{"id":29923,"date":"2021-03-17T11:30:07","date_gmt":"2021-03-17T03:30:07","guid":{"rendered":"https:\/\/version-2.com\/?p=29923"},"modified":"2021-06-16T15:41:06","modified_gmt":"2021-06-16T07:41:06","slug":"go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/","title":{"rendered":"Go hack yourself: How to thwart network hacks by cybercriminals, like Iran\u2019s state-sponsored Pay2Key attacks"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"29923\" class=\"elementor elementor-29923\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f post-content elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2021\/03\/ToI-Graphic.png?resize=800%2C500&amp;ssl=1\" width=\"800\" height=\"500\" data-recalc-dims=\"1\"><\/p>\n\n<p>Whether motivated by geopolitical power, personal gain, or mere curiosity, cybercriminals are currently embracing a renaissance. Like drifting bandits in the once-lawless American West, hackers are striking corporations and individuals with relative impunity. There\u2019s no shortage of incidents to point to;&nbsp;<a href=\"https:\/\/www.securityweek.com\/iranian-hackers-target-israeli-companies-pay2key-ransomware\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">the spate of Pay2Key ransomware attacks on Israeli companies<\/a>&nbsp;at the end of 2020 by state-sanctioned Iranians hackers serves as a recent example of such activities.<\/p>\n<p>What we know today is that social engineering, email phishing, unpatched firewalls, password stuffing, malware and ransomware make up the bulk of these attacks. And it goes without saying: leaked data can be costly. Today the&nbsp;<a href=\"https:\/\/www.mitnicksecurity.com\/blog\/5-common-hacking-techniques-for-2020\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">average cost of a data breach<\/a>&nbsp;is nearly $4 million. Larger corporations aren\u2019t the only targets. Nearly half of all network breaches target small businesses that simply can\u2019t afford to absorb these losses.<\/p>\n<p>Unfortunately, you don\u2019t need to hold a doctorate in Computer Science from MIT to learn how to identify and take advantage of network vulnerabilities and cause widespread damage to companies and individuals. Look at the&nbsp;<a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/data-leak-exposes-50000-fortinet-vpn-credentials-on-popular-underground-hacker-forums-and-chats\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Fortinet VPN hack<\/a>, for example. With 50,000 hosts representing hundreds of thousands of compromised accounts belonging to some of the world\u2019s largest banks, telecoms and government entities released into the Dark Web, even the weekend hacker has the intel and direction needed to cause destruction.<\/p>\n<p>There\u2019s much to be learned and applied from these hacks, however. So, while it\u2019s unlikely we\u2019ll be able to eliminate these incidents in their entirety, there are ways we can mitigate network breaches.<\/p>\n<h2><span style=\"color: #0f92ad;\"><strong>Preventing lateral movement<\/strong><\/span><\/h2>\n<p>Lateral movement is a technique used by cybercriminals to dig deeper into a network in search of sensitive data and other valuable assets. Once they\u2019ve gained access to a network, hackers will typically maintain ongoing access by moving through the network and obtaining increasingly elevated levels of privilege.<\/p>\n<p>There are a variety of steps that, when used in conjunction with one another, can help to&nbsp;<a href=\"https:\/\/www.portnox.com\/blog\/cloud-security\/cloud-delivered-threat-response-solution\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">prevent lateral movement<\/a>. Critical among these steps is implementing adaptive network access controls. \u201cAdaptive\u201d effectively means several things: (1) you can monitor the risk posture of connecting devices and block\/allow access based on the perceived risk level; and (2) you can block\/allow access to the network based on a user\u2019s geolocation. These types of adaptive access controls, when paired with MFA \u2014 multifactor authentication \u2014 and strong password policies, can help to fortify your network.<\/p>\n<h2><span style=\"color: #0f92ad;\"><strong>Segmenting the network<\/strong><\/span><\/h2>\n<p>Network segmentation is the practice of&nbsp;<a href=\"https:\/\/www.portnox.com\/blog\/network-segmentation-dynamic-vlan-assignment\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">dividing up a network into smaller parts<\/a>, in which only assigned people have access to different parts of the network depending on their role and responsibilities. Network segmentation effectively reduces a cybercriminal\u2019s vantage point into your larger network.<\/p>\n<p>Segmenting your network can be done broadly or granularly. In effect, you want to be able to ensure that application and resource servers do not trust one another, and that any attempt to cross between them requires MFA, adaptive access control and session monitoring. Implementing&nbsp;<a href=\"https:\/\/blogs.gartner.com\/andrew-lerner\/2017\/03\/21\/microsegmentation\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">microsegmentation<\/a>&nbsp;means looking at the context of the user or device \u2013 their role, location, application, etc. \u2013 and defining access privileges based on that holistic profile.<\/p>\n<h2><span style=\"color: #0f92ad;\"><strong>Where to go from here<\/strong><\/span><\/h2>\n<p>There\u2019s a lot to unpack here. At the end of the day, to truly mitigate network breaches requires implementing a&nbsp;<a href=\"https:\/\/www.portnox.com\/use-cases\/network-access-control\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">network access control (NAC) solution<\/a>&nbsp;that can discover, authenticate and segment users across the network, while monitoring the risk of their connected devices, remediating those devices in real-time should they fall out of compliance. By leveraging NAC, organizations can deter further exposure, potentially saving themselves millions of dollars in the process.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 post-content elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Whether motivated by geopolitical power, personal gain, [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,461,61],"tags":[352,423,462],"class_list":["post-29923","post","type-post","status-publish","format-standard","hentry","category-portnox","category-year2021","category-press-release","tag-network","tag-portnox","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Go hack yourself: How to thwart network hacks by cybercriminals, like Iran\u2019s state-sponsored Pay2Key attacks - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/en\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Go hack yourself: How to thwart network hacks by cybercriminals, like Iran\u2019s state-sponsored Pay2Key attacks - Version 2\" \/>\n<meta property=\"og:description\" content=\"Whether motivated by geopolitical power, personal gain, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/en\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-17T03:30:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-16T07:41:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2021\/03\/ToI-Graphic.png?resize=800%2C500&amp;ssl=1\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Go hack yourself: How to thwart network hacks by cybercriminals, like Iran\u2019s state-sponsored Pay2Key attacks\",\"datePublished\":\"2021-03-17T03:30:07+00:00\",\"dateModified\":\"2021-06-16T07:41:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\\\/\"},\"wordCount\":625,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/ToI-Graphic.png?resize=800%2C500&amp;ssl=1\",\"keywords\":[\"Network\",\"Portnox\",\"2021\"],\"articleSection\":[\"Portnox\",\"2021\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\\\/\",\"name\":\"Go hack yourself: How to thwart network hacks by cybercriminals, like Iran\u2019s state-sponsored Pay2Key attacks - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/ToI-Graphic.png?resize=800%2C500&amp;ssl=1\",\"datePublished\":\"2021-03-17T03:30:07+00:00\",\"dateModified\":\"2021-06-16T07:41:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/ToI-Graphic.png?resize=800%2C500&amp;ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/ToI-Graphic.png?resize=800%2C500&amp;ssl=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/03\\\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Go hack yourself: How to thwart network hacks by cybercriminals, like Iran\u2019s state-sponsored Pay2Key attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Go hack yourself: How to thwart network hacks by cybercriminals, like Iran\u2019s state-sponsored Pay2Key attacks - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/en\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Go hack yourself: How to thwart network hacks by cybercriminals, like Iran\u2019s state-sponsored Pay2Key attacks - Version 2","og_description":"Whether motivated by geopolitical power, personal gain, [&hellip;]","og_url":"https:\/\/version-2.com\/en\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/","og_site_name":"Version 2","article_published_time":"2021-03-17T03:30:07+00:00","article_modified_time":"2021-06-16T07:41:06+00:00","og_image":[{"url":"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2021\/03\/ToI-Graphic.png?resize=800%2C500&amp;ssl=1","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Go hack yourself: How to thwart network hacks by cybercriminals, like Iran\u2019s state-sponsored Pay2Key attacks","datePublished":"2021-03-17T03:30:07+00:00","dateModified":"2021-06-16T07:41:06+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/"},"wordCount":625,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2021\/03\/ToI-Graphic.png?resize=800%2C500&amp;ssl=1","keywords":["Network","Portnox","2021"],"articleSection":["Portnox","2021","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/","url":"https:\/\/version-2.com\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/","name":"Go hack yourself: How to thwart network hacks by cybercriminals, like Iran\u2019s state-sponsored Pay2Key attacks - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2021\/03\/ToI-Graphic.png?resize=800%2C500&amp;ssl=1","datePublished":"2021-03-17T03:30:07+00:00","dateModified":"2021-06-16T07:41:06+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/#primaryimage","url":"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2021\/03\/ToI-Graphic.png?resize=800%2C500&amp;ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2021\/03\/ToI-Graphic.png?resize=800%2C500&amp;ssl=1"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/2021\/03\/go-hack-yourself-how-to-thwart-network-hacks-by-cybercriminals-like-irans-state-sponsored-pay2key-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Go hack yourself: How to thwart network hacks by cybercriminals, like Iran\u2019s state-sponsored Pay2Key attacks"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-7MD","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/29923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=29923"}],"version-history":[{"count":8,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/29923\/revisions"}],"predecessor-version":[{"id":29931,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/29923\/revisions\/29931"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=29923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=29923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=29923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}