{
	"id": "3b2f7572-c22c-49ff-a0c7-8745e7d64e00",
	"created_at": "2026-04-06T00:19:59.398903Z",
	"updated_at": "2026-04-10T03:21:37.153639Z",
	"deleted_at": null,
	"sha1_hash": "f0ce4043b117dca8ce644659a84a5a0f771cc37e",
	"title": "Elephant Hunting | Inside an Indian Hack-For-Hire Group",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28359,
	"plain_text": "Elephant Hunting | Inside an Indian Hack-For-Hire Group\r\nBy Tom Hegel\r\nPublished: 2023-11-16 · Archived: 2026-04-02 10:55:57 UTC\r\nSentinelLabs\r\nIn the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital\r\ndomain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level\r\nof technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized\r\nand scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.\r\nRecent Posts\r\nSign Up\r\nGet notified when we post new content.\r\nSource: https://www.sentinelone.com/labs/elephant-hunting-inside-an-indian-hack-for-hire-group/\r\nhttps://www.sentinelone.com/labs/elephant-hunting-inside-an-indian-hack-for-hire-group/\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.sentinelone.com/labs/elephant-hunting-inside-an-indian-hack-for-hire-group/"
	],
	"report_names": [
		"elephant-hunting-inside-an-indian-hack-for-hire-group"
	],
	"threat_actors": [],
	"ts_created_at": 1775434799,
	"ts_updated_at": 1775791297,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f0ce4043b117dca8ce644659a84a5a0f771cc37e.pdf",
		"text": "https://archive.orkl.eu/f0ce4043b117dca8ce644659a84a5a0f771cc37e.txt",
		"img": "https://archive.orkl.eu/f0ce4043b117dca8ce644659a84a5a0f771cc37e.jpg"
	}
}