{"id":127142,"date":"2023-04-11T09:00:00","date_gmt":"2023-04-11T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=127142"},"modified":"2025-06-18T07:33:59","modified_gmt":"2025-06-18T14:33:59","slug":"dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/","title":{"rendered":"DEV-0196: QuaDream\u2019s \u201cKingsPawn\u201d malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\"><strong>April 2023 update<\/strong> \u2013 Microsoft Threat Intelligence has shifted to a new threat actor naming taxonomy aligned around the theme of weather. <strong>DEV-0196<\/strong> is now tracked as <strong>Carmine Tsunami<\/strong>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about this evolution, how the new taxonomy represents the origin, unique traits, and impact of threat actors, and a complete mapping of threat actor names, read this blog: <strong><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/microsoft-shifts-to-a-new-threat-actor-naming-taxonomy\/\">Microsoft shifts to a new threat actor naming taxonomy<\/a><\/strong>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-thin\"\/>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Threat Intelligence analysts assess with high confidence that a threat group tracked by Microsoft as DEV-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream. QuaDream reportedly sells a platform they call REIGN to governments for law enforcement purposes. REIGN is a suite of exploits, malware, and infrastructure designed to exfiltrate data from mobile devices. &nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this blog, Microsoft analyzes DEV-0196, discusses technical details of the actor\u2019s iOS malware, which we call KingsPawn, and shares both host and network indicators of compromise that can be used to aid in detection.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Over the course of our investigation into DEV-0196, Microsoft collaborated with multiple partners. One of those partners, Citizen Lab of the University of Toronto\u2019s Munk School, identified at least five civil society victims of the DEV-0196 malware that included journalists, political opposition figures, and a non-government organisation (NGO) worker, in North America, Central Asia, Southeast Asia, Europe, and the Middle East. Furthermore, Citizen Lab was able to identify operator locations for QuaDream systems in the following countries: Bulgaria, Czechia, Hungary, Ghana, Israel, Mexico, Romania, Singapore, United Arab Emirates, and Uzbekistan. Read the Citizen Lab report <a href=\"https:\/\/citizenlab.ca\/2023\/04\/spyware-vendor-quadream-exploits-victims-customers\/\">here<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft is sharing information about DEV-0196 with our customers, industry partners, and the public to improve collective knowledge of how PSOAs operate and raise awareness about how PSOAs facilitate the targeting and exploitation of civil society. For more info, read <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/?p=65590\">Standing up for democratic values and protecting stability of cyberspace<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"dev-0196-a-private-sector-offensive-actor-based-in-israel\">DEV-0196: A private-sector offensive actor based in Israel<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">PSOAs, which Microsoft also refers to as cyber mercenaries, sell hacking tools or services through a variety of business models, including access as a service. In access as a service, the actor sells full end-to-end hacking tools that can be used by the purchaser in cyber operations. The PSOA itself is not involved in any targeting or running of the operations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Threat Intelligence analysts assess with high confidence that DEV-0196 uses this model, selling exploitation services and malware to governments. It\u2019s not directly involved in targeting. Microsoft also assesses with high confidence that DEV-0196 is linked to an Israel-based private company called QuaDream. According to the <a href=\"https:\/\/ica.justice.gov.il\/GenericCorporarionInfo\/SearchCorporation?unit=8\">Israeli Corporations Authority<\/a>, QuaDream, under the Israeli name \u05e7\u05d5\u05d5\u05d3\u05e8\u05d9\u05dd \u05d1\u05e2&#8221;\u05de, was incorporated in August 2016. The company has no website, and there is little public reporting about the company, with a few notable exceptions.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">QuaDream came to international attention in a <a href=\"https:\/\/www.reuters.com\/technology\/exclusive-iphone-flaw-exploited-by-second-israeli-spy-firm-sources-2022-02-03\/\">2022 Reuters report<\/a>, which cited a company brochure that described the REIGN platform and a list of capabilities, the report also notably suggested that QuaDream used a zero-click iOS exploit that leveraged the same vulnerability seen in NSO Group\u2019s ForcedEntry exploit. An earlier report by Israeli<a href=\"https:\/\/www.haaretz.com\/israel-news\/tech-news\/2021-06-08\/ty-article\/.highlight\/the-secret-israeli-cyber-firm-selling-spy-tech-to-saudia-arabia\/0000017f-df07-d856-a37f-ffc724f80000\"> news outlet Haaretz,<\/a> also citing a QuaDream brochure, revealed that QuaDream did not sell REIGN directly to customers but instead did so through a Cypriot company. Haaretz also reported that Saudi Arabia\u2019s government was among QuaDream\u2019s clients, as was the government of Ghana. However, Haaretz could not confirm allegations made in the <a href=\"https:\/\/whatsupnewsghana.com\/2020\/11\/06\/israeli-tech-mercenaries-risk-sanctions-over-ghana-spying\/\">Ghanian press<\/a> and <a href=\"https:\/\/www.calcalist.co.il\/internet\/articles\/0,7340,L-3852192,00.html\">repeated<\/a> in the Israeli <a href=\"https:\/\/www.jpost.com\/international\/how-are-israelis-involved-in-african-elections-664548\">press<\/a> that QuaDream employees were among 14 Israeli tech workers from different companies who travelled to Accra, Ghana in 2020 to meet with the incumbent administration three months prior to the presidential election for the purposes of a special project relating to it.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">QuaDream was mentioned in a December 2022 report from <a href=\"https:\/\/about.fb.com\/wp-content\/uploads\/2022\/12\/Threat-Report-on-the-Surveillance-for-Hire-Industry.pdf\">Meta<\/a>, which reportedly took down 250 accounts associated with the company. According to the report, Meta observed QuaDream testing its ability to exploit iOS and Android mobile devices with the intent \u201cto exfiltrate various types of data including messages, images, video and audio files, and geolocation.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"technical-investigation-dev-0196-malware\">Technical investigation: DEV-0196 malware<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Threat Intelligence analysts assess with high confidence that the malware, which we call KingsPawn, is developed by DEV-0196 and therefore strongly linked to QuaDream. We assess with medium confidence that the mobile malware we associate with DEV-0196 is part of the system publicly discussed as REIGN.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The captured samples targeted iOS devices, specifically iOS 14, but there were indications that some of the code could also be used on Android devices. Since the malware sample targets iOS 14, some of the techniques used in this sample may no longer work or be relevant on newer iOS versions. However, we assess it\u2019s highly likely that DEV-0196 will have updated their malware, targeting newer versions to account for this. Analysis of the malware revealed that it is split into multiple components. The sections below focus on two of those components: a monitor agent and the main malware agent.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"monitor-agent\">Monitor agent<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The monitor agent is a native Mach-O file written in Objective-C. It is responsible for reducing the forensic footprint of the malware to prevent detection and hinder investigations. It has multiple techniques to do this, one of which is monitoring various directories, such as <em>\/private\/var\/db\/analyticsd\/<\/em> and <em>\/private\/var\/mobile\/Library\/Logs\/CrashReporter,<\/em> for any malware execution artifacts or crash-related files. Once these artifacts or files are identified, the monitor agent deletes them.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The monitor agent is also in charge of managing the various processes and threads spawned on behalf of the malware to avoid artifacts created from unexpected process crashes. The agent uses the <a href=\"https:\/\/linux.die.net\/man\/2\/waitpid\"><em>waitpid<\/em><\/a> function to monitor all child processes that are spawned, and the child process IDs are added to a tracking list. The monitor agent attempts to safely shut down tracked child processes by calling <a href=\"https:\/\/linux.die.net\/man\/2\/sigaction\"><em>sigaction<\/em><\/a><em> <\/em>with the SIGTSTP parameter, if <em>sigaction<\/em> returns successfully this means the child process is reachable and a <em>SIGKILL<\/em> command is sent to kill it. This avoids sending a <em>kill<\/em> command to a non-existent PID, which can leave error messages and artifacts behind.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"main-agent\">Main agent<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The main agent is also a native Mach-O file. However, it is written in Go, a highly portable language, which was likely chosen because it allows compilation across multiple platforms, reducing development effort.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This agent includes capabilities to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Get device information (such as iOS version and battery status)<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Wi-Fi information (such as SSID and airplane mode status)<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Cellular information (such as carrier, SIM card data, and phone number)<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Search for and retrieve files<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Use the device camera in the background<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Get device location<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Monitor phone calls<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Access the iOS keychain<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Generate an iCloud time-based one-time password (TOTP)<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">It achieves some of these functionalities, for example the surreptitious camera use, by leveraging two key binaries, <em>tccd<\/em> and <em>mediaserverd<\/em>, a technique described by <a href=\"https:\/\/blog.zecops.com\/research\/how-ios-malware-can-spy-on-users-silently\/\">ZecOps<\/a>. The name <em>tccd<\/em> stands for Transparency, Consent, and Control (TCC) Daemon, and the process manages the access permissions for various peripherals such as the camera and microphone. Normally, users are met with a pop-up prompt from the <em>tccd<\/em> process, alerting them that something has requested access to the camera, microphone, or other peripheral, and the user is required to either allow or deny it. In this compromise scenario, the agent injects itself into the <em>tccd<\/em> binary, which allows the agent to spawn both new processes and threads as part of the exploitation process, and also allows it to bypass any <em>tccd<\/em> prompts on the device meaning the user would be unaware of camera compromise. In concert with <em>tccd<\/em>, the agent also provisions itself permission to run in the background via <em>mediaserverd<\/em>. This binary handles the interface that other apps interact with when utilizing the camera. For more details on <a href=\"http:\/\/newosxbook.com\/src.jl?tree=listings&amp;file=inject.c\">iOS process injection<\/a>, <em>tccd<\/em> and other system components, see Jonathan Levin\u2019s macOS and iOS internals <a href=\"http:\/\/newosxbook.com\/home.html\">books<\/a> and <a href=\"http:\/\/newosxbook.com\/code.html\">blog<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The techniques used in the main agent include a <a href=\"https:\/\/papers.put.as\/papers\/ios\/2019\/bluehatil-luca.pdf\">PMAP<\/a> bypass, an <a href=\"https:\/\/www.theiphonewiki.com\/wiki\/AppleMobileFileIntegrity\">Apple Mobile File Integrity<\/a> (<a href=\"https:\/\/www.theiphonewiki.com\/wiki\/AppleMobileFileIntegrity\">AMFI<\/a>) bypass, and a <a href=\"https:\/\/support.apple.com\/guide\/security\/security-of-runtime-process-sec15bfe098e\/web\">sandbox<\/a> escape. PMAP is one of the mechanisms that works with the Page Protection Layer (<a href=\"https:\/\/support.apple.com\/guide\/security\/operating-system-integrity-sec8b776536b\/web#:~:text=Page%20Protection%20Layer%20(PPL)%20in,code%20signature%20verification%20is%20complete.\">PPL<\/a>) to prevent unsigned code from running on iOS devices. AMFI is a protection mechanism comprised of multiple components including a kernel extension, <em>AppleFileMobileIntegrity.kext<\/em>, as well as userland daemon, <em>amfid<\/em>. The <a href=\"https:\/\/developer.apple.com\/documentation\/security\/app_sandbox\">sandbox<\/a> limits access to system resources and user data via an entitlements system. Although PMAP, PPL, AMFI, and the sandbox have been hardened over the years, advanced attackers attempt to circumvent these protection mechanisms in order to <a href=\"https:\/\/www.objc.io\/issues\/17-security\/inside-code-signing\/\">run unsigned code<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The agent also creates <a href=\"https:\/\/developer.apple.com\/forums\/thread\/689696\">a secure channel<\/a> for <a href=\"https:\/\/developer.apple.com\/documentation\/xpc\">XPC<\/a> messaging by creating a nested app extension called <em>fud.appex<\/em>. XPC messaging allows the agent to query various system binaries for sensitive device information, such as location details. Although there is a legitimate binary called <em>fud<\/em> on iOS devices that is part of the Mobile Accessory updater service, <em>fud.appex<\/em> is not part of a legitimate Apple service. The agent creates the malicious app extension inside the folder \/<em>private\/var\/db\/com.apple.xpc.roleaccountd.staging\/PlugIns\/<\/em>. The primary reason for performing XPC messaging from within this application extension is to establish a covert channel that enables the agent to avoid being monitored. This nested directory technique means that the XPC service is registered such a way that it is only visible to the app extension itself, so any external monitoring by other applications and system processes is far more difficult. Upon unhooking and restoring <em>tccd<\/em> to its original state, the entire <em>PlugIns<\/em> folder is removed to further hide any artifacts of its existence.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In their <a href=\"https:\/\/citizenlab.ca\/2023\/04\/spyware-vendor-quadream-exploits-victims-customers\/\">blog<\/a>, Citizen Lab discusses the presence of likely malicious calendar events on devices compromised by DEV-0196\u2019s malware, so another notable function of the main agent is that it contains specific code to remove events from the device\u2019s calendar. The agent searches all calendar events from two years prior to the current time and up to the furthest possible allowed future time, removing any events that are tied to a given email address as the \u201corganizer\u201d. The agent also removes the email address from the <a href=\"https:\/\/github.com\/mvt-project\/mvt\/blob\/main\/docs\/ios\/records.md\"><em>idstatuscache.plist<\/em><\/a><em>, <\/em>which is a database containing records of the first contact of the device with other iCloud accounts. This list would contain the email address that sent the malicious calendar invitation, as well as a time stamp of the original interaction, such as when the invite was received.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">There is additional functionality within the agent to cover its tracks by removing artifacts of location monitoring from the <em>locationd <\/em>process\u2019 records. To first query locations from <em>locationd<\/em>, the agent must register a client that communicates with <em>locationd<\/em> via XPC messaging. The <em>locationd<\/em> process then stores a record of these connections in \/<em>private\/var\/root\/Library\/Caches\/locationd\/clients.plist<\/em>. The malicious agent searches for items in the client <em>plist<\/em> that have a suffix of <em>subridged<\/em>, and then removes them, which indicates that the name of their location monitoring client likely ends in that word. This is another example of malicious activity attempting to masquerade as benign system processes, since <em>subridged<\/em> is the name of a legitimate Apple binary, a part of the SoftwareUpdateBridge Framework.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"technical-investigation-dev-0196-infrastructure\">Technical investigation: DEV-0196 infrastructure<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft developed unique network detections that could be used to fingerprint DEV-0196\u2019s infrastructure on the internet. The group heavily utilized domain registrars and inexpensive cloud hosting providers that accepted cryptocurrency as payment. They tended to only use a single domain per IP address and domains were very rarely reused across multiple IP addresses. Many of the observed domains were deployed using free <a href=\"https:\/\/letsencrypt.org\/\">Let\u2019s Encrypt<\/a> SSL certificates, while others used self-signed certificates designed to blend in with normal Kubernetes deployments.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We have included network-based indicators at the end of this post for detection purposes. Often, threat actors employ domains that carry country-specific TLDs or themes that align with the location of intended targets. Notably, our list of DEV-0196 domains includes domains strongly associated with some countries that Citizen Lab has identified as locations of victims, countries where QuaDream platforms were operating, or both. To be clear, the identification of victims of the malware in a country doesn\u2019t necessarily mean that an entity in that country is a DEV-0196 customer, as international targeting is common.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"prevention-and-detection\">Prevention and detection<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Preventing exploitation of mobile devices by advanced actors who potentially have zero-click exploits is difficult. There are also significant challenges in detecting an attack on mobile devices, both during and after the compromise. This section discusses some methods for minimizing the risk of malicious actors compromising mobile devices, and then provides some indicators of compromise we associate with DEV-0196 activity.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Basic <a href=\"https:\/\/www.microsoft.com\/microsoft-365-life-hacks\/privacy-and-safety\/cyber-hygiene\">cyber hygiene<\/a> is important in helping prevent mobile device compromise. Specific best practices include keeping the device\u2019s software updated to the latest version, enabling automatic software updates if available, using anti-malware software, and being vigilant about not clicking links in any unexpected or suspicious messages.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If you believe you may be targeted by advanced attackers and use an iOS device, we recommend enabling <a href=\"https:\/\/support.apple.com\/en-us\/HT212650\">Lockdown Mode<\/a>. Lockdown Mode offers enhanced security for iOS devices by reducing the attack surface available to threat actors.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"sentinel-detections\">Sentinel detections<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Sentinel customers can use the TI Mapping analytic to automatically match the malicious domain indicators mentioned in this blog post with data in their workspace. If the TI Map analytics are not currently deployed, customers can install the Threat Intelligence solution from the Microsoft Sentinel Content Hub to have the analytics rule deployed in their Sentinel workspace. More details on the Content Hub can be found here: <a href=\"https:\/\/learn.microsoft.com\/azure\/sentinel\/sentinel-solutions-deploy\">https:\/\/learn.microsoft.com\/azure\/sentinel\/sentinel-solutions-deploy<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In addition, customers can access the shared indicators in a structured format via GitHub so that they can be integrated into custom analytics and other queries: <a href=\"https:\/\/github.com\/microsoft\/mstic\/blob\/master\/RapidReleaseTI\/Indicators.csv\">https:\/\/github.com\/microsoft\/mstic\/blob\/master\/RapidReleaseTI\/Indicators.csv<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"indicators-of-compromise-iocs\">Indicators of compromise (IOCs)<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"host-based-indicators\">Host-based indicators<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">These host-based indicators are indicative of DEV-0196 activity; however, they shouldn\u2019t be used solely as attribution since other actors may also use the same or similar TTPs.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The file existing, or process activity from, <em>\/private\/var\/db\/com.apple.xpc.roleaccountd.staging\/subridged<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The file existing, or process activity from, <em>com.apple.avcapture<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The folder <em>\/private\/var\/db\/com.apple.xpc.roleaccountd.staging\/<\/em><em>PlugIns\/fud.appex\/<\/em> existing, or having activity detected from the folder.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"network-indicators\">Network indicators<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Based on the results of our C2 investigation, Microsoft Threat Intelligence associate the following domains with DEV-0196 activity. The dates the domains were first detected as likely in use is given, along with the last seen active date.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Domain<\/strong><\/td><td><strong>First active<\/strong><\/td><td><strong>Last active<\/strong><\/td><\/tr><tr><td>fosterunch[.]com<\/td><td>2022-05-30<\/td><td>CURRENT<\/td><\/tr><tr><td>womnbling[.]com<\/td><td>2022-05-30<\/td><td>CURRENT<\/td><\/tr><tr><td>zebra-arts[.]com<\/td><td>2022-05-31<\/td><td>CURRENT<\/td><\/tr><tr><td>pennywines[.]com<\/td><td>2022-08-19<\/td><td>CURRENT<\/td><\/tr><tr><td>choccoline[.]com<\/td><td>2022-08-19<\/td><td>CURRENT<\/td><\/tr><tr><td>lateparties[.]com<\/td><td>2022-09-15<\/td><td>CURRENT<\/td><\/tr><tr><td>foundurycolletive[.]com<\/td><td>2022-11-07<\/td><td>CURRENT<\/td><\/tr><tr><td>jungelfruitime[.]com<\/td><td>2022-11-09<\/td><td>CURRENT<\/td><\/tr><tr><td>gameboysess[.]com<\/td><td>2022-11-09<\/td><td>CURRENT<\/td><\/tr><tr><td>healthcovid19[.]com<\/td><td>2022-11-10<\/td><td>CURRENT<\/td><\/tr><tr><td>codingstudies[.]com<\/td><td>2022-11-16<\/td><td>CURRENT<\/td><\/tr><tr><td>hoteluxurysm[.]com<\/td><td>2022-11-18<\/td><td>CURRENT<\/td><\/tr><tr><td>newz-globe[.]com<\/td><td>2022-11-23<\/td><td>CURRENT<\/td><\/tr><tr><td>hotalsextra[.]com<\/td><td>2022-11-23<\/td><td>CURRENT<\/td><\/tr><tr><td>nordmanetime[.]com<\/td><td>2022-11-23<\/td><td>CURRENT<\/td><\/tr><tr><td>fullaniimal[.]com<\/td><td>2022-11-23<\/td><td>CURRENT<\/td><\/tr><tr><td>wikipedoptions[.]com<\/td><td>2022-11-23<\/td><td>CURRENT<\/td><\/tr><tr><td>redanddred[.]com<\/td><td>2022-11-23<\/td><td>CURRENT<\/td><\/tr><tr><td>whiteandpiink[.]com<\/td><td>2022-12-02<\/td><td>CURRENT<\/td><\/tr><tr><td>agronomsdoc[.]com<\/td><td>2022-12-02<\/td><td>CURRENT<\/td><\/tr><tr><td>nutureheus[.]com<\/td><td>2022-12-02<\/td><td>CURRENT<\/td><\/tr><tr><td>timeeforsports[.]com<\/td><td>2022-12-15<\/td><td>CURRENT<\/td><\/tr><tr><td>treerroots[.]com<\/td><td>2022-12-15<\/td><td>CURRENT<\/td><\/tr><tr><td>unitedyears[.]com<\/td><td>2022-12-15<\/td><td>CURRENT<\/td><\/tr><tr><td>eccocredit[.]com<\/td><td>2022-12-16<\/td><td>CURRENT<\/td><\/tr><tr><td>ecologitics[.]com<\/td><td>2022-12-19<\/td><td>CURRENT<\/td><\/tr><tr><td>climatestews[.]com<\/td><td>2022-12-19<\/td><td>CURRENT<\/td><\/tr><tr><td>aqualizas[.]com<\/td><td>2022-12-19<\/td><td>CURRENT<\/td><\/tr><tr><td>bgnews-bg[.]com<\/td><td>2022-12-20<\/td><td>CURRENT<\/td><\/tr><tr><td>mikontravels[.]com<\/td><td>2022-12-23<\/td><td>CURRENT<\/td><\/tr><tr><td>e-gaming[.]online<\/td><td>2022-12-23<\/td><td>CURRENT<\/td><\/tr><tr><td>transformaition[.]com<\/td><td>2022-12-23<\/td><td>CURRENT<\/td><\/tr><tr><td>betterstime[.]com<\/td><td>2022-12-23<\/td><td>CURRENT<\/td><\/tr><tr><td>goshopeerz[.]com<\/td><td>2022-12-23<\/td><td>CURRENT<\/td><\/tr><tr><td>countshops[.]com<\/td><td>2022-12-23<\/td><td>CURRENT<\/td><\/tr><tr><td>inneture[.]com<\/td><td>2022-12-23<\/td><td>CURRENT<\/td><\/tr><tr><td>shoppingeos[.]com<\/td><td>2022-12-23<\/td><td>CURRENT<\/td><\/tr><tr><td>mwww[.]ro<\/td><td>2023-01-05<\/td><td>CURRENT<\/td><\/tr><tr><td>rentalproct[.]com<\/td><td>2023-01-05<\/td><td>CURRENT<\/td><\/tr><tr><td>bcarental[.]com<\/td><td>2023-01-05<\/td><td>CURRENT<\/td><\/tr><tr><td>kikocruize[.]com<\/td><td>2023-01-05<\/td><td>CURRENT<\/td><\/tr><tr><td>elvacream[.]com<\/td><td>2023-01-10<\/td><td>CURRENT<\/td><\/tr><tr><td>pachadesert[.]com<\/td><td>2023-01-12<\/td><td>CURRENT<\/td><\/tr><tr><td>razzodev[.]com<\/td><td>2023-02-06<\/td><td>CURRENT<\/td><\/tr><tr><td>wombatcash[.]com<\/td><td>2023-02-06<\/td><td>CURRENT<\/td><\/tr><tr><td>globepayinfo[.]com<\/td><td>2023-02-06<\/td><td>CURRENT<\/td><\/tr><tr><td>job4uhunt[.]com<\/td><td>2023-02-08<\/td><td>CURRENT<\/td><\/tr><tr><td>ctbgameson[.]com<\/td><td>2023-02-08<\/td><td>CURRENT<\/td><\/tr><tr><td>adeptary[.]com<\/td><td>2023-02-08<\/td><td>CURRENT<\/td><\/tr><tr><td>hinterfy[.]com<\/td><td>2023-02-08<\/td><td>CURRENT<\/td><\/tr><tr><td>biznomex[.]com<\/td><td>2023-02-08<\/td><td>CURRENT<\/td><\/tr><tr><td>careerhub4u[.]com<\/td><td>2023-02-08<\/td><td>CURRENT<\/td><\/tr><tr><td>furiamoc[.]com<\/td><td>2023-02-08<\/td><td>CURRENT<\/td><\/tr><tr><td>motorgamings[.]com<\/td><td>2023-02-08<\/td><td>CURRENT<\/td><\/tr><tr><td>aniarchit[.]com<\/td><td>2023-02-08<\/td><td>CURRENT<\/td><\/tr><tr><td>skyphotogreen[.]com<\/td><td>2023-02-26<\/td><td>CURRENT<\/td><\/tr><tr><td>datacentertime[.]com<\/td><td>2023-02-26<\/td><td>CURRENT<\/td><\/tr><tr><td>stylelifees[.]com<\/td><td>2023-02-26<\/td><td>CURRENT<\/td><\/tr><tr><td>kidzlande[.]com<\/td><td>2023-03-01<\/td><td>CURRENT<\/td><\/tr><tr><td>homelosite[.]com<\/td><td>2023-03-01<\/td><td>CURRENT<\/td><\/tr><tr><td>zooloow[.]com<\/td><td>2023-03-01<\/td><td>CURRENT<\/td><\/tr><tr><td>studiesutshifts[.]com<\/td><td>2023-03-01<\/td><td>CURRENT<\/td><\/tr><tr><td>codingstudies[.]com<\/td><td>2023-03-08<\/td><td>CURRENT<\/td><\/tr><tr><td>londonistory[.]com<\/td><td>2023-03-16<\/td><td>CURRENT<\/td><\/tr><tr><td>bestteamlife[.]com<\/td><td>2023-03-16<\/td><td>CURRENT<\/td><\/tr><tr><td>newsandlocalupdates[.]com<\/td><td>2023-03-16<\/td><td>CURRENT<\/td><\/tr><tr><td>youristores[.]com<\/td><td>2023-03-16<\/td><td>CURRENT<\/td><\/tr><tr><td>zooloow[.]com<\/td><td>2023-02-26<\/td><td>2023-03-04<\/td><\/tr><tr><td>kidzlande[.]com<\/td><td>2023-02-26<\/td><td>2023-03-04<\/td><\/tr><tr><td>homelosite[.]com<\/td><td>2023-02-26<\/td><td>2023-03-04<\/td><\/tr><tr><td>studiesutshifts[.]com<\/td><td>2023-02-26<\/td><td>2023-03-04<\/td><\/tr><tr><td>datacentertime[.]com<\/td><td>2022-11-07<\/td><td>2023-02-25<\/td><\/tr><tr><td>homelosite[.]com<\/td><td>2022-11-09<\/td><td>2023-02-25<\/td><\/tr><tr><td>zooloow[.]com<\/td><td>2022-11-10<\/td><td>2023-02-25<\/td><\/tr><tr><td>kidzlande[.]com<\/td><td>2022-11-10<\/td><td>2023-02-25<\/td><\/tr><tr><td>studiesutshifts[.]com<\/td><td>2022-11-10<\/td><td>2023-02-25<\/td><\/tr><tr><td>stylelifees[.]com<\/td><td>2022-11-11<\/td><td>2023-02-25<\/td><\/tr><tr><td>skyphotogreen[.]com<\/td><td>2022-11-11<\/td><td>2023-02-25<\/td><\/tr><tr><td>gardenearthis[.]com<\/td><td>2023-01-11<\/td><td>2023-02-25<\/td><\/tr><tr><td>fullstorelife[.]com<\/td><td>2023-01-11<\/td><td>2023-02-25<\/td><\/tr><tr><td>incollegely[.]org<\/td><td>2022-05-24<\/td><td>2023-01-20<\/td><\/tr><tr><td>shoplifys[.]com<\/td><td>2022-05-26<\/td><td>2023-01-20<\/td><\/tr><tr><td>thetimespress[.]com<\/td><td>2022-06-24<\/td><td>2023-01-20<\/td><\/tr><tr><td>studyshifts[.]com<\/td><td>2022-06-24<\/td><td>2023-01-20<\/td><\/tr><tr><td>codinerom[.]com<\/td><td>2022-07-10<\/td><td>2023-01-20<\/td><\/tr><tr><td>gamingcolonys[.]com<\/td><td>2022-07-17<\/td><td>2023-01-20<\/td><\/tr><tr><td>kidzalnd[.]org<\/td><td>2022-07-17<\/td><td>2023-01-20<\/td><\/tr><tr><td>wildhour[.]store<\/td><td>2022-07-26<\/td><td>2023-01-20<\/td><\/tr><tr><td>wilddog[.]site<\/td><td>2022-07-26<\/td><td>2023-01-20<\/td><\/tr><tr><td>garilc[.]com<\/td><td>2022-07-26<\/td><td>2023-01-20<\/td><\/tr><tr><td>runningandbeyond[.]org<\/td><td>2022-08-04<\/td><td>2023-01-20<\/td><\/tr><tr><td>fullmoongreyparty[.]org<\/td><td>2022-08-04<\/td><td>2023-01-20<\/td><\/tr><tr><td>greenrunners[.]org<\/td><td>2022-08-04<\/td><td>2023-01-20<\/td><\/tr><tr><td>sunsandlights[.]com<\/td><td>2022-08-09<\/td><td>2023-01-20<\/td><\/tr><tr><td>techpowerlight[.]com<\/td><td>2022-08-16<\/td><td>2023-01-20<\/td><\/tr><tr><td>gamezess[.]com<\/td><td>2022-08-29<\/td><td>2023-01-20<\/td><\/tr><tr><td>planningly[.]org<\/td><td>2022-08-29<\/td><td>2023-01-20<\/td><\/tr><tr><td>luxario[.]org<\/td><td>2022-09-03<\/td><td>2023-01-20<\/td><\/tr><tr><td>vinoneros[.]com<\/td><td>2022-09-03<\/td><td>2023-01-20<\/td><\/tr><tr><td>i-reality[.]online<\/td><td>2022-09-07<\/td><td>2023-01-20<\/td><\/tr><tr><td>styleanature[.]com<\/td><td>2022-09-07<\/td><td>2023-01-20<\/td><\/tr><tr><td>planetosgame[.]com<\/td><td>2022-12-12<\/td><td>2023-01-20<\/td><\/tr><tr><td>kidsfunland[.]org<\/td><td>2022-07-29<\/td><td>2023-01-19<\/td><\/tr><tr><td>fullstorelife[.]com<\/td><td>2022-11-11<\/td><td>2023-01-09<\/td><\/tr><tr><td>localtallk[.]store<\/td><td>2022-01-26<\/td><td>2022-12-20<\/td><\/tr><tr><td>allplaces[.]online<\/td><td>2022-01-26<\/td><td>2022-12-20<\/td><\/tr><tr><td>sunclub[.]site<\/td><td>2022-01-26<\/td><td>2022-12-20<\/td><\/tr><tr><td>thenewsfill[.]com<\/td><td>2022-05-26<\/td><td>2022-12-20<\/td><\/tr><tr><td>wellnessjane[.]org<\/td><td>2022-05-26<\/td><td>2022-12-20<\/td><\/tr><tr><td>meehealth[.]org<\/td><td>2022-05-27<\/td><td>2022-12-20<\/td><\/tr><tr><td>gameizes[.]com<\/td><td>2022-07-20<\/td><td>2022-12-20<\/td><\/tr><tr><td>playozas[.]com<\/td><td>2022-07-20<\/td><td>2022-12-20<\/td><\/tr><tr><td>foodyplates[.]com<\/td><td>2022-07-20<\/td><td>2022-12-20<\/td><\/tr><tr><td>designaroo[.]org<\/td><td>2022-08-29<\/td><td>2022-12-20<\/td><\/tr><tr><td>designspacing[.]org<\/td><td>2022-08-29<\/td><td>2022-12-20<\/td><\/tr><tr><td>stockstiming[.]org<\/td><td>2022-09-01<\/td><td>2022-12-20<\/td><\/tr><tr><td>hoteliqo[.]com<\/td><td>2022-09-01<\/td><td>2022-12-20<\/td><\/tr><tr><td>projectoid[.]org<\/td><td>2022-09-01<\/td><td>2022-12-20<\/td><\/tr><tr><td>study-search[.]com<\/td><td>2022-09-01<\/td><td>2022-12-20<\/td><\/tr><tr><td>tokenberries[.]com<\/td><td>2022-09-03<\/td><td>2022-12-20<\/td><\/tr><tr><td>recovery-plan[.]org<\/td><td>2022-09-07<\/td><td>2022-12-20<\/td><\/tr><tr><td>deliverystorz[.]com<\/td><td>2022-09-07<\/td><td>2022-12-20<\/td><\/tr><tr><td>forestaaa[.]com<\/td><td>2022-10-04<\/td><td>2022-12-20<\/td><\/tr><tr><td>addictmetui[.]com<\/td><td>2022-10-20<\/td><td>2022-12-20<\/td><\/tr><tr><td>earthyouwantiis[.]com<\/td><td>2022-10-20<\/td><td>2022-12-20<\/td><\/tr><tr><td>zedforme[.]com<\/td><td>2022-10-20<\/td><td>2022-12-20<\/td><\/tr><tr><td>forestaaa[.]com<\/td><td>2022-10-28<\/td><td>2022-12-20<\/td><\/tr><tr><td>navadatime[.]com<\/td><td>2022-11-10<\/td><td>2022-12-15<\/td><\/tr><tr><td>careers4ad[.]com<\/td><td>2022-11-13<\/td><td>2022-12-15<\/td><\/tr><tr><td>gardenearthis[.]com<\/td><td>2022-11-07<\/td><td>2022-12-14<\/td><\/tr><tr><td>studyreaserch[.]com<\/td><td>2022-11-09<\/td><td>2022-12-14<\/td><\/tr><tr><td>novinite[.]biz<\/td><td>2022-08-31<\/td><td>2022-12-10<\/td><\/tr><tr><td>agronomsdoc[.]com<\/td><td>2022-11-16<\/td><td>2022-11-28<\/td><\/tr><tr><td>whiteandpiink[.]com<\/td><td>2022-11-16<\/td><td>2022-11-28<\/td><\/tr><tr><td>nutureheus[.]com<\/td><td>2022-11-18<\/td><td>2022-11-28<\/td><\/tr><tr><td>dressuse[.]com<\/td><td>2022-09-18<\/td><td>2022-11-20<\/td><\/tr><tr><td>iwoodstor[.]xyz<\/td><td>2022-09-18<\/td><td>2022-11-20<\/td><\/tr><tr><td>teachlearning[.]org<\/td><td>2022-09-18<\/td><td>2022-11-20<\/td><\/tr><tr><td>subcloud[.]online<\/td><td>2022-09-21<\/td><td>2022-11-20<\/td><\/tr><tr><td>monvesting[.]com<\/td><td>2022-09-21<\/td><td>2022-11-20<\/td><\/tr><tr><td>elektrozi[.]com<\/td><td>2022-09-21<\/td><td>2022-11-20<\/td><\/tr><tr><td>hoteluxurysm[.]com<\/td><td>2022-11-09<\/td><td>2022-11-14<\/td><\/tr><tr><td>hopsite[.]online<\/td><td>2022-11-13<\/td><td>2022-11-14<\/td><\/tr><tr><td>bikersrental[.]com<\/td><td>2022-05-24<\/td><td>2022-11-13<\/td><\/tr><tr><td>takestox[.]com<\/td><td>2022-05-24<\/td><td>2022-11-13<\/td><\/tr><tr><td>sidelot[.]org<\/td><td>2022-05-24<\/td><td>2022-11-13<\/td><\/tr><tr><td>powercodings[.]com<\/td><td>2022-08-21<\/td><td>2022-11-13<\/td><\/tr><tr><td>naturemeter[.]org<\/td><td>2022-08-21<\/td><td>2022-11-13<\/td><\/tr><tr><td>takebreak[.]io<\/td><td>2022-10-12<\/td><td>2022-11-13<\/td><\/tr><tr><td>fullstorelife[.]com<\/td><td>2022-11-07<\/td><td>2022-11-10<\/td><\/tr><tr><td>noraplant[.]com<\/td><td>2022-11-09<\/td><td>2022-11-09<\/td><\/tr><tr><td>forestaaa[.]com<\/td><td>2022-10-04<\/td><td>2022-11-07<\/td><\/tr><tr><td>goodsforuw[.]com<\/td><td>2022-10-26<\/td><td>2022-11-07<\/td><\/tr><tr><td>stayle[.]co<\/td><td>2022-10-26<\/td><td>2022-11-07<\/td><\/tr><tr><td>eedloversra[.]online<\/td><td>2022-10-28<\/td><td>2022-11-07<\/td><\/tr><tr><td>sevensdfe[.]com<\/td><td>2022-11-03<\/td><td>2022-11-07<\/td><\/tr><tr><td>dsudro[.]com<\/td><td>2022-11-03<\/td><td>2022-11-07<\/td><\/tr><tr><td>gameboysess[.]com<\/td><td>2022-11-07<\/td><td>2022-11-07<\/td><\/tr><tr><td>sseamb[.]com<\/td><td>2022-10-26<\/td><td>2022-11-06<\/td><\/tr><tr><td>healthcovid19[.]com<\/td><td>2022-11-04<\/td><td>2022-11-06<\/td><\/tr><tr><td>noraplant[.]com<\/td><td>2022-11-04<\/td><td>2022-11-06<\/td><\/tr><tr><td>fullstorelife[.]com<\/td><td>2022-11-04<\/td><td>2022-11-06<\/td><\/tr><tr><td>datacentertime[.]com<\/td><td>2022-11-04<\/td><td>2022-11-05<\/td><\/tr><tr><td>recover-your-body[.]xyz<\/td><td>2022-01-06<\/td><td>2022-11-02<\/td><\/tr><tr><td>reloadyourbrowser[.]info<\/td><td>2022-07-05<\/td><td>2022-11-02<\/td><\/tr><tr><td>comeandpet[.]me<\/td><td>2022-07-05<\/td><td>2022-11-02<\/td><\/tr><tr><td>brushyourteeth[.]online<\/td><td>2022-07-05<\/td><td>2022-11-02<\/td><\/tr><tr><td>digital-mar[.]com<\/td><td>2022-08-10<\/td><td>2022-11-02<\/td><\/tr><tr><td>retailmark[.]net<\/td><td>2022-08-16<\/td><td>2022-11-02<\/td><\/tr><tr><td>dsudro[.]com<\/td><td>2022-10-04<\/td><td>2022-11-02<\/td><\/tr><tr><td>studysliii[.]com<\/td><td>2022-10-26<\/td><td>2022-11-02<\/td><\/tr><tr><td>homeigardens[.]com<\/td><td>2022-09-07<\/td><td>2022-10-29<\/td><\/tr><tr><td>stayle[.]co<\/td><td>2022-10-20<\/td><td>2022-10-24<\/td><\/tr><tr><td>studysliii[.]com<\/td><td>2022-10-20<\/td><td>2022-10-24<\/td><\/tr><tr><td>goodsforuw[.]com<\/td><td>2022-10-20<\/td><td>2022-10-24<\/td><\/tr><tr><td>dsudro[.]com<\/td><td>2022-10-20<\/td><td>2022-10-24<\/td><\/tr><tr><td>sseamb[.]com<\/td><td>2022-10-20<\/td><td>2022-10-24<\/td><\/tr><tr><td>sevensdfe[.]com<\/td><td>2022-10-20<\/td><td>2022-10-24<\/td><\/tr><tr><td>koraliowe[.]com<\/td><td>2022-04-05<\/td><td>2022-10-13<\/td><\/tr><tr><td>topuprr[.]com<\/td><td>2022-04-05<\/td><td>2022-10-13<\/td><\/tr><tr><td>zeebefg[.]com<\/td><td>2022-04-05<\/td><td>2022-10-12<\/td><\/tr><tr><td>takebreak[.]io<\/td><td>2022-06-21<\/td><td>2022-10-11<\/td><\/tr><tr><td>forestaaa[.]com<\/td><td>2022-10-03<\/td><td>2022-10-03<\/td><\/tr><tr><td>teachlearning[.]org<\/td><td>2022-09-18<\/td><td>2022-09-18<\/td><\/tr><tr><td>newsbuiltin[.]online<\/td><td>2022-09-15<\/td><td>2022-09-17<\/td><\/tr><tr><td>jyfa[.]xyz<\/td><td>2022-09-15<\/td><td>2022-09-17<\/td><\/tr><tr><td>monvesting[.]com<\/td><td>2022-07-19<\/td><td>2022-09-15<\/td><\/tr><tr><td>teachlearning[.]org<\/td><td>2022-07-19<\/td><td>2022-09-15<\/td><\/tr><tr><td>elektrozi[.]com<\/td><td>2022-07-20<\/td><td>2022-09-15<\/td><\/tr><tr><td>thepila[.]com<\/td><td>2022-09-15<\/td><td>2022-09-15<\/td><\/tr><tr><td>thegreenlight[.]xyz<\/td><td>2022-01-11<\/td><td>2022-09-14<\/td><\/tr><tr><td>gosport24[.]com<\/td><td>2022-01-11<\/td><td>2022-09-14<\/td><\/tr><tr><td>classiccolor[.]live<\/td><td>2022-01-11<\/td><td>2022-09-11<\/td><\/tr><tr><td>shoeszise[.]xyz<\/td><td>2022-02-24<\/td><td>2022-09-11<\/td><\/tr><tr><td>cleanitgo[.]info<\/td><td>2022-02-24<\/td><td>2022-09-11<\/td><\/tr><tr><td>setclass[.]live<\/td><td>2022-02-24<\/td><td>2022-09-11<\/td><\/tr><tr><td>white-rhino[.]online<\/td><td>2022-04-14<\/td><td>2022-09-11<\/td><\/tr><tr><td>space-moon[.]com<\/td><td>2022-04-14<\/td><td>2022-09-11<\/td><\/tr><tr><td>enrollering[.]com<\/td><td>2022-05-24<\/td><td>2022-09-11<\/td><\/tr><tr><td>newslocalupdates[.]com<\/td><td>2022-08-19<\/td><td>2022-09-11<\/td><\/tr><tr><td>newsbuiltin[.]online<\/td><td>2022-09-11<\/td><td>2022-09-11<\/td><\/tr><tr><td>beendos[.]com<\/td><td>2022-04-14<\/td><td>2022-09-10<\/td><\/tr><tr><td>linestrip[.]online<\/td><td>2022-07-01<\/td><td>2022-09-07<\/td><\/tr><tr><td>sunnyweek[.]site<\/td><td>2022-07-01<\/td><td>2022-09-07<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft analyzes a threat group tracked as DEV-0196, the actor\u2019s iOS malware \u201cKingsPawn\u201d, and their link to an Israel-based private sector offensive actor (PSOA) known as QuaDream, which reportedly sells a suite of exploits, malware, and infrastructure called REIGN, that\u2019s designed to exfiltrate data from mobile devices.<\/p>\n","protected":false},"author":153,"featured_media":127182,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3906,3800,3927],"threat-intelligence":[3738],"content-type":[3663],"job-role":[],"product":[3690,3692,3696,3693],"topic":[3687],"coauthors":[3380],"class_list":["post-127142","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-non-governmental-organizations","tag-private-sector-offensive-actor","tag-tsunami","threat-intelligence-threat-actors","content-type-research","product-microsoft-defender","product-microsoft-defender-for-cloud-apps","product-microsoft-defender-for-identity","product-microsoft-defender-xdr","topic-threat-intelligence","review-flag-1694638265-576","review-flag-new-1694638263-340"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DEV-0196: QuaDream\u2019s \u201cKingsPawn\u201d malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Microsoft assess that the threat group Storm-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DEV-0196: QuaDream\u2019s \u201cKingsPawn\u201d malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Microsoft assess that the threat group Storm-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-11T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-18T14:33:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Microsoft Threat Intelligence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Threat Intelligence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Threat Intelligence\"}],\"headline\":\"DEV-0196: QuaDream\u2019s \u201cKingsPawn\u201d malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia\",\"datePublished\":\"2023-04-11T16:00:00+00:00\",\"dateModified\":\"2025-06-18T14:33:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/\"},\"wordCount\":3582,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1.jpg\",\"keywords\":[\"Non-governmental organizations (NGOs)\",\"Private sector offensive actor\",\"Tsunami\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/\",\"name\":\"DEV-0196: QuaDream\u2019s \u201cKingsPawn\u201d malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1.jpg\",\"datePublished\":\"2023-04-11T16:00:00+00:00\",\"dateModified\":\"2025-06-18T14:33:59+00:00\",\"description\":\"Microsoft assess that the threat group Storm-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1.jpg\",\"width\":1200,\"height\":800,\"caption\":\"a person sitting on the seat of a car\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DEV-0196: QuaDream\u2019s \u201cKingsPawn\u201d malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/fa785acae88a9b0cfe278a692ce196f5\",\"name\":\"Microsoft Security Threat Intelligence\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g430eaf64ccad6ceda364c6ea504461c5\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g\",\"caption\":\"Microsoft Security Threat Intelligence\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-katiemc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DEV-0196: QuaDream\u2019s \u201cKingsPawn\u201d malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia | Microsoft Security Blog","description":"Microsoft assess that the threat group Storm-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/","og_locale":"en_US","og_type":"article","og_title":"DEV-0196: QuaDream\u2019s \u201cKingsPawn\u201d malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia | Microsoft Security Blog","og_description":"Microsoft assess that the threat group Storm-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/","og_site_name":"Microsoft Security Blog","article_published_time":"2023-04-11T16:00:00+00:00","article_modified_time":"2025-06-18T14:33:59+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1.jpg","type":"image\/jpeg"}],"author":"Microsoft Threat Intelligence","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Threat Intelligence","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/","@type":"Person","@name":"Microsoft Threat Intelligence"}],"headline":"DEV-0196: QuaDream\u2019s \u201cKingsPawn\u201d malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia","datePublished":"2023-04-11T16:00:00+00:00","dateModified":"2025-06-18T14:33:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/"},"wordCount":3582,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1.jpg","keywords":["Non-governmental organizations (NGOs)","Private sector offensive actor","Tsunami"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/","name":"DEV-0196: QuaDream\u2019s \u201cKingsPawn\u201d malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1.jpg","datePublished":"2023-04-11T16:00:00+00:00","dateModified":"2025-06-18T14:33:59+00:00","description":"Microsoft assess that the threat group Storm-0196 is linked to an Israel-based private sector offensive actor (PSOA) known as QuaDream","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/Quadream-featured-image-1.jpg","width":1200,"height":800,"caption":"a person sitting on the seat of a car"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/11\/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"DEV-0196: QuaDream\u2019s \u201cKingsPawn\u201d malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/fa785acae88a9b0cfe278a692ce196f5","name":"Microsoft Security Threat Intelligence","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g430eaf64ccad6ceda364c6ea504461c5","url":"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6da614d6e26efc7ec75a4b5a98d63c541af444fa76a10c41a66be5b3de0a63aa?s=96&d=microsoft&r=g","caption":"Microsoft Security Threat Intelligence"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-katiemc\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/127142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=127142"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/127142\/revisions"}],"predecessor-version":[{"id":139545,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/127142\/revisions\/139545"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/127182"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=127142"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=127142"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=127142"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=127142"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=127142"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=127142"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=127142"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=127142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}