{"id":5176,"date":"2020-05-04T09:47:36","date_gmt":"2020-05-04T16:47:36","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5176"},"modified":"2024-08-07T12:24:41","modified_gmt":"2024-08-07T19:24:41","slug":"star-wars-day-2020-the-galaxys-most-wanted-cybercriminals","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/","title":{"rendered":"Star Wars Day 2020 \u2013 The Galaxy\u2019s Most Wanted Cybercriminals"},"content":{"rendered":"<p>The Star Wars Galaxy is full of cybercriminals that carry out data exfiltration, shadow IoT and Trojan attacks to take advantage of the Empire\u2019s pitiful cybersecurity strategy. These are just some of the attacks and the important cybersecurity lessons that are still strong with the enterprise Force today.<\/p>\n<h3><strong>The Millennium Falcon Crew \u2013 Trojan Attack<\/strong><\/h3>\n<p>The Millennium Falcon has played a role in some of the greatest victories of the Rebel Alliance and the New Republic. The ship and its crew carry out a textbook Trojan attack when they are caught in the Death Star\u2019s tractor beam after discovering that the planet Alderaan has been destroyed. The Death Star locks in on the Millennium Falcon and pulls it into bay 327, thus allowing the Trojan horse inside the ship.<\/p>\n<p>Although the Empire is initially cautious of what it has just beamed into the battle station \u2013 equivalent to downloading a corrupted link \u2013 the check performed fails to spot the hidden crew, causing unknown contamination. By the time Darth Vader finally spots the malicious attack and kills Obi-Wan, it\u2019s too late. The tractor beam is disabled, the Millennium Falcon escapes with the Death Star blueprint and\u2026\u201dGreat shot, kid! That was one in a million!\u201d<\/p>\n<h3><strong>Mon Mothma &#8211; Data Exfiltration Attack on Branch Locations<\/strong><\/h3>\n<p>A leader of the Galactic Senate&#8217;s Loyalist faction, Mon Mothma opposed Supreme Chancellor Palpatine&#8217;s policies during the final days of the Republic. Working in secret, she helped found the Rebel Alliance, and served as its civilian leader during the long struggle against the Empire.<\/p>\n<p>\u201cThe Empire has made a critical error, and the time for our attack has come\u201d, Mon Mothma announces to the Rebel Fleet.<\/p>\n<p>The Rebel Plot on Endor is a breach on critical infrastructure at an Empire branch location. Over on the Rebel Fleet, Mon Mothma tells the Rebels about the construction and exact location of a second Death Star battle station. It\u2019s protected by an energy shield generated by a remote imperial branch office on the forest moon of Endor. The rebels discovered that the branch office was relatively unprotected and launched an infiltration attempt.<\/p>\n<p>In order to take out this second Death Star, the Rebels must send a small team to deactivate the shield by physically infiltrating the Empire\u2019s defenses and taking out the main reactor in order to destroy the battle station entirely. They use a stolen Imperial shuttle, disguise it as a cargo ship and, with exfiltrated \u201csecret imperial codes,\u201d the strike team lands on the moon and deactivates the shield generator from within the Empire\u2019s own network. Rebels breach the branch office of the Death Star in order to take down the Death Star\u2019s shield. The Rebels take down the new battle station successfully. BOOM.<\/p>\n<h3><strong>R2D2 \u2013 Shadow IoT Attacks<\/strong><\/h3>\n<p>R2-D2 is a heroic, intelligent and spunky droid that serves many masters throughout his lifetime. He\u2019s also a Shadow IoT Device that Exploits Critical Infrastructure Flaws of the Death Star. He Joins the Empire\u2019s main Wi-Fi networks multiple times without IT\u2019s knowledge. Not only is he able to plug himself into the battle station\u2019s central computer and remain undetected, he is able to locate and exfiltrate specific information with little effort. He steals the list and exact location of prisoners he and the Rebels intend to rescue, specifically Princess Leia. Later on, when the heroes are trapped in the trash compactor, R2-D2 is once again able to effortlessly locate the data and controls he needs to disrupt the compactor and free his allies. There is nothing by way of security on the Imperial networks to stop him in his tracks.<\/p>\n<p>The Empire should have an extra security system, one that is much more robust by design. Rethinking the approach to network security to include robust security policies for personal devices, ensure full visibility over the network, and use intelligent systems to detect and halt anomalous and potentially malicious communications will ensure organizations are always one step ahead of the threat posed by Shadow IoT devices.<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>These are just some of the vulnerabilities within the Empire\u2019s network that the Rebels exploit. To better protect against Trojan attacks, incoming communications should be limited and controlled by more stringent security policies. In order to better stop data exfiltration threats, the Empire should ensure that all employees attend cybersecurity trainings and that a foundational solution is in place that protects against the widest range of attacks, particularly at the DNS level. To improve network visibility and prevent outside devices from accessing systems, data and select process controllers, Imperial network managers should implement more robust and intelligent systems and multifactor authentication solutions. May the fourth be with you!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Star Wars Galaxy is full of cybercriminals that carry out data exfiltration, shadow IoT and Trojan attacks to take advantage of the Empire\u2019s pitiful cybersecurity strategy. These are just some of the attacks and the important cybersecurity lessons that are still strong with the enterprise Force today. The Millennium Falcon Crew \u2013 Trojan Attack [&hellip;]<\/p>\n","protected":false},"author":260,"featured_media":5175,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[271,106,270,269,268,272,273,265,266,274,260,189],"class_list":{"0":"post-5176","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-branch-locations","9":"tag-data-exfiltration","10":"tag-may-the-4th","11":"tag-may-the-fourth","12":"tag-may-the-fourth-be-with-you","13":"tag-shadow-iot","14":"tag-shadow-iot-attack","15":"tag-star-wars","16":"tag-star-wars-day","17":"tag-star-wars-day-2020","18":"tag-trojan","19":"tag-cybersecurity","20":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Star Wars Day 2020 \u2013 The Galaxy\u2019s Most Wanted Cybercriminals<\/title>\n<meta name=\"description\" content=\"The Star Wars Galaxy is full of cybercriminals that carry out data exfiltration, shadow IoT and Trojan attacks to take advantage of the Empire\u2019s pitiful cybersecurity strategy. These are just some of the attacks and the important cybersecurity lessons that are still strong with the enterprise Force today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Star Wars Day 2020 \u2013 The Galaxy\u2019s Most Wanted Cybercriminals\" \/>\n<meta property=\"og:description\" content=\"The Star Wars Galaxy is full of cybercriminals that carry out data exfiltration, shadow IoT and Trojan attacks to take advantage of the Empire\u2019s pitiful cybersecurity strategy. These are just some of the attacks and the important cybersecurity lessons that are still strong with the enterprise Force today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-04T16:47:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T19:24:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Screen-Shot-2020-05-04-at-9.27.52-AM-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sif Baksh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sif Baksh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/\"},\"author\":{\"name\":\"Sif Baksh\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d78ba19c60e3345e0b057ecb0f990108\"},\"headline\":\"Star Wars Day 2020 \u2013 The Galaxy\u2019s Most Wanted Cybercriminals\",\"datePublished\":\"2020-05-04T16:47:36+00:00\",\"dateModified\":\"2024-08-07T19:24:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/\"},\"wordCount\":797,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Screen-Shot-2020-05-04-at-9.27.52-AM.png\",\"keywords\":[\"Branch Locations\",\"Data Exfiltration\",\"May The 4th\",\"May The Fourth\",\"May The Fourth Be With You\",\"Shadow IoT\",\"Shadow IoT Attack\",\"Star Wars\",\"Star Wars Day\",\"Star Wars Day 2020\",\"Trojan\",\"Cybersecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/\",\"name\":\"Star Wars Day 2020 \u2013 The Galaxy\u2019s Most Wanted Cybercriminals\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Screen-Shot-2020-05-04-at-9.27.52-AM.png\",\"datePublished\":\"2020-05-04T16:47:36+00:00\",\"dateModified\":\"2024-08-07T19:24:41+00:00\",\"description\":\"The Star Wars Galaxy is full of cybercriminals that carry out data exfiltration, shadow IoT and Trojan attacks to take advantage of the Empire\u2019s pitiful cybersecurity strategy. These are just some of the attacks and the important cybersecurity lessons that are still strong with the enterprise Force today.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Screen-Shot-2020-05-04-at-9.27.52-AM.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Screen-Shot-2020-05-04-at-9.27.52-AM.png\",\"width\":1684,\"height\":948,\"caption\":\"Star Wars Day 2020\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Star Wars Day 2020 \u2013 The Galaxy\u2019s Most Wanted Cybercriminals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d78ba19c60e3345e0b057ecb0f990108\",\"name\":\"Sif Baksh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_260_1582930725-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_260_1582930725-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_260_1582930725-96x96.jpg\",\"caption\":\"Sif Baksh\"},\"description\":\"Sif is a Principal Sales Engineer at Infoblox where he provides technical expertise regarding Infoblox solutions with a focus on Network Automation and Cybersecurity. He has been with Infoblox for over 7 years, starting in the Professional Services org where he performed NetMRI deployments at many of the largest companies in the world. Outside of work, Sif can be found at the local hackerspace where he volunteers as a leading cybersecurity educator. Online he can be found @sifbaksh running the regex daily channel.\",\"sameAs\":[\"https:\\\/\\\/sifbaksh.com\\\/\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/sif-baksh\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Star Wars Day 2020 \u2013 The Galaxy\u2019s Most Wanted Cybercriminals","description":"The Star Wars Galaxy is full of cybercriminals that carry out data exfiltration, shadow IoT and Trojan attacks to take advantage of the Empire\u2019s pitiful cybersecurity strategy. These are just some of the attacks and the important cybersecurity lessons that are still strong with the enterprise Force today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/","og_locale":"en_US","og_type":"article","og_title":"Star Wars Day 2020 \u2013 The Galaxy\u2019s Most Wanted Cybercriminals","og_description":"The Star Wars Galaxy is full of cybercriminals that carry out data exfiltration, shadow IoT and Trojan attacks to take advantage of the Empire\u2019s pitiful cybersecurity strategy. These are just some of the attacks and the important cybersecurity lessons that are still strong with the enterprise Force today.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/","og_site_name":"Infoblox Blog","article_published_time":"2020-05-04T16:47:36+00:00","article_modified_time":"2024-08-07T19:24:41+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Screen-Shot-2020-05-04-at-9.27.52-AM-1024x576.png","type":"image\/png"}],"author":"Sif Baksh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sif Baksh","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/"},"author":{"name":"Sif Baksh","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d78ba19c60e3345e0b057ecb0f990108"},"headline":"Star Wars Day 2020 \u2013 The Galaxy\u2019s Most Wanted Cybercriminals","datePublished":"2020-05-04T16:47:36+00:00","dateModified":"2024-08-07T19:24:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/"},"wordCount":797,"commentCount":0,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Screen-Shot-2020-05-04-at-9.27.52-AM.png","keywords":["Branch Locations","Data Exfiltration","May The 4th","May The Fourth","May The Fourth Be With You","Shadow IoT","Shadow IoT Attack","Star Wars","Star Wars Day","Star Wars Day 2020","Trojan","Cybersecurity"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/","url":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/","name":"Star Wars Day 2020 \u2013 The Galaxy\u2019s Most Wanted Cybercriminals","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Screen-Shot-2020-05-04-at-9.27.52-AM.png","datePublished":"2020-05-04T16:47:36+00:00","dateModified":"2024-08-07T19:24:41+00:00","description":"The Star Wars Galaxy is full of cybercriminals that carry out data exfiltration, shadow IoT and Trojan attacks to take advantage of the Empire\u2019s pitiful cybersecurity strategy. These are just some of the attacks and the important cybersecurity lessons that are still strong with the enterprise Force today.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Screen-Shot-2020-05-04-at-9.27.52-AM.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Screen-Shot-2020-05-04-at-9.27.52-AM.png","width":1684,"height":948,"caption":"Star Wars Day 2020"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/star-wars-day-2020-the-galaxys-most-wanted-cybercriminals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Star Wars Day 2020 \u2013 The Galaxy\u2019s Most Wanted Cybercriminals"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d78ba19c60e3345e0b057ecb0f990108","name":"Sif Baksh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_260_1582930725-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_260_1582930725-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_260_1582930725-96x96.jpg","caption":"Sif Baksh"},"description":"Sif is a Principal Sales Engineer at Infoblox where he provides technical expertise regarding Infoblox solutions with a focus on Network Automation and Cybersecurity. He has been with Infoblox for over 7 years, starting in the Professional Services org where he performed NetMRI deployments at many of the largest companies in the world. Outside of work, Sif can be found at the local hackerspace where he volunteers as a leading cybersecurity educator. Online he can be found @sifbaksh running the regex daily channel.","sameAs":["https:\/\/sifbaksh.com\/"],"url":"https:\/\/www.infoblox.com\/blog\/author\/sif-baksh\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/260"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5176"}],"version-history":[{"count":8,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5176\/revisions"}],"predecessor-version":[{"id":5199,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5176\/revisions\/5199"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/5175"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}