{"id":2082,"date":"2020-03-27T05:37:43","date_gmt":"2020-03-27T05:37:43","guid":{"rendered":"https:\/\/howste.ninja\/?p=2082"},"modified":"2022-11-27T04:46:44","modified_gmt":"2022-11-27T04:46:44","slug":"an-elite-spy-group-used-5-zero-days-to-hack-north-koreans","status":"publish","type":"post","link":"https:\/\/howste.ninja\/index.php\/2020\/03\/27\/an-elite-spy-group-used-5-zero-days-to-hack-north-koreans\/","title":{"rendered":"An Elite Spy Group Used 5 Zero-Days to Hack North Koreans"},"content":{"rendered":"<p>#BecauseSometimesYouNeedANinja<\/p>\n<p>South Korea is a prime suspect for exploiting the secret software vulnerabilities in a sophisticated espionage campaign.<\/p>\n<p>Source: <a target=\"_blank\" title=\"An Elite Spy Group Used 5 Zero-Days to Hack North Koreans\" href=\"https:\/\/www.wired.com\/story\/north-korea-hacking-zero-days-google\" rel=\"noopener\">https:\/\/www.wired.com\/story\/north-korea-hacking-zero-days-google<\/a><\/p>\n<p>#BSYNAN #Howste<\/p>\n<p><a href=\"https:\/\/bit.ly\/2wG8LK2\" title=\"attachement\"><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5e7d0221ff08eb0008ee30e4\/191:100\/w_1280,c_limit\/Security_NKorea_Hack_1127703766.jpg\" alt=\"attachement\" title=\"attachement\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>#BecauseSometimesYouNeedANinja South Korea is a prime suspect for exploiting the secret software vulnerabilities in a sophisticated espionage campaign. Source: https:\/\/www.wired.com\/story\/north-korea-hacking-zero-days-google #BSYNAN #Howste<\/p>\n","protected":false},"author":3,"featured_media":2081,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[7],"tags":[],"class_list":{"0":"post-2082","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-digital-marketing","9":"post-with-thumbnail","10":"post-with-thumbnail-large"},"_links":{"self":[{"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/posts\/2082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/comments?post=2082"}],"version-history":[{"count":1,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/posts\/2082\/revisions"}],"predecessor-version":[{"id":5125,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/posts\/2082\/revisions\/5125"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/media\/2081"}],"wp:attachment":[{"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/media?parent=2082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/categories?post=2082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howste.ninja\/index.php\/wp-json\/wp\/v2\/tags?post=2082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}