{
	"id": "40aaa72e-e886-4201-a6d9-d908d8e49a20",
	"created_at": "2026-04-06T00:12:46.804003Z",
	"updated_at": "2026-04-10T03:23:51.056539Z",
	"deleted_at": null,
	"sha1_hash": "0c50dd865ffd5c1b97da7fad06ca51aa1922e6b5",
	"title": "Sprocket Security | Find the latest Webinar content from the Sprocket…",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 6674834,
	"plain_text": "Sprocket Security | Find the latest Webinar content from the\r\nSprocket…\r\nBy Greg Anderson Lead Solutions Engineer\r\nArchived: 2026-04-05 14:06:44 UTC\r\nMar 30, 2026\r\nThe Three Million Device Takedown Reveals Why Your IoT Security Theater Failed\r\nFour botnets. Three million devices. The same IoT vulnerabilities security teams have deprioritized for years.\r\nWhat defenders keep getting wrong.\r\nCybersecurity\r\nVulnerability Management\r\nAttack Surface Management\r\nRisk Management\r\nREAD\r\nhttps://www.sprocketsecurity.com/blog/tracing-a-threat-actors-footprints-on-tor\r\nPage 1 of 6\n\nMar 23, 2026\r\nPopping Printers: How Your MFPs Are Handing Attackers Domain Admin\r\nNick Berrie\r\nSenior Penetration Tester\r\nMultifunction printers silently store domain credentials, expose unauthenticated management interfaces, and sit on\r\nflat networks. Learn how attackers exploit MFPs to achieve domain admin in minutes.\r\nhttps://www.sprocketsecurity.com/blog/tracing-a-threat-actors-footprints-on-tor\r\nPage 2 of 6\n\nMar 19, 2026\r\nStarting Strong: Successful Onboarding with Sprocket Security\r\nJustin Wise\r\nTechnical Account Manager\r\nThe fastest path from kickoff to testing starts with alignment, preparation, and the right people in the room.\r\nhttps://www.sprocketsecurity.com/blog/tracing-a-threat-actors-footprints-on-tor\r\nPage 3 of 6\n\nMar 17, 2026\r\nCypherCon 2026: Where Hacker Culture and Security Innovation Meet\r\nCarly Hochstein\r\nEvents and Marketing Operations Manager\r\nSprocket Security is heading to CypherCon 2026 in Milwaukee to connect with the hacker community, explore\r\ncutting-edge security research, and discuss how continuous offensive security is reshaping how organizations\r\nvalidate risk.\r\nhttps://www.sprocketsecurity.com/blog/tracing-a-threat-actors-footprints-on-tor\r\nPage 4 of 6\n\nMar 10, 2026\r\nPlease Show Your Work: Bypassing JavaScript Proof-of-Work CAPTCHAs\r\nJuan Pablo Gomez Postigo\r\nSenior Penetration Tester\r\nUnderstanding how SiteGround’s proof-of-work CAPTCHA silently disrupts automated WordPress security scans\r\nand how to work around it.\r\nhttps://www.sprocketsecurity.com/blog/tracing-a-threat-actors-footprints-on-tor\r\nPage 5 of 6\n\nMar 05, 2026\r\nAhead of the Breach – Accenture's Daniel Barnes on SAML exploitation and what really matters\r\nin pentesting\r\nDaniel Barnes shares stories from his pentesting career and gives advice for up-and-coming offensive security\r\nprofessionals.\r\nSource: https://www.sprocketsecurity.com/blog/tracing-a-threat-actors-footprints-on-tor\r\nhttps://www.sprocketsecurity.com/blog/tracing-a-threat-actors-footprints-on-tor\r\nPage 6 of 6",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia",
		"MISPGALAXY"
	],
	"references": [
		"https://www.sprocketsecurity.com/blog/tracing-a-threat-actors-footprints-on-tor"
	],
	"report_names": [
		"tracing-a-threat-actors-footprints-on-tor"
	],
	"threat_actors": [
		{
			"id": "d90307b6-14a9-4d0b-9156-89e453d6eb13",
			"created_at": "2022-10-25T16:07:23.773944Z",
			"updated_at": "2026-04-10T02:00:04.746188Z",
			"deleted_at": null,
			"main_name": "Lead",
			"aliases": [
				"Casper",
				"TG-3279"
			],
			"source_name": "ETDA:Lead",
			"tools": [
				"Agentemis",
				"BleDoor",
				"Cobalt Strike",
				"CobaltStrike",
				"RbDoor",
				"RibDoor",
				"Winnti",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434366,
	"ts_updated_at": 1775791431,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/0c50dd865ffd5c1b97da7fad06ca51aa1922e6b5.pdf",
		"text": "https://archive.orkl.eu/0c50dd865ffd5c1b97da7fad06ca51aa1922e6b5.txt",
		"img": "https://archive.orkl.eu/0c50dd865ffd5c1b97da7fad06ca51aa1922e6b5.jpg"
	}
}