{"id":6995,"date":"2023-03-28T07:07:55","date_gmt":"2023-03-28T07:07:55","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/target\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/"},"modified":"2023-03-28T07:43:01","modified_gmt":"2023-03-28T07:43:01","slug":"lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/","title":{"rendered":"LockBit 3.0 Ransomware: Inside the Cyberthreat That\u2019s Costing Millions"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) for the LockBit 3.0 ransomware have been outlined in a new joint cybersecurity advice issued by several U.S. government organisations.<\/p>\n<p>Officials have said that &#8220;the LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model,&#8221; which is a continuation of the ransomware&#8217;s earlier incarnations, LockBit 2.0 and LockBit.<\/p>\n<p>U.S. law enforcement organisations including the FBI, CISA, and the Multi-State Information Sharing &amp; Analysis Center issued the warning. (MS-ISAC).<\/p>\n<p>LockBit actors first appeared in late 2019, and since then they&#8217;ve put in a lot of time and work developing and refining their malware, releasing two big updates: LockBit 2.0 in the middle of 2021 and LockBit 3.0 in June 2022. LockBit Red and LockBit Black are alternate names for the two variations.<\/p>\n<p>In order to perform particular actions like lateral movement and rebooting into Safe Mode, &#8220;LockBit 3.0 accepts additional arguments,&#8221; as the warning puts it. LockBit affiliates are required to provide a password argument while executing LockBit 3.0 ransomware unless they have access to the password-less version of the ransomware.<\/p>\n<p>In addition, the ransomware is programmed to avoid infecting computers whose language settings are identical to those on an exclusion list, which currently excludes Romanian (Moldova), Arabic (Syria), and Tatar. (Russia).<\/p>\n<p>Exploiting remote desktop protocol (RDP), drive-by compromise, phishing tactics, abusing legitimate accounts, and weaponizing public-facing apps are all common entry points into target networks.<\/p>\n<p>The virus first establishes persistence, elevates rights, performs lateral movement, and deletes log files, Windows Recycle Bin files, and shadow copies after successfully breaching the system&#8217;s defences.<\/p>\n<p>In their intrusions, &#8220;LockBit affiliates have been observed using various freeware and open source tools,&#8221; the authorities claimed. Many other types of attacks may be carried out with the use of these instruments, including &#8220;credential dumping,&#8221; &#8220;credential harvesting,\u201d \u201cfile exfiltration,\u201d and \u201cremote access and tunnelling.&#8221;<\/p>\n<p>In order to doubly extort money from its affiliates, the LockBit organisation distributes a specialised exfiltration programme called StealBit.<\/p>\n<p>In late September 2022, a dissatisfied LockBit developer published the building code for LockBit 3.0, dealing a severe blow to the ransomware gang and raising worries that other criminal actors may take advantage of the situation and spawn their own variations.<\/p>\n<p>The LockBit ransomware strain has been deployed against at least 1,000 victims globally, the U.S. Department of Justice said in November, earning the criminal organisation over $100 million in illegal earnings.<\/p>\n<p>As reported earlier this year by industrial cybersecurity company Dragos, LockBit 3.0 was responsible for 21% of 189 ransomware assaults recorded in Q4 2022, accounting for 40 occurrences. The industrial and food industries were hit particularly hard by the assaults.<\/p>\n<p>According to the FBI&#8217;s Internet Crime Complaint Center (IC3)&#8217;s most recent Internet Crime Report, the top three ransomware variants targeting critical infrastructure in 2022 were LockBit (149 victims), BlackCat (114 victims), and Hive (87 victims).<\/p>\n<p>Months after antivirus firm Avast provided a free decryptor in January 2023, the BianLian ransomware organisation has altered its emphasis from encrypting its victims&#8217; files to pure data-theft extortion attempts, prompting the alert.<\/p>\n<p>As a related move, Kaspersky has released a free decryptor to assist victims whose data has been locked down by ransomware based on the Conti source code, which leaked after Russia&#8217;s invasion of Ukraine last year resulted to internal disagreement among the core members.<\/p>\n<p>It&#8217;s easy to forget that individuals are operating these criminal companies, Intel 471 warned a year ago, given the complexity of ransomware like LockBit 3.0 and Conti Ransomware Variant. It just takes one troublemaker, as is the case with genuine groups, to destabilise a sophisticated system.[\/vc_column_text][vc_column_text]\n<h1 class=\"c-page-title__title\">#StopRansomware: LockBit 3.0 &#8211; CISA Report<\/h1>\n<div class=\"real3dflipbook\" id=\"2_69e7bfc5d2133\" style=\"position:absolute;\" data-flipbook-options=\"{&quot;mode&quot;:&quot;normal&quot;,&quot;viewMode&quot;:&quot;webgl&quot;,&quot;pageTextureSize&quot;:&quot;2048&quot;,&quot;pageTextureSizeSmall&quot;:&quot;1500&quot;,&quot;pageTextureSizeMobile&quot;:&quot;&quot;,&quot;pageTextureSizeMobileSmall&quot;:&quot;1024&quot;,&quot;zoomMin&quot;:&quot;0.9&quot;,&quot;zoomStep&quot;:&quot;2&quot;,&quot;zoomSize&quot;:&quot;&quot;,&quot;zoomReset&quot;:&quot;false&quot;,&quot;doubleClickZoom&quot;:&quot;true&quot;,&quot;singlePageMode&quot;:&quot;false&quot;,&quot;pageFlipDuration&quot;:&quot;1&quot;,&quot;sound&quot;:&quot;true&quot;,&quot;startPage&quot;:&quot;1&quot;,&quot;deeplinking&quot;:{&quot;enabled&quot;:&quot;false&quot;,&quot;prefix&quot;:&quot;&quot;},&quot;responsiveView&quot;:&quot;true&quot;,&quot;responsiveViewTreshold&quot;:&quot;768&quot;,&quot;textLayer&quot;:&quot;false&quot;,&quot;pdfPageScale&quot;:&quot;&quot;,&quot;backCover&quot;:&quot;true&quot;,&quot;height&quot;:&quot;400&quot;,&quot;responsiveHeight&quot;:&quot;true&quot;,&quot;aspectRatio&quot;:&quot;2&quot;,&quot;thumbnailsOnStart&quot;:&quot;false&quot;,&quot;contentOnStart&quot;:&quot;false&quot;,&quot;searchOnStart&quot;:&quot;&quot;,&quot;tableOfContentCloseOnClick&quot;:&quot;true&quot;,&quot;thumbsCloseOnClick&quot;:&quot;true&quot;,&quot;autoplayOnStart&quot;:&quot;false&quot;,&quot;autoplayInterval&quot;:&quot;3000&quot;,&quot;autoplayStartPage&quot;:&quot;1&quot;,&quot;autoplayLoop&quot;:&quot;true&quot;,&quot;rightToLeft&quot;:&quot;false&quot;,&quot;pageWidth&quot;:&quot;&quot;,&quot;pageHeight&quot;:&quot;&quot;,&quot;thumbSize&quot;:&quot;130&quot;,&quot;logoImg&quot;:&quot;&quot;,&quot;logoUrl&quot;:&quot;&quot;,&quot;logoCSS&quot;:&quot;position:absolute;left:0;top:0;&quot;,&quot;menuSelector&quot;:&quot;&quot;,&quot;zIndex&quot;:&quot;auto&quot;,&quot;preloaderText&quot;:&quot;&quot;,&quot;googleAnalyticsTrackingCode&quot;:&quot;&quot;,&quot;pdfBrowserViewerIfIE&quot;:&quot;false&quot;,&quot;viewModeMobile&quot;:&quot;&quot;,&quot;aspectRatioMobile&quot;:&quot;&quot;,&quot;singlePageModeIfMobile&quot;:&quot;false&quot;,&quot;pdfBrowserViewerIfMobile&quot;:&quot;false&quot;,&quot;pdfBrowserViewerFullscreen&quot;:&quot;true&quot;,&quot;pdfBrowserViewerFullscreenTarget&quot;:&quot;_blank&quot;,&quot;btnTocIfMobile&quot;:&quot;true&quot;,&quot;btnThumbsIfMobile&quot;:&quot;true&quot;,&quot;btnShareIfMobile&quot;:&quot;false&quot;,&quot;btnDownloadPagesIfMobile&quot;:&quot;true&quot;,&quot;btnDownloadPdfIfMobile&quot;:&quot;true&quot;,&quot;btnSoundIfMobile&quot;:&quot;false&quot;,&quot;btnExpandIfMobile&quot;:&quot;true&quot;,&quot;btnPrintIfMobile&quot;:&quot;false&quot;,&quot;logoHideOnMobile&quot;:&quot;false&quot;,&quot;mobile&quot;:{&quot;thumbnailsOnStart&quot;:&quot;false&quot;,&quot;contentOnStart&quot;:&quot;false&quot;},&quot;lightboxCSS&quot;:&quot;&quot;,&quot;lightboxLink&quot;:&quot;&quot;,&quot;lightboxLinkNewWindow&quot;:&quot;true&quot;,&quot;lightboxBackground&quot;:&quot;rgb(81, 85, 88)&quot;,&quot;lightboxBackgroundPattern&quot;:&quot;&quot;,&quot;lightboxBackgroundImage&quot;:&quot;&quot;,&quot;lightboxContainerCSS&quot;:&quot;display:inline-block;padding:10px;&quot;,&quot;lightboxThumbnailHeight&quot;:&quot;300&quot;,&quot;lightboxThumbnailUrlCSS&quot;:&quot;display:block;&quot;,&quot;lightboxThumbnailInfo&quot;:&quot;false&quot;,&quot;lightboxThumbnailInfoText&quot;:&quot;&quot;,&quot;lightboxThumbnailInfoCSS&quot;:&quot;top: 0;  width: 100%; height: 100%; font-size: 16px; color: #000; background: rgba(255,255,255,.8); &quot;,&quot;showTitle&quot;:&quot;false&quot;,&quot;hideThumbnail&quot;:&quot;false&quot;,&quot;lightboxText&quot;:&quot;&quot;,&quot;lightboxTextCSS&quot;:&quot;display:block;&quot;,&quot;lightboxTextPosition&quot;:&quot;top&quot;,&quot;lightBoxOpened&quot;:&quot;false&quot;,&quot;lightBoxFullscreen&quot;:&quot;false&quot;,&quot;lightboxCloseOnClick&quot;:&quot;false&quot;,&quot;lightboxMarginV&quot;:&quot;0&quot;,&quot;lightboxMarginH&quot;:&quot;0&quot;,&quot;lights&quot;:&quot;true&quot;,&quot;lightPositionX&quot;:&quot;0&quot;,&quot;lightPositionY&quot;:&quot;150&quot;,&quot;lightPositionZ&quot;:&quot;1400&quot;,&quot;lightIntensity&quot;:&quot;0.6&quot;,&quot;shadows&quot;:&quot;true&quot;,&quot;shadowMapSize&quot;:&quot;2048&quot;,&quot;shadowOpacity&quot;:&quot;0.2&quot;,&quot;shadowDistance&quot;:&quot;15&quot;,&quot;pageHardness&quot;:&quot;2&quot;,&quot;coverHardness&quot;:&quot;2&quot;,&quot;pageRoughness&quot;:&quot;1&quot;,&quot;pageMetalness&quot;:&quot;0&quot;,&quot;pageSegmentsW&quot;:&quot;6&quot;,&quot;pageSegmentsH&quot;:&quot;1&quot;,&quot;pageMiddleShadowSize&quot;:&quot;2&quot;,&quot;pageMiddleShadowColorL&quot;:&quot;#999999&quot;,&quot;pageMiddleShadowColorR&quot;:&quot;#777777&quot;,&quot;antialias&quot;:&quot;false&quot;,&quot;pan&quot;:&quot;0&quot;,&quot;tilt&quot;:&quot;0&quot;,&quot;rotateCameraOnMouseDrag&quot;:&quot;true&quot;,&quot;panMax&quot;:&quot;20&quot;,&quot;panMin&quot;:&quot;-20&quot;,&quot;tiltMax&quot;:&quot;0&quot;,&quot;tiltMin&quot;:&quot;-60&quot;,&quot;currentPage&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;title&quot;:&quot;Current page&quot;,&quot;hAlign&quot;:&quot;left&quot;,&quot;vAlign&quot;:&quot;top&quot;},&quot;btnAutoplay&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;icon&quot;:&quot;fa-play&quot;,&quot;iconAlt&quot;:&quot;fa-pause&quot;,&quot;icon2&quot;:&quot;play_arrow&quot;,&quot;iconAlt2&quot;:&quot;pause&quot;,&quot;title&quot;:&quot;Autoplay&quot;},&quot;btnNext&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;icon&quot;:&quot;fa-chevron-right&quot;,&quot;icon2&quot;:&quot;chevron_right&quot;,&quot;title&quot;:&quot;Next Page&quot;},&quot;btnLast&quot;:{&quot;enabled&quot;:&quot;false&quot;,&quot;icon&quot;:&quot;fa-angle-double-right&quot;,&quot;icon2&quot;:&quot;last_page&quot;,&quot;title&quot;:&quot;Last Page&quot;},&quot;btnPrev&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;icon&quot;:&quot;fa-chevron-left&quot;,&quot;icon2&quot;:&quot;chevron_left&quot;,&quot;title&quot;:&quot;Previous Page&quot;},&quot;btnFirst&quot;:{&quot;enabled&quot;:&quot;false&quot;,&quot;icon&quot;:&quot;fa-angle-double-left&quot;,&quot;icon2&quot;:&quot;first_page&quot;,&quot;title&quot;:&quot;First Page&quot;},&quot;btnZoomIn&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;icon&quot;:&quot;fa-plus&quot;,&quot;icon2&quot;:&quot;zoom_in&quot;,&quot;title&quot;:&quot;Zoom in&quot;},&quot;btnZoomOut&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;icon&quot;:&quot;fa-minus&quot;,&quot;icon2&quot;:&quot;zoom_out&quot;,&quot;title&quot;:&quot;Zoom out&quot;},&quot;btnToc&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;icon&quot;:&quot;fa-list-ol&quot;,&quot;icon2&quot;:&quot;toc&quot;,&quot;title&quot;:&quot;Table of Contents&quot;},&quot;btnThumbs&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;icon&quot;:&quot;fa-th-large&quot;,&quot;icon2&quot;:&quot;view_module&quot;,&quot;title&quot;:&quot;Pages&quot;},&quot;btnShare&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;icon&quot;:&quot;fa-share-alt&quot;,&quot;icon2&quot;:&quot;share&quot;,&quot;title&quot;:&quot;Share&quot;},&quot;btnDownloadPages&quot;:{&quot;enabled&quot;:&quot;false&quot;,&quot;url&quot;:&quot;&quot;,&quot;icon&quot;:&quot;fa-download&quot;,&quot;icon2&quot;:&quot;file_download&quot;,&quot;title&quot;:&quot;Download pages&quot;},&quot;btnDownloadPdf&quot;:{&quot;enabled&quot;:&quot;false&quot;,&quot;url&quot;:&quot;&quot;,&quot;icon&quot;:&quot;fa-file&quot;,&quot;icon2&quot;:&quot;picture_as_pdf&quot;,&quot;title&quot;:&quot;Download PDF&quot;,&quot;forceDownload&quot;:&quot;true&quot;,&quot;openInNewWindow&quot;:&quot;true&quot;},&quot;btnSound&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;icon&quot;:&quot;fa-volume-up&quot;,&quot;iconAlt&quot;:&quot;fa-volume-off&quot;,&quot;icon2&quot;:&quot;volume_up&quot;,&quot;iconAlt2&quot;:&quot;volume_mute&quot;,&quot;title&quot;:&quot;Sound&quot;},&quot;btnExpand&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;icon&quot;:&quot;fa-expand&quot;,&quot;iconAlt&quot;:&quot;fa-compress&quot;,&quot;icon2&quot;:&quot;fullscreen&quot;,&quot;iconAlt2&quot;:&quot;fullscreen_exit&quot;,&quot;title&quot;:&quot;Toggle fullscreen&quot;},&quot;btnSelect&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;icon&quot;:&quot;fas fa-i-cursor&quot;,&quot;icon2&quot;:&quot;text_format&quot;,&quot;title&quot;:&quot;Select tool&quot;},&quot;btnSearch&quot;:{&quot;enabled&quot;:&quot;false&quot;,&quot;icon&quot;:&quot;fas fa-search&quot;,&quot;icon2&quot;:&quot;search&quot;,&quot;title&quot;:&quot;Search&quot;},&quot;btnBookmark&quot;:{&quot;enabled&quot;:&quot;false&quot;,&quot;icon&quot;:&quot;fas fa-bookmark&quot;,&quot;icon2&quot;:&quot;bookmark&quot;,&quot;title&quot;:&quot;Bookmark&quot;},&quot;btnPrint&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;icon&quot;:&quot;fa-print&quot;,&quot;icon2&quot;:&quot;print&quot;,&quot;title&quot;:&quot;Print&quot;},&quot;btnClose&quot;:{&quot;enabled&quot;:&quot;true&quot;},&quot;google_plus&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;url&quot;:&quot;&quot;},&quot;twitter&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;url&quot;:&quot;&quot;,&quot;description&quot;:&quot;&quot;},&quot;facebook&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;url&quot;:&quot;&quot;,&quot;description&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;image&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;},&quot;pinterest&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;url&quot;:&quot;&quot;,&quot;image&quot;:&quot;&quot;,&quot;description&quot;:&quot;&quot;},&quot;email&quot;:{&quot;enabled&quot;:&quot;true&quot;,&quot;url&quot;:&quot;&quot;,&quot;description&quot;:&quot;&quot;},&quot;theme&quot;:&quot;default&quot;,&quot;skin&quot;:&quot;light&quot;,&quot;useFontAwesome5&quot;:&quot;true&quot;,&quot;sideNavigationButtons&quot;:&quot;true&quot;,&quot;backgroundColor&quot;:&quot;rgb(81, 85, 88)&quot;,&quot;backgroundPattern&quot;:&quot;&quot;,&quot;backgroundImage&quot;:&quot;&quot;,&quot;backgroundTransparent&quot;:&quot;false&quot;,&quot;menuBackground&quot;:&quot;&quot;,&quot;menuShadow&quot;:&quot;&quot;,&quot;menuMargin&quot;:&quot;0&quot;,&quot;menuPadding&quot;:&quot;0&quot;,&quot;menuOverBook&quot;:&quot;false&quot;,&quot;menuFloating&quot;:&quot;false&quot;,&quot;menuTransparent&quot;:&quot;false&quot;,&quot;menu2Background&quot;:&quot;&quot;,&quot;menu2Shadow&quot;:&quot;&quot;,&quot;menu2Margin&quot;:&quot;0&quot;,&quot;menu2Padding&quot;:&quot;0&quot;,&quot;menu2OverBook&quot;:&quot;true&quot;,&quot;menu2Floating&quot;:&quot;false&quot;,&quot;menu2Transparent&quot;:&quot;true&quot;,&quot;skinColor&quot;:&quot;&quot;,&quot;skinBackground&quot;:&quot;&quot;,&quot;hideMenu&quot;:&quot;false&quot;,&quot;menuAlignHorizontal&quot;:&quot;center&quot;,&quot;btnColor&quot;:&quot;&quot;,&quot;btnBackground&quot;:&quot;none&quot;,&quot;btnRadius&quot;:&quot;0&quot;,&quot;btnMargin&quot;:&quot;0&quot;,&quot;btnSize&quot;:&quot;14&quot;,&quot;btnPaddingV&quot;:&quot;10&quot;,&quot;btnPaddingH&quot;:&quot;10&quot;,&quot;btnShadow&quot;:&quot;&quot;,&quot;btnTextShadow&quot;:&quot;&quot;,&quot;btnBorder&quot;:&quot;&quot;,&quot;sideBtnColor&quot;:&quot;#fff&quot;,&quot;sideBtnBackground&quot;:&quot;rgba(0,0,0,.3)&quot;,&quot;sideBtnRadius&quot;:&quot;0&quot;,&quot;sideBtnMargin&quot;:&quot;0&quot;,&quot;sideBtnSize&quot;:&quot;30&quot;,&quot;sideBtnPaddingV&quot;:&quot;5&quot;,&quot;sideBtnPaddingH&quot;:&quot;5&quot;,&quot;sideBtnShadow&quot;:&quot;&quot;,&quot;sideBtnTextShadow&quot;:&quot;&quot;,&quot;sideBtnBorder&quot;:&quot;&quot;,&quot;closeBtnColor&quot;:&quot;#FFF&quot;,&quot;closeBtnBackground&quot;:&quot;rgba(0,0,0,.4)&quot;,&quot;closeBtnRadius&quot;:&quot;0&quot;,&quot;closeBtnMargin&quot;:&quot;0&quot;,&quot;closeBtnSize&quot;:&quot;20&quot;,&quot;closeBtnPadding&quot;:&quot;5&quot;,&quot;closeBtnTextShadow&quot;:&quot;&quot;,&quot;closeBtnBorder&quot;:&quot;&quot;,&quot;currentPageMarginV&quot;:&quot;5&quot;,&quot;currentPageMarginH&quot;:&quot;5&quot;,&quot;arrowsAlwaysEnabledForNavigation&quot;:&quot;false&quot;,&quot;touchSwipeEnabled&quot;:&quot;true&quot;,&quot;rightClickEnabled&quot;:&quot;true&quot;,&quot;strings&quot;:{&quot;print&quot;:&quot;Print&quot;,&quot;printLeftPage&quot;:&quot;Print left page&quot;,&quot;printRightPage&quot;:&quot;Print right page&quot;,&quot;printCurrentPage&quot;:&quot;Print current page&quot;,&quot;printAllPages&quot;:&quot;Print all pages&quot;,&quot;download&quot;:&quot;Download&quot;,&quot;downloadLeftPage&quot;:&quot;Download left page&quot;,&quot;downloadRightPage&quot;:&quot;Download right page&quot;,&quot;downloadCurrentPage&quot;:&quot;Download current page&quot;,&quot;downloadAllPages&quot;:&quot;Download all pages&quot;,&quot;bookmarks&quot;:&quot;Bookmarks&quot;,&quot;bookmarkLeftPage&quot;:&quot;Bookmark left page&quot;,&quot;bookmarkRightPage&quot;:&quot;Bookmark right page&quot;,&quot;bookmarkCurrentPage&quot;:&quot;Bookmark current page&quot;,&quot;search&quot;:&quot;Search&quot;,&quot;findInDocument&quot;:&quot;Find in document&quot;,&quot;pagesFoundContaining&quot;:&quot;pages found containing&quot;,&quot;thumbnails&quot;:&quot;Thumbnails&quot;,&quot;tableOfContent&quot;:&quot;Table of Contents&quot;,&quot;share&quot;:&quot;Share&quot;,&quot;pressEscToClose&quot;:&quot;Press ESC to close&quot;},&quot;name&quot;:&quot;StopRansomware: LockBit 3.0&quot;,&quot;pdfUrl&quot;:&quot;https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/aa23-075a-stop-ransomware-lockbit.pdf&quot;,&quot;lightboxThumbnailUrl&quot;:&quot;https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/real3d-flipbook\\\/flipbook_2\\\/thumb.jpg?1679989028211&quot;,&quot;bookId&quot;:&quot;2&quot;,&quot;id&quot;:&quot;2&quot;,&quot;date&quot;:&quot;2023-03-28 07:36:41&quot;,&quot;status&quot;:&quot;published&quot;,&quot;pages&quot;:[],&quot;tableOfContent&quot;:[],&quot;rootFolder&quot;:&quot;https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/plugins\\\/real3d-flipbook\\\/&quot;,&quot;uniqueId&quot;:&quot;2_69e7bfc5d2133&quot;}\"><\/div>\n<p>Ref Link: https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-075a[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":7093,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,33],"tags":[35,58],"class_list":{"0":"post-6995","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-attack","8":"category-malware","9":"tag-cyber-attack","10":"tag-ransomware"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LockBit 3.0 Ransomware: Inside the Cyberthreat That\u2019s Costing Millions - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) for the LockBit 3.0 ransomware have been outlined in a new joint\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LockBit 3.0 Ransomware: Inside the Cyberthreat That\u2019s Costing Millions - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) for the LockBit 3.0 ransomware have been outlined in a new joint\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-28T07:07:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-28T07:43:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/LockBit-3.0-and-bug-bounty.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"LockBit 3.0 Ransomware: Inside the Cyberthreat That\u2019s Costing Millions\",\"datePublished\":\"2023-03-28T07:07:55+00:00\",\"dateModified\":\"2023-03-28T07:43:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/\"},\"wordCount\":776,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/LockBit-3.0-and-bug-bounty.jpg\",\"keywords\":[\"Cyber Attack\",\"Ransomware\"],\"articleSection\":[\"Cyber Attack\",\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/\",\"name\":\"LockBit 3.0 Ransomware: Inside the Cyberthreat That\u2019s Costing Millions - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/LockBit-3.0-and-bug-bounty.jpg\",\"datePublished\":\"2023-03-28T07:07:55+00:00\",\"dateModified\":\"2023-03-28T07:43:01+00:00\",\"description\":\"Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) for the LockBit 3.0 ransomware have been outlined in a new joint\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/LockBit-3.0-and-bug-bounty.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/LockBit-3.0-and-bug-bounty.jpg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LockBit 3.0 Ransomware: Inside the Cyberthreat That\u2019s Costing Millions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LockBit 3.0 Ransomware: Inside the Cyberthreat That\u2019s Costing Millions - Sajin Shivdas | Cybersecurity","description":"Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) for the LockBit 3.0 ransomware have been outlined in a new joint","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/","og_locale":"en_US","og_type":"article","og_title":"LockBit 3.0 Ransomware: Inside the Cyberthreat That\u2019s Costing Millions - Sajin Shivdas | Cybersecurity","og_description":"Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) for the LockBit 3.0 ransomware have been outlined in a new joint","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2023-03-28T07:07:55+00:00","article_modified_time":"2023-03-28T07:43:01+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/LockBit-3.0-and-bug-bounty.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"LockBit 3.0 Ransomware: Inside the Cyberthreat That\u2019s Costing Millions","datePublished":"2023-03-28T07:07:55+00:00","dateModified":"2023-03-28T07:43:01+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/"},"wordCount":776,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/LockBit-3.0-and-bug-bounty.jpg","keywords":["Cyber Attack","Ransomware"],"articleSection":["Cyber Attack","Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/","name":"LockBit 3.0 Ransomware: Inside the Cyberthreat That\u2019s Costing Millions - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/LockBit-3.0-and-bug-bounty.jpg","datePublished":"2023-03-28T07:07:55+00:00","dateModified":"2023-03-28T07:43:01+00:00","description":"Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) for the LockBit 3.0 ransomware have been outlined in a new joint","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/LockBit-3.0-and-bug-bounty.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/LockBit-3.0-and-bug-bounty.jpg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"LockBit 3.0 Ransomware: Inside the Cyberthreat That\u2019s Costing Millions"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6995"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6995\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/7093"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}