{"id":48368,"date":"2016-03-16T16:33:34","date_gmt":"2016-03-16T23:33:34","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=48368"},"modified":"2025-06-02T00:51:01","modified_gmt":"2025-06-02T07:51:01","slug":"hacktivists-turn-phishing-fund-causes","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/","title":{"rendered":"Hacktivists Turn to Phishing to Fund Their Causes"},"content":{"rendered":"<p>At McAfee we recently\u00a0observed a phishing campaign targeting Apple account holders.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-48369\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od001.jpg\" alt=\"1403_od001\" width=\"560\" height=\"376\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od001.jpg 560w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od001-300x201.jpg 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>The link directed the user to a compromised WordPress site used to serve the fake Apple ID login page.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-48370\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od043.jpg\" alt=\"1403_od043\" width=\"1176\" height=\"650\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od043.jpg 1176w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od043-300x166.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od043-768x424.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od043-1024x566.jpg 1024w\" sizes=\"auto, (max-width: 1176px) 100vw, 1176px\" \/><\/p>\n<p>Users are asked to log in with their\u00a0Apple IDs, and then are requested to update billing information and credit card details. In the following images we have highlighted some indicators that the site is not legitimate.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-48371\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/e1403_od063.jpg\" alt=\"e1403_od063\" width=\"1274\" height=\"865\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/e1403_od063.jpg 1274w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/e1403_od063-300x204.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/e1403_od063-768x521.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/e1403_od063-1024x695.jpg 1024w\" sizes=\"auto, (max-width: 1274px) 100vw, 1274px\" \/><\/p>\n<p>Users are then redirected to the official Apple page.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-48372\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od073.jpg\" alt=\"1403_od073\" width=\"1227\" height=\"823\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od073.jpg 1227w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od073-300x201.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od073-768x515.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od073-1024x687.jpg 1024w\" sizes=\"auto, (max-width: 1227px) 100vw, 1227px\" \/><\/p>\n<p>The phishers usually create a local .zip file that\u00a0contains all of their scripts to create the phishing page. They upload this file to a compromised server, extract it, and delete the file. On this occasion, the phisher appears to have forgotten to perform this last step.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-48374\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od003.jpg\" alt=\"1403_od003\" width=\"380\" height=\"317\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od003.jpg 380w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od003-300x250.jpg 300w\" sizes=\"auto, (max-width: 380px) 100vw, 380px\" \/><\/p>\n<p>This oversight enabled us to see how the website code worked; we found some interesting comments.<\/p>\n<p>The .zip file contained a readme that states\u00a0the results would\u00a0be stored locally, although this was not the case.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-48381\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od005.jpg\" alt=\"1403_od005\" width=\"509\" height=\"256\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od005.jpg 509w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od005-300x151.jpg 300w\" sizes=\"auto, (max-width: 509px) 100vw, 509px\" \/><\/p>\n<p>We also\u00a0found some\u00a0.htaccess files. These are used to block access to the site by checking the originating IP of the connection. This is done to prevent the site&#8217;s being accessed and analyzed by robot scrapers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-48375\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od004.jpg\" alt=\"1403_od004\" width=\"851\" height=\"397\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od004.jpg 851w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od004-300x140.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od004-768x358.jpg 768w\" sizes=\"auto, (max-width: 851px) 100vw, 851px\" \/><\/p>\n<p>Depending on the page a user lands on\u2014credit card, Apple login, or address change\u2014a .php script generates an email and sends it to bayremking0@gmail.com.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-48376\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od006.jpg\" alt=\"1403_od006\" width=\"1050\" height=\"630\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od006.jpg 1050w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od006-300x180.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od006-768x461.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od006-1024x614.jpg 1024w\" sizes=\"auto, (max-width: 1050px) 100vw, 1050px\" \/><\/p>\n<p>In one of the .php files we found a reference a hacktivist group. We did some investigating and found this name had been associated with several website defacings. The group\u2019s activities promote a set of political views, so we suspect that the group was funding its operations through this new phishing scam.<\/p>\n<p>We received another phishing email that\u00a0was identical to the original one apart from the URL it linked to. It served the same fake Apple page but this time it did not contain the .zip file. We went to the homepage of the compromised site and found it had also been defaced.<\/p>\n<p>This confirmed our view that the original phishing site was hacked by the hacktivist group. It seems that political hackers are now using their skills to generate income to aid their causes.<\/p>\n<h2>McAfee&#8217;s Protection<\/h2>\n<p>McAfee customers are protected from this campaign through heuristic definitions and McAfee Global Threat Intelligence reputation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At McAfee we recently\u00a0observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress&#8230;<\/p>\n","protected":false},"author":774,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[76,3949,4452,3923],"coauthors":[849,854],"class_list":["post-48368","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybercrime","tag-cybersafety","tag-cybersecurity","tag-email-and-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hacktivists Turn to Phishing to Fund Their Causes | McAfee Blog<\/title>\n<meta name=\"description\" content=\"At McAfee we recently\u00a0observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress site used to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacktivists Turn to Phishing to Fund Their Causes | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"At McAfee we recently\u00a0observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress site used to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-16T23:33:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T07:51:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od001.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"560\" \/>\n\t<meta property=\"og:image:height\" content=\"376\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Oliver Devane, Mohinder Gill\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oliver Devane, Mohinder Gill\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/\"},\"author\":{\"name\":\"Oliver Devane\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f3e79f95122a1e56c0b07811a4f2188a\"},\"headline\":\"Hacktivists Turn to Phishing to Fund Their Causes\",\"datePublished\":\"2016-03-16T23:33:34+00:00\",\"dateModified\":\"2025-06-02T07:51:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/\"},\"wordCount\":390,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od001.jpg\",\"keywords\":[\"cybercrime\",\"cybersafety\",\"cybersecurity\",\"email and web security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/\",\"name\":\"Hacktivists Turn to Phishing to Fund Their Causes | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od001.jpg\",\"datePublished\":\"2016-03-16T23:33:34+00:00\",\"dateModified\":\"2025-06-02T07:51:01+00:00\",\"description\":\"At McAfee we recently\u00a0observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress site used to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od001.jpg\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od001.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Hacktivists Turn to Phishing to Fund Their Causes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f3e79f95122a1e56c0b07811a4f2188a\",\"name\":\"Oliver Devane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/145287b0eca301fc80d99baf060dd274\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Oliver-Devane-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Oliver-Devane-96x96.jpg\",\"caption\":\"Oliver Devane\"},\"description\":\"Oliver Devane is currently a Senior Security Researcher at McAfee. He is based in the UK office and has over 10 years of experience analyzing Malware and Potentially Unwanted Programs.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/oliver-devane-1a528749\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/oliver-devane\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacktivists Turn to Phishing to Fund Their Causes | McAfee Blog","description":"At McAfee we recently\u00a0observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress site used to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Hacktivists Turn to Phishing to Fund Their Causes | McAfee Blog","og_description":"At McAfee we recently\u00a0observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress site used to","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-03-16T23:33:34+00:00","article_modified_time":"2025-06-02T07:51:01+00:00","og_image":[{"width":560,"height":376,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1403_od001.jpg","type":"image\/jpeg"}],"author":"Oliver Devane, Mohinder Gill","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Oliver Devane, Mohinder Gill","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/"},"author":{"name":"Oliver Devane","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f3e79f95122a1e56c0b07811a4f2188a"},"headline":"Hacktivists Turn to Phishing to Fund Their Causes","datePublished":"2016-03-16T23:33:34+00:00","dateModified":"2025-06-02T07:51:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/"},"wordCount":390,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od001.jpg","keywords":["cybercrime","cybersafety","cybersecurity","email and web security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/","name":"Hacktivists Turn to Phishing to Fund Their Causes | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od001.jpg","datePublished":"2016-03-16T23:33:34+00:00","dateModified":"2025-06-02T07:51:01+00:00","description":"At McAfee we recently\u00a0observed a phishing campaign targeting Apple account holders. The link directed the user to a compromised WordPress site used to","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od001.jpg","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1403_od001.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hacktivists-turn-phishing-fund-causes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Hacktivists Turn to Phishing to Fund Their Causes"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f3e79f95122a1e56c0b07811a4f2188a","name":"Oliver Devane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/145287b0eca301fc80d99baf060dd274","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Oliver-Devane-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Oliver-Devane-96x96.jpg","caption":"Oliver Devane"},"description":"Oliver Devane is currently a Senior Security Researcher at McAfee. He is based in the UK office and has over 10 years of experience analyzing Malware and Potentially Unwanted Programs.","sameAs":["https:\/\/www.linkedin.com\/in\/oliver-devane-1a528749\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/oliver-devane\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/774"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=48368"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48368\/revisions"}],"predecessor-version":[{"id":214793,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48368\/revisions\/214793"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=48368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=48368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=48368"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=48368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}