in the very near future &#8211; unless the company pays a fee of 10 Bitcoin.&nbsp;<\/p>\n\n\n\n<p>The gang then proceed to detail how &#8211; if the 10 BTC is not paid by the set date &#8211; a DDoS campaign will begin, and the fee to make it stop will rise to 20 BTC, then continue to rise by another 10 BTC for every day that the attack continues.&nbsp;<\/p>\n\n\n\n<p>The gang signs off by telling their victims not to respond: simply that they will know when they have been paid. The email details the Bitcoin wallet address, and reassures the reader that the payment is totally anonymous. This is correct &#8211; and also shows the holes in the attackers\u2019 gameplan. As the payment is anonymous, it is, in fact, impossible to tell who has paid the extortion fee. This is supported by the fact that Armada Collective has actually never followed through with their DDoS threats &#8211; regardless of whether the fee is paid or not.&nbsp; Despite the group\u2019s lack of true damage, an analysis of their listed Bitcoin wallet address revealed a shocking number of victims. Many victims have paid the ransom fee out of fear.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Protect_Yourself_From_RDDoS\"><\/span><strong>How to Protect Yourself From RDDoS<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>DDoS threats are originating from increasing numbers of cyber gangs. Fancy Bear, Cozy Bear and Lazarus Group are all organizations of concern, and the only way to nullify their power over your organization is a solid form of DDoS mitigation.&nbsp;<\/p>\n\n\n\n<p>DDoS mitigation defends against volume attacks on your servers and networks. Automatically detecting traffic from malicious IP addresses, the fraudulent connections are diverted away from your server before the site request has initiated. This way, your server is not crushed under the weight of a million-strong botnet, and legitimate customers are still allowed access to your page. Pull the rug from under profit-seeking criminal gangs, and keep your brand online with a comprehensive DDoS defense.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Also Read:\u00a0<a href=\"https:\/\/www.trendstechblog.com\/pcb\/\">PCB Benefits To Integrating Into Your Manufacturing Business<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals continue to target hard-working businesses at any opportune moment with an increasingly complex patchwork quilt of attack vectors. Following&#8230;<\/p>\n","protected":false},"author":1,"featured_media":3555,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[169],"tags":[96,587,586],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ID11 Cyber Threat Actors Branch Out to New Forms of Extortion - Trends Tech Blog<\/title>\n<meta name=\"description\" content=\"ID11 Cyber threat continue to target hardworking businesses at any seasonable moment with an decreasingly complex spread of attack vectors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ID11 Cyber Threat Actors Branch Out to New Forms of Extortion - Trends Tech Blog\" \/>\n<meta property=\"og:description\" content=\"ID11 Cyber threat continue to target hardworking businesses at any seasonable moment with an decreasingly complex spread of attack vectors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"Trends Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-31T03:04:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-31T03:04:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2022\/08\/id11-cyber-treate.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TrendsTechBlog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:site\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TrendsTechBlog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/\"},\"author\":{\"name\":\"TrendsTechBlog\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"headline\":\"ID11 Cyber Threat Actors Branch Out to New Forms of Extortion\",\"datePublished\":\"2022-08-31T03:04:09+00:00\",\"dateModified\":\"2022-08-31T03:04:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/\"},\"wordCount\":1203,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"keywords\":[\"Cybersecurity\",\"Cybersecurity 2021\",\"Cybersecurity Strategies\"],\"articleSection\":[\"SECURITY\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/\",\"url\":\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/\",\"name\":\"ID11 Cyber Threat Actors Branch Out to New Forms of Extortion - Trends Tech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#website\"},\"datePublished\":\"2022-08-31T03:04:09+00:00\",\"dateModified\":\"2022-08-31T03:04:12+00:00\",\"description\":\"ID11 Cyber threat continue to target hardworking businesses at any seasonable moment with an decreasingly complex spread of attack vectors.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trendstechblog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SECURITY\",\"item\":\"https:\/\/www.trendstechblog.com\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ID11 Cyber Threat Actors Branch Out to New Forms of Extortion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trendstechblog.com\/#website\",\"url\":\"https:\/\/www.trendstechblog.com\/\",\"name\":\"Trends Tech Blog\",\"description\":\"Daily Tech Updates\",\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trendstechblog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\",\"name\":\"TrendsTechBlog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"width\":280,\"height\":70,\"caption\":\"TrendsTechBlog\"},\"logo\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\"},\"description\":\"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ID11 Cyber Threat Actors Branch Out to New Forms of Extortion - Trends Tech Blog","description":"ID11 Cyber threat continue to target hardworking businesses at any seasonable moment with an decreasingly complex spread of attack vectors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/","og_locale":"en_US","og_type":"article","og_title":"ID11 Cyber Threat Actors Branch Out to New Forms of Extortion - Trends Tech Blog","og_description":"ID11 Cyber threat continue to target hardworking businesses at any seasonable moment with an decreasingly complex spread of attack vectors.","og_url":"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/","og_site_name":"Trends Tech Blog","article_published_time":"2022-08-31T03:04:09+00:00","article_modified_time":"2022-08-31T03:04:12+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2022\/08\/id11-cyber-treate.jpg","type":"image\/jpeg"}],"author":"TrendsTechBlog","twitter_card":"summary_large_image","twitter_creator":"@trendstechblog","twitter_site":"@trendstechblog","twitter_misc":{"Written by":"TrendsTechBlog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/#article","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/"},"author":{"name":"TrendsTechBlog","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"headline":"ID11 Cyber Threat Actors Branch Out to New Forms of Extortion","datePublished":"2022-08-31T03:04:09+00:00","dateModified":"2022-08-31T03:04:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/"},"wordCount":1203,"commentCount":0,"publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"keywords":["Cybersecurity","Cybersecurity 2021","Cybersecurity Strategies"],"articleSection":["SECURITY"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trendstechblog.com\/id11-cyber-threat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/","url":"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/","name":"ID11 Cyber Threat Actors Branch Out to New Forms of Extortion - Trends Tech Blog","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/#website"},"datePublished":"2022-08-31T03:04:09+00:00","dateModified":"2022-08-31T03:04:12+00:00","description":"ID11 Cyber threat continue to target hardworking businesses at any seasonable moment with an decreasingly complex spread of attack vectors.","breadcrumb":{"@id":"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trendstechblog.com\/id11-cyber-threat\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trendstechblog.com\/id11-cyber-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trendstechblog.com\/"},{"@type":"ListItem","position":2,"name":"SECURITY","item":"https:\/\/www.trendstechblog.com\/category\/security\/"},{"@type":"ListItem","position":3,"name":"ID11 Cyber Threat Actors Branch Out to New Forms of Extortion"}]},{"@type":"WebSite","@id":"https:\/\/www.trendstechblog.com\/#website","url":"https:\/\/www.trendstechblog.com\/","name":"Trends Tech Blog","description":"Daily Tech Updates","publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trendstechblog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1","name":"TrendsTechBlog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/","url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","contentUrl":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","width":280,"height":70,"caption":"TrendsTechBlog"},"logo":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/"},"description":"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News."}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/3554"}],"collection":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/comments?post=3554"}],"version-history":[{"count":1,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/3554\/revisions"}],"predecessor-version":[{"id":3556,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/3554\/revisions\/3556"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media\/3555"}],"wp:attachment":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media?parent=3554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/categories?post=3554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/tags?post=3554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}