{"id":4216,"date":"2021-06-21T09:09:05","date_gmt":"2021-06-21T07:09:05","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=4216"},"modified":"2024-05-15T16:12:07","modified_gmt":"2024-05-15T14:12:07","slug":"us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/","title":{"rendered":"US nuclear weapons contractor hit by REvil Group \/ SolarMarker malware \/ Minecraft modpacks"},"content":{"rendered":"\n<p>Welcome to the&nbsp;<a href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Xopero Security Center<\/a>!&nbsp;It&#8217;s a strange, strange world we live in&#8230; There is a new malware primary designed to block victims from entering torrent sites and other services with pirated content. And it doesn&#8217;t look like some sophisticated anti-piracy operation &#8211; generally, specialists have no idea what is going on. Victims should prepare themselves for some future scam or 2nd attack. This news open today&#8217;s review but what else our team prepared for you? REvil Group is getting more active again &#8211; this time the ransomware has hit US nuclear weapons contractor. There is also a new SolarMarker campaign that uses SEO poisoning to infect targets with a remote access trojan. The last news reports malicious Minecraft modpacks that hit Google Play Store. Ready for more details? Then check the text below. <\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"this-strange-malware-blocks-you-from-visiting-pirate-websites\"><strong>This strange malware blocks you from visiting pirate websites<\/strong><\/h2>\n\n\n<p>Researchers from Sophos have admitted they\u2019re baffled by a new piece of malware primarily designed to\u2026 prevent victims from visiting software piracy sites. It&#8217;s said to be one of the strangest cases seen in a while\u2026&nbsp;<\/p>\n\n\n\n<p>It\u2019s hidden in pirated copies of various software, including security products, and distributed on game chat service Discord and through Bittorent. Once double-clicked, it works by flashing up a bogus error message on the victim\u2019s screen while executing.<\/p>\n\n\n\n<p>The malware apparently blocks infected users from visiting a large number of piracy sites by modifying the HOSTS file on their systems.<\/p>\n\n\n\n<p>The malware also downloads and executes a second payload, an executable named \u201cProcessHacker.jpg.\u201d<\/p>\n\n\n\n<p>The malware developer\u2019s end game is still a mystery. Any ideas about what is going on? \u201cOn the face of it, the adversary\u2019s targets and tools suggest this could be some kind of crudely compiled anti-piracy vigilante operation. However, the attacker\u2019s vast potential target audience \u2014 from gamers to business professionals \u2014 combined with the curious mix of dated and new tools, techniques, and procedures (TTPs) and the bizarre list of websites blocked by the malware, all make the ultimate purpose of this operation a bit murky\u201d &#8211; said Andrew Brandt, Sophos researcher.&nbsp;<\/p>\n\n\n\n<p>The malware seems too good to be true so \u201cvictims\u201d should be prepared for some risks or potential disruption. We hope we don\u2019t have to remind you to avoid downloading pirated software and have all robust security solutions in place.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/puzzling-new-malware-blocks-access\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"us-nuclear-weapons-contractor-hit-by-revil-ransomwarenbsp\"><strong>US nuclear weapons contractor hit by REvil ransomware <\/strong><\/h2>\n\n\n<p>US nuclear weapons contractor Sol Oriens has suffered a cyberattack allegedly at the hands of the REvil ransomware gang, which claims to be auctioning data stolen during the attack.<\/p>\n\n\n\n<p>Last week, the REvil ransomware operation listed companies whose data they were auctioning off to the highest bidder. One of the listed companies is Sol Oriens, where REvil claims to have stolen business data and employees&#8217; data, including salary information and social security numbers.<\/p>\n\n\n\n<p>As proof that they stole data during the attack, REvil published images of a hiring overview document, payroll documents, and a wages report.&nbsp;<\/p>\n\n\n\n<p>Sols Oriens confirmed a cyberattack in May 2021 that affected their network. During the investigation, they determined that an unauthorized individual acquired certain documents from their systems.<\/p>\n\n\n\n<p>According to the company states they have no indication that this incident involves client classified or critical security-related information. The company is committed to notifying individuals and entities whose information is involved.&nbsp;<\/p>\n\n\n\n<p>This attack shows that ransomware gangs have no limits and compunctions. We don&#8217;t even want to imagine what would happen if secret information about nuclear technology and know-how ended up in the hands of cybercriminals.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-hits-us-nuclear-weapons-contractor\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"seo-poisoning-is-used-to-backdoor-targets-with-solarmarker-malware\"><strong>SEO poisoning is used to backdoor targets with SolarMarker malware<\/strong><\/h2>\n\n\n<p>A newly observed series of attacks use SEO poisoning to infect targets with a remote access trojan (RAT). is capable of stealing the victims&#8217; sensitive info and backdooring their systems. The malware delivered in this campaign is SolarMarker, a .NET RAT that runs in memory and is used by attackers to drop other payloads on infected devices.<\/p>\n\n\n\n<p>The interesting part &#8211; SolarMarker is designed to provide its masters with a backdoor to compromised systems and steal credentials from web browsers. The data harvested from infected systems is exfiltrated to the command-and-control server (located somewhere in Russia). It will also gain persistence by adding itself to the Startup folder and modifying shortcuts on the victims&#8217; desktop.<\/p>\n\n\n<h5 class=\"wp-block-heading\" id=\"malicious-docs-stuffed-with-seo-keywords\"><strong>Malicious docs stuffed with SEO keywords<\/strong><\/h5>\n\n\n<p>In April, we reported the <a href=\"https:\/\/xopero.com\/blog\/en\/beware-two-new-whatsapp-bugs-expose-you-to-a-man-in-the-middle-attack\/#paragraph-4\" target=\"_blank\" rel=\"noreferrer noopener\">first SolarMarker attack wave<\/a>. Then eSentire researchers observed threat actors behind the malware flooding search results with over 100,000 web pages claiming to provide free office forms. In more recent attacks spotted by Microsoft, the attackers have switched to keyword-stuffed documents hosted on AWS and Strikingly, and are now targeting other sectors, including finance and education.<\/p>\n\n\n\n<p>Attackers use thousands of PDF documents stuffed w\/ SEO keywords and links that start a chain of redirections eventually leading to the malware. Cybercriminals padded these documents with &gt;10 pages of keywords on a wide range of topics, from 'insurance form&#8217; and 'acceptance of contract&#8217; to 'how to join in SQL&#8217; and 'math answers&#8217;. Once the victims find one of the maliciously crafted PDFs and open them, they are prompted to download another PDF or DOC document containing the information they are looking for. But instead of gaining access to the info, they are redirected through multiple websites using .site, .tk, and .ga TLDs to a cloned Google Drive web page where they are served the last payload, the SolarMaker malware.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-seo-poisoning-used-to-backdoor-targets-with-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"minecraft-modpacks-with-a-nasty-malware-package-has-hit-google-play-store\"><strong>Minecraft modpacks with a nasty malware package has hit Google Play Store<\/strong><\/h2>\n\n\n<p>Are you a Minecraft player? Then you must exercise caution and do some research before installing the game\u2019s add-ons, apps, plug-ins, and mods.<\/p>\n\n\n\n<p>Minecraft is a top-rated game with followers spread worldwide. No wonder then it continues to attract cybercriminals over and over again. This time, researchers have found that malicious apps being distributed in the guise of Minecraft mods and a file recovery utility available in Google Play are concealing adware.<\/p>\n\n\n<h5 class=\"wp-block-heading\" id=\"the-adware-nature\"><strong>The adware nature\u2026<\/strong><\/h5>\n\n\n<p>Adware can make your game unusable, as well as the handheld device you are using to play the game inoperable. In addition, it will start showing unnecessary advertisements. This new version opens the browser after every few seconds and displays a full-screen ad, eventually rendering the device disabled. The app is also able to expose victims to various new threats.<\/p>\n\n\n\n<p>Always look at the reputation and reviews of an app before downloading it. In fact, in this case, most such apps are said to have 1-star reviews \u2013 a classic red flag for people to recognize a fraud. And if you installed any app that looks suspicious or has been charging you some extra subscriptions, it is important to cancel the subscription first through Google Play Store before uninstalling the app.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.hackread.com\/malware-minecraft-modpacks-google-play-store\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-are-ten-more-cybersecurity-stories-below\"><strong>Do you have thirst for knowledge? There are ten more cybersecurity stories below<\/strong><\/h2>\n\n\n<p>1. Apple issues urgent patches for 2 zero-day flaws exploited in the wild (<a href=\"https:\/\/thehackernews.com\/2021\/06\/apple-issues-urgent-patches-for-2-zero.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Hacker News<\/a>)<br>2. Microsoft experts disrupted a large-scale BEC campaign (<a href=\"https:\/\/securityaffairs.co\/wordpress\/118958\/cyber-crime\/microsoft-disrupted-bec-campaign.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Affairs<\/a>)<br>3. Cyber analytics database exposed 5 Billion records online (<a href=\"https:\/\/beta.darkreading.com\/attacks-breaches\/cyber-analytics-database-exposed-5-billion-records-online\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Dark Reading<\/a>)<br>4. Google confirms sixth zero-day Chrome attack in 2021 (<a href=\"https:\/\/www.securityweek.com\/google-confirms-sixth-zero-day-chrome-attack-2021\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Week<\/a>)<br>5. Alibaba suffers billion-item data leak of usernames and mobile numbers (<a href=\"https:\/\/www.theregister.com\/2021\/06\/16\/alibaba_tabao_scraped_data_leak\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Register<\/a>)<br>6. IKEA fined $1.2m for spying on employees (<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/ikea-fined-12m-for-spying-on\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Infosecurity Magazine<\/a>)<br>7. Black Kingdom ransomware (<a href=\"https:\/\/securelist.com\/black-kingdom-ransomware\/102873\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Secure List<\/a>)<br>8. Hackers could access photos, videos without unlocking your phone (<a href=\"https:\/\/www.hackread.com\/hackers-access-photos-videos-without-unlock-phone\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">HackRead<\/a>)<br>9. An international joint operation resulted in the arrest of Clop ransomware members (<a href=\"https:\/\/securityaffairs.co\/wordpress\/119036\/cyber-crime\/clop-ransomware-arrest.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Affairs<\/a>)<br>10. Microsoft will release future PowerShell updates via Windows Update (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-will-release-future-powershell-updates-via-windows-update\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the&nbsp;Xopero Security Center!&nbsp;It&#8217;s a strange, strange world we live in&#8230; There is a new malware primary designed to block victims from entering torrent sites and other services with pirated content. And it doesn&#8217;t look like some sophisticated anti-piracy operation &#8211; generally, specialists have no idea what is going on. Victims should prepare themselves for some future scam or 2nd attack. This news open today&#8217;s review but what else our team prepared for you? REvil Group is getting more active again &#8211; this time the ransomware has hit US nuclear weapons contractor. There is also a new SolarMarker campaign [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-4216","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>US nuclear weapons contractor hit by REvil Group \/ SolarMarker malware \/ Minecraft modpacks - Xopero Blog<\/title>\n<meta name=\"description\" content=\"There is also a new SolarMarker campaign that uses SEO poisoning to infect targets with a remote access trojan. The last news...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"US nuclear weapons contractor hit by REvil Group \/ SolarMarker malware \/ Minecraft modpacks - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"There is also a new SolarMarker campaign that uses SEO poisoning to infect targets with a remote access trojan. The last news...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-21T07:09:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-15T14:12:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"US nuclear weapons contractor hit by REvil Group \\\/ SolarMarker malware \\\/ Minecraft modpacks\",\"datePublished\":\"2021-06-21T07:09:05+00:00\",\"dateModified\":\"2024-05-15T14:12:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\\\/\"},\"wordCount\":1257,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\\\/\",\"name\":\"US nuclear weapons contractor hit by REvil Group \\\/ SolarMarker malware \\\/ Minecraft modpacks - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2021-06-21T07:09:05+00:00\",\"dateModified\":\"2024-05-15T14:12:07+00:00\",\"description\":\"There is also a new SolarMarker campaign that uses SEO poisoning to infect targets with a remote access trojan. The last news...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"US nuclear weapons contractor hit by REvil Group \\\/ SolarMarker malware \\\/ Minecraft modpacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"US nuclear weapons contractor hit by REvil Group \/ SolarMarker malware \/ Minecraft modpacks - Xopero Blog","description":"There is also a new SolarMarker campaign that uses SEO poisoning to infect targets with a remote access trojan. The last news...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/","og_locale":"pl_PL","og_type":"article","og_title":"US nuclear weapons contractor hit by REvil Group \/ SolarMarker malware \/ Minecraft modpacks - Xopero Blog","og_description":"There is also a new SolarMarker campaign that uses SEO poisoning to infect targets with a remote access trojan. The last news...","og_url":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2021-06-21T07:09:05+00:00","article_modified_time":"2024-05-15T14:12:07+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"US nuclear weapons contractor hit by REvil Group \/ SolarMarker malware \/ Minecraft modpacks","datePublished":"2021-06-21T07:09:05+00:00","dateModified":"2024-05-15T14:12:07+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/"},"wordCount":1257,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/","url":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/","name":"US nuclear weapons contractor hit by REvil Group \/ SolarMarker malware \/ Minecraft modpacks - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2021-06-21T07:09:05+00:00","dateModified":"2024-05-15T14:12:07+00:00","description":"There is also a new SolarMarker campaign that uses SEO poisoning to infect targets with a remote access trojan. The last news...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/us-nuclear-weapons-contractor-hit-by-revil-group-solarmarker-malware-minecraft-modpacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"US nuclear weapons contractor hit by REvil Group \/ SolarMarker malware \/ Minecraft modpacks"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=4216"}],"version-history":[{"count":9,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4216\/revisions"}],"predecessor-version":[{"id":5867,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4216\/revisions\/5867"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=4216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=4216"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=4216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}