{"id":16620,"date":"2023-07-04T20:03:49","date_gmt":"2023-07-04T20:03:49","guid":{"rendered":"https:\/\/khaleej-trend.online\/eng\/?p=16620"},"modified":"2023-07-04T20:03:49","modified_gmt":"2023-07-04T20:03:49","slug":"towards-stealthier-dnspionage-cyberattacks-swengen","status":"publish","type":"post","link":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/","title":{"rendered":"Towards stealthier dnspionage cyberattacks swengen"},"content":{"rendered":"<div id=\"khale-2465549400\" class=\"khale-- khale-entity-placement\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-9610686647069611\" \ndata-ad-slot=\"1846615391\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><div id=\"khale-3116040271\" class=\"khale-before-content khale-entity-placement\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-9610686647069611\" \ndata-ad-slot=\"1846615391\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><p><span style=\"vertical-align: inherit;\"><a href=\"https:\/\/khaleej-trend.online\/eng\/\">Kworld Trend<\/a> \/ Towards stealthier dnspionage cyberattacks swengen, <\/span><span style=\"vertical-align: inherit;\">The DNSpionage group, which attacked the Domain Name System (DNS) last November, has expanded its means of intrusion. Towards more stealthy cyberattacks in the DNS.<\/span><\/p><div id=\"khale-2855167828\" class=\"khale-- khale-entity-placement\" style=\"margin-left: auto;margin-right: auto;text-align: center;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-9610686647069611\" \ndata-ad-slot=\"1846615391\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<p><span style=\"vertical-align: inherit;\">NotPetya Wiper has greatly expanded the scope of damage caused by malware attacks in recent years. So much so that it forces CISOs and security researchers to rethink their strategies for combating this data destroyer.<\/span><\/p>\n<div>\n<p><span style=\"vertical-align: inherit;\">On June 27, 2017, the eve of Ukraine&#8217;s Constitution Day, a major global cyber attack succeeded in infecting more than 80 Ukrainian companies with the help of a new cyber pathogen known since then as NotPetya.<\/span><\/p>\n<h2><span style=\"vertical-align: inherit;\">Towards hidden cyber attacks from dnspionage<\/span><\/h2>\n<p><span style=\"vertical-align: inherit;\">But NotPetya wasn&#8217;t limited to Ukraine&#8217;s internal borders: it has spread to infect thousands of businesses in Europe and around the world and wreak havoc. This virus was named NotPetya, because it was both similar and different from Petya, a self-propagating ransomware discovered in 2016 that, unlike other emerging forms of ransomware prevalent at the time, could not be decrypted. Another difference from previous ransomware types: Petya was also able to overwrite and encrypt master boot records, which is why it was considered more of a wiper-type malware, aimed specifically at wiping data, than true ransomware.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Like Petya, its successor NotPetya was not a real ransomware because it could not be decrypted and the attackers hid their work behind a bogus $300 ransom note to cover the real destructive goals of their malware. NotPetya appeared five weeks after another dangerous fake ransomware, WannaCry, appeared. Considered a true &#8220;cyber weapon,&#8221; NotPetya, like WannaCry, uses the EternalBlue computer tool developed by the US National Security Agency (NSA) and stolen from the security agency.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Using Eternal Blue, NotPetya exploited a vulnerability in the Windows Server Message Block (SMB) protocol, a flaw that Microsoft patched a few months ago in Windows 10. However, all it took was a Windows 10 PC that wasn&#8217;t fixed or One computer has one computer. An older version of Windows on-premise to spread malware. Another powerful tool was used in conjunction with EternalBlue: an old security lookup tool called Mimikatz, capable of extracting passwords from memory. The combination of the two allowed the attack to move from one machine to another.<\/span><\/p>\n<h2><span style=\"vertical-align: inherit;\">Highly contagious malware from the Russian GRU<\/span><\/h2>\n<p><span style=\"vertical-align: inherit;\">Although some experts have considered NotPetya to be a variant of Petya. The two malware are generally considered separate and distinct, especially when it comes to how they spread. NotPetya was much more contagious than Petya, and there seemed to be no way to prevent it from spreading rapidly from one host to another.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">As documented by expert and journalist Andy Greenberg, shipping giant NotPetya includes Maersk, drug laboratory Merck, a subsidiary of European Fedex, TNT Express, French construction company Saint-Gobain, food producer Mondelz, and manufacturer Reckitt Benckiser. In total, the malware has caused more than $10 billion in global damage. NotPetya&#8217;s origin has been attributed to a group of Russian GRU operatives known as Sandworm or Unit 74455, possibly behind a 2015 cyber attack on Ukraine&#8217;s power grid, among other devastating cyber incidents.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">But what remains of these attacks and what lessons have we learned from them? Two experts grappling with the aftermath of NotPetya five years ago take a look at the 2017 cyberattack and put the incident into perspective in the current context of Russia&#8217;s war on Ukraine.<\/span><\/p>\n<h2><span style=\"vertical-align: inherit;\">Ransomware as a weapon of war<\/span><\/h2>\n<p><span style=\"vertical-align: inherit;\">Amit Serber, chief security researcher at Cybereason at the time of the NotPetya attack, and now director of security research at Sternum, was the first person to develop a workaround capable of disabling NotPetya. At the time, &#8220;ransomware was just beginning to spread,&#8221; Mr. Serber recalls. At first, they targeted mostly ordinary people, and not large corporations or corporations, as is the case today.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">The average citizen whose computer was fully encrypted was the norm, for example, elderly people who lost access to their grandchildren\u2019s photos and that sort of thing,\u201d said Amit Serber. After the arrival of WannaCry and NotPetya, the nature of ransomware use by criminals changed . Internet.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">\u201cWe went from opportunistic use, in a drive-by-drive style of exploitation, to a quasi-weapon of war whereby nation-state-backed actors used ransomware to significantly disrupt the work of \u201cother big corporations and states,\u201d Serber said. He added: \u201cAt that time , NotPetya and WannaCry marked a turning point.&#8221;<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Both viruses have made the world more complicated. \u201cUntil then, cybersecurity vendors focused on abstract theoretical security issues, but suddenly faced a deep transformation of simple technologies, including encryption and decryption for geopolitical purposes,\u201d said Sternum&#8217;s director of security research. \u201cWe needed to get down to earth a bit and deal with this problem before looking at threats that were purely theoretical or more theoretical and more difficult to implement. Towards stealthier dnspionage cyberattacks swengen<\/span><\/p>\n<h4>Last<\/h4>\n<p><span style=\"vertical-align: inherit;\">It&#8217;s no longer about hacking Coca-Cola and stealing its secret recipe. But to get a company like Coca-Cola involved in an international geopolitical issue and disable it as much as possible is collateral damage.\u201d On a personal level, NotPetya marked an important turning point in Mr. Serper\u2019s life. \u201cThis virus has affected my life in a very direct way.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">He is responsible for obtaining my green card to live in the United States.\u201d In fact, NotPetya was the main argument of Mr. Serper&#8217;s lawyer for obtaining the so-called \u201cEinstein\u201d visa. \u201cI don&#8217;t have a high school diploma. I don&#8217;t have a college degree. So it was very difficult to prove that I knew what I was talking about. Much of our immigration issue was based on my contribution to preventing NotPetya. It worked, even though the previous administration was not immigration-friendly. Towards stealthier dnspionage cyberattacks swengen<\/span><\/p>\n<h2><span style=\"vertical-align: inherit;\">NotPetya has evolved into CISO awareness<\/span><\/h2>\n<p><span style=\"vertical-align: inherit;\">Adam Flatley is now Director of Threat Intelligence at Redacted, but back in NotPetya&#8217;s day. Which he was Director of Operations at Cisco Talos, and his team was among the first. To discover the true workings of the virus. &#8220;I think the NotPetya event has changed the consciousness of many information security officials. And security managers around the world,&#8221; he said. NotPetya CISOs have learned what can happen if they don&#8217;t segment their networks properly.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">&#8220;If you look at what happened with NotPetya, you can see that the malware had an unchecked spread mechanism that allowed it to spread as far as it could,&#8221; Flatley explained. He further explained that &#8220;when the Russian hackers unleashed in Ukraine. All companies associated with this country through flat networks destroyed because of this attack.&#8221;<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">For Mr. Flatley, the current conflict in Ukraine reminds him of what happened with NotPetya. \u201cAt the beginning of the war. Wr thought the Russians would use either ransomware or spaces to attack Ukraine. And immediately remember what happened the last time.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">Then, as the war progressed, a lot of evidence of the use of spaces emerged in Ukraine.\u201d \u201c This time again we fear that these attacks will spread outside the country. Fortunately, so far the Russians have set up their scanners in a very classic way.<\/span><\/p>\n<p><span style=\"vertical-align: inherit;\">However, Mr. Flatley does not rule out a NotPetya-like event occurring in the aftermath of the current dispute. \u201cInterestingly, the Russians are a little more careful this time about their cyberattacks, but that\u2019s only because they decide to. The technology is still there, and they could easily change those settings and go if they wanted to.\u201d Towards stealthier dnspionage cyberattacks swengen<\/span><\/p>\n<\/div>\n<div id=\"khale-4140121818\" class=\"khale-after-content khale-entity-placement\"><script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-9610686647069611\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-format=\"autorelaxed\"\r\n     data-ad-client=\"ca-pub-9610686647069611\"\r\n     data-ad-slot=\"3780750108\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script><\/div>","protected":false},"excerpt":{"rendered":"<p>Kworld Trend \/ Towards stealthier dnspionage cyberattacks swengen, The DNSpionage group, which attacked the Domain Name System (DNS) last November, has expanded its means of intrusion. Towards more stealthy cyberattacks in the DNS. NotPetya Wiper has greatly expanded the scope of damage caused by malware attacks in recent years. So much so that it forces &hellip;<\/p>\n","protected":false},"author":14,"featured_media":16625,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86],"tags":[14512,14511,14510],"class_list":["post-16620","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-towards-stealthier-dnspionage","tag-towards-stealthier-dnspionage-cyberattacks","tag-towards-stealthier-dnspionage-cyberattacks-swengen"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Towards stealthier dnspionage cyberattacks swengen - kworld trend<\/title>\n<meta name=\"description\" content=\"Towards stealthier dnspionage cyberattacks swengen , NotPetya Wiper has greatly expanded the scope of damage caused by malware attacks ...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Towards stealthier dnspionage cyberattacks swengen - kworld trend\" \/>\n<meta property=\"og:description\" content=\"Towards stealthier dnspionage cyberattacks swengen , NotPetya Wiper has greatly expanded the scope of damage caused by malware attacks ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/\" \/>\n<meta property=\"og:site_name\" content=\"kworld trend\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-04T20:03:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/07\/Towards-stealthier-dnspionage-cyberattacks-swengen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"fady2023\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"fady2023\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/\"},\"author\":{\"name\":\"fady2023\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/7df2c315ab850ba5562fc3f2c7488bfa\"},\"headline\":\"Towards stealthier dnspionage cyberattacks swengen\",\"datePublished\":\"2023-07-04T20:03:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/\"},\"wordCount\":1239,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/f6ad643a7680ed9db4f2dff3b371363c\"},\"image\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Towards-stealthier-dnspionage-cyberattacks-swengen.jpg\",\"keywords\":[\"Towards stealthier dnspionage\",\"Towards stealthier dnspionage cyberattacks\",\"Towards stealthier dnspionage cyberattacks swengen\"],\"articleSection\":[\"news\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/\",\"name\":\"Towards stealthier dnspionage cyberattacks swengen - kworld trend\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Towards-stealthier-dnspionage-cyberattacks-swengen.jpg\",\"datePublished\":\"2023-07-04T20:03:49+00:00\",\"description\":\"Towards stealthier dnspionage cyberattacks swengen , NotPetya Wiper has greatly expanded the scope of damage caused by malware attacks ...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Towards-stealthier-dnspionage-cyberattacks-swengen.jpg\",\"contentUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Towards-stealthier-dnspionage-cyberattacks-swengen.jpg\",\"width\":1280,\"height\":720,\"caption\":\"Towards stealthier dnspionage cyberattacks swengen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/towards-stealthier-dnspionage-cyberattacks-swengen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Towards stealthier dnspionage cyberattacks swengen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#website\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/\",\"name\":\"kworld trend\",\"description\":\"site care about apps and trends\",\"publisher\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/f6ad643a7680ed9db4f2dff3b371363c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/f6ad643a7680ed9db4f2dff3b371363c\",\"name\":\"hasadwan2020\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\",\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\",\"contentUrl\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\",\"width\":512,\"height\":512,\"caption\":\"hasadwan2020\"},\"logo\":{\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/cropped-download.jpg\"},\"sameAs\":[\"https:\\\/\\\/khaleej-trend.online\\\/eng\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/#\\\/schema\\\/person\\\/7df2c315ab850ba5562fc3f2c7488bfa\",\"name\":\"fady2023\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g\",\"caption\":\"fady2023\"},\"url\":\"https:\\\/\\\/khaleej-trend.online\\\/eng\\\/author\\\/fady2023\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Towards stealthier dnspionage cyberattacks swengen - kworld trend","description":"Towards stealthier dnspionage cyberattacks swengen , NotPetya Wiper has greatly expanded the scope of damage caused by malware attacks ...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/","og_locale":"en_US","og_type":"article","og_title":"Towards stealthier dnspionage cyberattacks swengen - kworld trend","og_description":"Towards stealthier dnspionage cyberattacks swengen , NotPetya Wiper has greatly expanded the scope of damage caused by malware attacks ...","og_url":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/","og_site_name":"kworld trend","article_published_time":"2023-07-04T20:03:49+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/07\/Towards-stealthier-dnspionage-cyberattacks-swengen.jpg","type":"image\/jpeg"}],"author":"fady2023","twitter_card":"summary_large_image","twitter_misc":{"Written by":"fady2023","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/#article","isPartOf":{"@id":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/"},"author":{"name":"fady2023","@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/7df2c315ab850ba5562fc3f2c7488bfa"},"headline":"Towards stealthier dnspionage cyberattacks swengen","datePublished":"2023-07-04T20:03:49+00:00","mainEntityOfPage":{"@id":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/"},"wordCount":1239,"commentCount":0,"publisher":{"@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/f6ad643a7680ed9db4f2dff3b371363c"},"image":{"@id":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/#primaryimage"},"thumbnailUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/07\/Towards-stealthier-dnspionage-cyberattacks-swengen.jpg","keywords":["Towards stealthier dnspionage","Towards stealthier dnspionage cyberattacks","Towards stealthier dnspionage cyberattacks swengen"],"articleSection":["news"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/","url":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/","name":"Towards stealthier dnspionage cyberattacks swengen - kworld trend","isPartOf":{"@id":"https:\/\/khaleej-trend.online\/eng\/#website"},"primaryImageOfPage":{"@id":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/#primaryimage"},"image":{"@id":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/#primaryimage"},"thumbnailUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/07\/Towards-stealthier-dnspionage-cyberattacks-swengen.jpg","datePublished":"2023-07-04T20:03:49+00:00","description":"Towards stealthier dnspionage cyberattacks swengen , NotPetya Wiper has greatly expanded the scope of damage caused by malware attacks ...","breadcrumb":{"@id":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/#primaryimage","url":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/07\/Towards-stealthier-dnspionage-cyberattacks-swengen.jpg","contentUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2023\/07\/Towards-stealthier-dnspionage-cyberattacks-swengen.jpg","width":1280,"height":720,"caption":"Towards stealthier dnspionage cyberattacks swengen"},{"@type":"BreadcrumbList","@id":"https:\/\/khaleej-trend.online\/eng\/towards-stealthier-dnspionage-cyberattacks-swengen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/khaleej-trend.online\/eng\/"},{"@type":"ListItem","position":2,"name":"Towards stealthier dnspionage cyberattacks swengen"}]},{"@type":"WebSite","@id":"https:\/\/khaleej-trend.online\/eng\/#website","url":"https:\/\/khaleej-trend.online\/eng\/","name":"kworld trend","description":"site care about apps and trends","publisher":{"@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/f6ad643a7680ed9db4f2dff3b371363c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/khaleej-trend.online\/eng\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/f6ad643a7680ed9db4f2dff3b371363c","name":"hasadwan2020","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg","url":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg","contentUrl":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg","width":512,"height":512,"caption":"hasadwan2020"},"logo":{"@id":"https:\/\/khaleej-trend.online\/eng\/wp-content\/uploads\/2022\/11\/cropped-download.jpg"},"sameAs":["https:\/\/khaleej-trend.online\/eng"]},{"@type":"Person","@id":"https:\/\/khaleej-trend.online\/eng\/#\/schema\/person\/7df2c315ab850ba5562fc3f2c7488bfa","name":"fady2023","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/76c010ce04269635108a255c024cb7773107bc7b4682e75046ef4f539728c9eb?s=96&d=mm&r=g","caption":"fady2023"},"url":"https:\/\/khaleej-trend.online\/eng\/author\/fady2023\/"}]}},"_links":{"self":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts\/16620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/comments?post=16620"}],"version-history":[{"count":1,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts\/16620\/revisions"}],"predecessor-version":[{"id":16626,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/posts\/16620\/revisions\/16626"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/media\/16625"}],"wp:attachment":[{"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/media?parent=16620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/categories?post=16620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/khaleej-trend.online\/eng\/wp-json\/wp\/v2\/tags?post=16620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}