{"content_customizations":null,"shortcut_customizations":[{"id":5660,"created_at":"2023-04-04T09:01:50.988930Z","updated_at":"2023-04-04T09:01:51.002158Z","action":"DOWNLOAD","color":"#FFFFFF","icon_url":"https://app-media-production.s3.amazonaws.com/client_docs/client_documents/272/shortcut_customizations/d94cfb99a4804f92a0e8a9329fdb9f06/download_icon.svg","additional_data":{"download_url":"https://media.celero.io/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4/original_file.pdf"},"content":6364}],"content_thumbnail":{"original":"/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4/thumbnails/1.jpg","high_quality":{"small":"/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4/thumbnails_high_quality/1.jpg","medium":"/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4/thumbnails_high_quality/1_medium.jpg","large":"/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4/thumbnails_high_quality/1_large.jpg","microsite_preview":"/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4/thumbnails_high_quality/preview.jpg"}},"version":{"version_number":1,"version_details":{"uuid":"fd4d2baa-de3a-4257-8f81-bee2efd4e961","name":"Luminar_Annual Threat_Landscape_RP","is_live":true,"access_control":{"min_stage":"EVERYONE_ALLOWED","stage_options":{"UNVERIFIED_CONTACT":{"form_preview":"LANDING_PAGE","form_id":"default"},"VERIFIED_CONTACT":{"form_preview":"LANDING_PAGE"},"GDPR_CONSENT":{},"PRIVATE":{},"EVERYONE_ALLOWED":{}}},"base_shorten":"536c631e","tags":[]},"is_active":true,"type":"DESKTOP","version":"fd4d2baa-de3a-4257-8f81-bee2efd4e961","content_uuid":"fd4d2baa-de3a-4257-8f81-bee2efd4e961","version_id":"fd4d2baa-de3a-4257-8f81-bee2efd4e961"},"custom_events":[],"content_action":null,"content_stats":null,"content_meta_tags":{"url_title":"luminar-annual-threat-landscape-report-2023","title":"Annual Threat Landscape Report 2023","description":"The Shift from Traditional Underground Cybercrime Platforms to Telegram","og_enabled":true,"seo_enabled":false,"version":"fd4d2baa-de3a-4257-8f81-bee2efd4e961"},"keywords":[],"seo_content_version_name":"luminar-annual-threat-landscape-rp","html_snippets":null,"is_live":true,"shorten":"https://engage.cognyte.com/s/536c631e/","base_url":"/users/272/content/f5cd0b51d5134913ab2c4984b5d182c6/_r8pqSE4","config":{"pagecount":35,"bounds":[[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286]]},"annotations":{"pages":[{"page":33,"annotations":[{"type":"Link","bounds":[90,339,49,22],"objref":"252","action":{"type":"URI","uri":"https://www.cisecurity.org/cybersecurity-threats/alert-level/"}}]},{"page":2,"annotations":[{"type":"Link","bounds":[81,350,524,26],"objref":"28","action":{"type":"GoTo","page":4,"zoom":"XYZ 79 1028 0"}},{"type":"Link","bounds":[92,376,514,23],"objref":"33","action":{"type":"GoTo","page":4,"zoom":"XYZ 79 733 0"}},{"type":"Link","bounds":[81,399,524,25],"objref":"34","action":{"type":"GoTo","page":6,"zoom":"XYZ 79 1028 0"}},{"type":"Link","bounds":[92,423,514,25],"objref":"37","action":{"type":"GoTo","page":6,"zoom":"XYZ 79 650 0"}},{"type":"Link","bounds":[92,448,514,23],"objref":"38","action":{"type":"GoTo","page":7,"zoom":"XYZ 79 548 0"}},{"type":"Link","bounds":[92,471,514,23],"objref":"40","action":{"type":"GoTo","page":8,"zoom":"XYZ 79 557 0"}},{"type":"Link","bounds":[81,494,524,26],"objref":"42","action":{"type":"GoTo","page":11,"zoom":"XYZ 79 1028 0"}},{"type":"Link","bounds":[92,520,514,23],"objref":"46","action":{"type":"GoTo","page":11,"zoom":"XYZ 79 985 0"}},{"type":"Link","bounds":[92,543,514,23],"objref":"47","action":{"type":"GoTo","page":13,"zoom":"XYZ 79 1028 0"}},{"type":"Link","bounds":[101,565,503,25],"objref":"50","action":{"type":"GoTo","page":13,"zoom":"XYZ 79 935 0"}},{"type":"Link","bounds":[101,590,503,25],"objref":"51","action":{"type":"GoTo","page":14,"zoom":"XYZ 79 1028 0"}},{"type":"Link","bounds":[101,614,503,26],"objref":"53","action":{"type":"GoTo","page":14,"zoom":"XYZ 79 753 0"}},{"type":"Link","bounds":[101,640,503,25],"objref":"59","action":{"type":"GoTo","page":15,"zoom":"XYZ 79 1028 0"}},{"type":"Link","bounds":[101,665,503,25],"objref":"61","action":{"type":"GoTo","page":15,"zoom":"XYZ 79 634 0"}},{"type":"Link","bounds":[81,689,524,25],"objref":"62","action":{"type":"GoTo","page":17,"zoom":"XYZ 79 1028 0"}},{"type":"Link","bounds":[92,714,514,25],"objref":"65","action":{"type":"GoTo","page":17,"zoom":"XYZ 79 985 0"}},{"type":"Link","bounds":[101,738,503,25],"objref":"66","action":{"type":"GoTo","page":17,"zoom":"XYZ 79 779 0"}},{"type":"Link","bounds":[101,763,503,25],"objref":"67","action":{"type":"GoTo","page":18,"zoom":"XYZ 79 1028 0"}},{"type":"Link","bounds":[101,787,503,25],"objref":"69","action":{"type":"GoTo","page":19,"zoom":"XYZ 79 800 0"}},{"type":"Link","bounds":[92,811,514,23],"objref":"71","action":{"type":"GoTo","page":19,"zoom":"XYZ 79 519 0"}},{"type":"Link","bounds":[101,834,503,26],"objref":"72","action":{"type":"GoTo","page":20,"zoom":"XYZ 79 672 0"}},{"type":"Link","bounds":[101,860,503,25],"objref":"74","action":{"type":"GoTo","page":21,"zoom":"XYZ 79 757 0"}},{"type":"Link","bounds":[101,885,503,25],"objref":"76","action":{"type":"GoTo","page":22,"zoom":"XYZ 79 1028 0"}},{"type":"Link","bounds":[81,909,524,25],"objref":"78","action":{"type":"GoTo","page":23,"zoom":"XYZ 79 1028 0"}},{"type":"Link","bounds":[81,934,524,26],"objref":"80","action":{"type":"GoTo","page":29,"zoom":"XYZ 79 1028 0"}}]},{"page":3,"annotations":[{"type":"Link","bounds":[92,290,514,25],"objref":"88","action":{"type":"GoTo","page":29,"zoom":"XYZ 79 985 0"}},{"type":"Link","bounds":[92,315,514,23],"objref":"89","action":{"type":"GoTo","page":29,"zoom":"XYZ 79 575 0"}},{"type":"Link","bounds":[81,338,524,25],"objref":"90","action":{"type":"GoTo","page":32,"zoom":"XYZ 79 1028 0"}},{"type":"Link","bounds":[81,362,524,26],"objref":"94","action":{"type":"GoTo","page":33,"zoom":"XYZ 79 1028 0"}}]},{"page":6,"annotations":[{"type":"TextLink","bounds":[89,900,364,11],"action":{"type":"URI","uri":"https://www.zerofox.com/blog/blog-dark-web-forums-are-they-here-to-stay/"}},{"type":"TextLink","bounds":[89,924,300,11],"action":{"type":"URI","uri":"https://www.kaspersky.com/resource-center/threats/deep-web"}},{"type":"TextLink","bounds":[89,949,394,11],"action":{"type":"URI","uri":"https://www.cybereason.com/blog/what-is-the-dark-web-ransomware-marketplace"}},{"type":"Link","bounds":[87,900,370,25],"objref":"113","action":{"type":"URI","uri":"https://www.zerofox.com/blog/blog-dark-web-forums-are-they-here-to-stay/"}},{"type":"Link","bounds":[87,924,307,25],"objref":"114","action":{"type":"URI","uri":"https://www.kaspersky.com/resource-center/threats/deep-web"}},{"type":"Link","bounds":[87,949,400,25],"objref":"115","action":{"type":"URI","uri":"https://www.cybereason.com/blog/what-is-the-dark-web-ransomware-marketplace"}}]},{"page":7,"annotations":[{"type":"TextLink","bounds":[89,949,362,11],"action":{"type":"URI","uri":"https://intel471.com/blog/how-threat-actors-use-underground-marketplaces"}},{"type":"Link","bounds":[87,949,368,25],"objref":"119","action":{"type":"URI","uri":"https://intel471.com/blog/how-threat-actors-use-underground-marketplaces"}}]},{"page":8,"annotations":[{"type":"TextLink","bounds":[89,949,480,11],"action":{"type":"URI","uri":"https://www.paloaltonetworks.com/blog/2022/03/ransomware-trends-demands-dark-web-leak-sites/"}},{"type":"Link","bounds":[87,949,486,25],"objref":"122","action":{"type":"URI","uri":"https://www.paloaltonetworks.com/blog/2022/03/ransomware-trends-demands-dark-web-leak-sites/"}}]},{"page":9,"annotations":[{"type":"TextLink","bounds":[89,854,492,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/ransomware-gang-now-lets-you-search-their-stolen-data/"}},{"type":"TextLink","bounds":[83,869,23,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/ransomware-gang-now-lets-you-search-their-stolen-data/"}},{"type":"TextLink","bounds":[89,894,512,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/"}},{"type":"TextLink","bounds":[83,909,43,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/"}},{"type":"TextLink","bounds":[89,934,506,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/"}},{"type":"TextLink","bounds":[83,949,74,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/"}},{"type":"Link","bounds":[87,854,518,15],"objref":"125","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/ransomware-gang-now-lets-you-search-their-stolen-data/"}},{"type":"Link","bounds":[81,869,31,25],"objref":"126","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/ransomware-gang-now-lets-you-search-their-stolen-data/"}},{"type":"Link","bounds":[87,894,518,15],"objref":"127","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/"}},{"type":"Link","bounds":[81,909,49,25],"objref":"128","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/"}},{"type":"Link","bounds":[87,934,518,15],"objref":"129","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/"}},{"type":"Link","bounds":[81,949,81,25],"objref":"130","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/"}}]},{"page":10,"annotations":[{"type":"TextLink","bounds":[89,909,480,11],"action":{"type":"URI","uri":"https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against"}},{"type":"TextLink","bounds":[83,924,121,11],"action":{"type":"URI","uri":"https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against"}},{"type":"TextLink","bounds":[92,949,468,11],"action":{"type":"URI","uri":"https://securityaffairs.co/wordpress/130614/cyber-crime/stormous-ransomware-hit-coca-cola.html"}},{"type":"Link","bounds":[87,909,518,15],"objref":"133","action":{"type":"URI","uri":"https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against"}},{"type":"Link","bounds":[81,924,125,25],"objref":"134","action":{"type":"URI","uri":"https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against"}},{"type":"Link","bounds":[90,949,475,25],"objref":"135","action":{"type":"URI","uri":"https://securityaffairs.co/wordpress/130614/cyber-crime/stormous-ransomware-hit-coca-cola.html"}}]},{"page":11,"annotations":[{"type":"TextLink","bounds":[92,845,306,11],"action":{"type":"URI","uri":"https://www.forbes.com/profile/pavel-durov/?sh=520cd6a114c5"}},{"type":"TextLink","bounds":[92,869,503,11],"action":{"type":"URI","uri":"https://www.theguardian.com/business/2022/mar/05/telegram-app-ukraine-rides-high-thirst-trustworthy-news"}},{"type":"TextLink","bounds":[83,885,23,11],"action":{"type":"URI","uri":"https://www.theguardian.com/business/2022/mar/05/telegram-app-ukraine-rides-high-thirst-trustworthy-news"}},{"type":"TextLink","bounds":[92,909,324,11],"action":{"type":"URI","uri":"https://flashpoint.io/blog/telegram-intelligence-ukraine-russian-war/"}},{"type":"TextLink","bounds":[92,934,459,11],"action":{"type":"URI","uri":"https://www.theverge.com/2014/10/6/6926205/surveillance-drives-south-koreans-to-encrypted-messaging-apps"}},{"type":"TextLink","bounds":[83,949,74,11],"action":{"type":"URI","uri":"https://www.theverge.com/2014/10/6/6926205/surveillance-drives-south-koreans-to-encrypted-messaging-apps"}},{"type":"Link","bounds":[90,845,312,25],"objref":"142","action":{"type":"URI","uri":"https://www.forbes.com/profile/pavel-durov/?sh=520cd6a114c5"}},{"type":"Link","bounds":[90,869,515,15],"objref":"143","action":{"type":"URI","uri":"https://www.theguardian.com/business/2022/mar/05/telegram-app-ukraine-rides-high-thirst-trustworthy-news"}},{"type":"Link","bounds":[81,885,29,25],"objref":"144","action":{"type":"URI","uri":"https://www.theguardian.com/business/2022/mar/05/telegram-app-ukraine-rides-high-thirst-trustworthy-news"}},{"type":"Link","bounds":[90,909,330,25],"objref":"145","action":{"type":"URI","uri":"https://flashpoint.io/blog/telegram-intelligence-ukraine-russian-war/"}},{"type":"Link","bounds":[90,934,515,15],"objref":"146","action":{"type":"URI","uri":"https://www.theverge.com/2014/10/6/6926205/surveillance-drives-south-koreans-to-encrypted-messaging-apps"}},{"type":"Link","bounds":[81,949,80,25],"objref":"147","action":{"type":"URI","uri":"https://www.theverge.com/2014/10/6/6926205/surveillance-drives-south-koreans-to-encrypted-messaging-apps"}}]},{"page":12,"annotations":[{"type":"TextLink","bounds":[92,752,468,11],"action":{"type":"URI","uri":"https://techcrunch.com/2019/03/14/telegram-gets-3m-new-signups-during-facebook-apps-outage/"}},{"type":"TextLink","bounds":[92,776,478,11],"action":{"type":"URI","uri":"https://www.theverge.com/2021/1/12/22226792/whatsapp-privacy-policy-response-signal-telegram-controversy-clarification"}},{"type":"TextLink","bounds":[83,792,112,11],"action":{"type":"URI","uri":"https://www.theverge.com/2021/1/12/22226792/whatsapp-privacy-policy-response-signal-telegram-controversy-clarification"}},{"type":"TextLink","bounds":[92,816,504,11],"action":{"type":"URI","uri":"https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on"}},{"type":"TextLink","bounds":[83,831,139,11],"action":{"type":"URI","uri":"https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on"}},{"type":"TextLink","bounds":[83,845,381,11],"action":{"type":"URI","uri":"https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on"}},{"type":"TextLink","bounds":[92,885,394,11],"action":{"type":"URI","uri":"https://techcrunch.com/2022/12/06/telegram-premium-tops-1-million-subscribers/"}},{"type":"TextLink","bounds":[92,909,292,11],"action":{"type":"URI","uri":"https://techcrunch.com/2018/01/08/telegram-open-network/"}},{"type":"TextLink","bounds":[92,934,509,11],"action":{"type":"URI","uri":"https://www.forbes.com/sites/ninabambysheva/2022/12/02/telegram-to-build-crypto-wallet-decentralized-exchange-following-ftx-collapse/?sh=1cd9c65259e9"}},{"type":"TextLink","bounds":[83,949,242,11],"action":{"type":"URI","uri":"https://www.forbes.com/sites/ninabambysheva/2022/12/02/telegram-to-build-crypto-wallet-decentralized-exchange-following-ftx-collapse/?sh=1cd9c65259e9"}},{"type":"Link","bounds":[90,750,474,25],"objref":"149","action":{"type":"URI","uri":"https://techcrunch.com/2019/03/14/telegram-gets-3m-new-signups-during-facebook-apps-outage/"}},{"type":"Link","bounds":[90,775,515,15],"objref":"150","action":{"type":"URI","uri":"https://www.theverge.com/2021/1/12/22226792/whatsapp-privacy-policy-response-signal-telegram-controversy-clarification"}},{"type":"Link","bounds":[81,790,119,25],"objref":"151","action":{"type":"URI","uri":"https://www.theverge.com/2021/1/12/22226792/whatsapp-privacy-policy-response-signal-telegram-controversy-clarification"}},{"type":"Link","bounds":[90,814,515,15],"objref":"152","action":{"type":"URI","uri":"https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on,the%20platform%20calls%20sustainable%20monetisation"}},{"type":"Link","bounds":[81,830,524,15],"objref":"153","action":{"type":"URI","uri":"https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on,the%20platform%20calls%20sustainable%20monetisation"}},{"type":"Link","bounds":[81,845,524,15],"objref":"154","action":{"type":"URI","uri":"https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on,the%20platform%20calls%20sustainable%20monetisation"}},{"type":"Link","bounds":[81,860,145,25],"objref":"155","action":{"type":"URI","uri":"https://www.business-standard.com/article/technology/telegram-crosses-700-million-customers-launches-premium-subscription-model-122062000556_1.html#:~:text=Instant%20messaging%20app%20Telegram%20on,the%20platform%20calls%20sustainable%20monetisation"}},{"type":"Link","bounds":[90,885,400,25],"objref":"156","action":{"type":"URI","uri":"https://techcrunch.com/2022/12/06/telegram-premium-tops-1-million-subscribers/"}},{"type":"Link","bounds":[90,909,298,25],"objref":"157","action":{"type":"URI","uri":"https://techcrunch.com/2018/01/08/telegram-open-network/"}},{"type":"Link","bounds":[90,934,515,15],"objref":"158","action":{"type":"URI","uri":"https://www.forbes.com/sites/ninabambysheva/2022/12/02/telegram-to-build-crypto-wallet-decentralized-exchange-following-ftx-collapse/?sh=1cd9c65259e9"}},{"type":"Link","bounds":[81,949,248,25],"objref":"159","action":{"type":"URI","uri":"https://www.forbes.com/sites/ninabambysheva/2022/12/02/telegram-to-build-crypto-wallet-decentralized-exchange-following-ftx-collapse/?sh=1cd9c65259e9"}}]},{"page":13,"annotations":[{"type":"TextLink","bounds":[92,949,162,11],"action":{"type":"URI","uri":"https://telegram.org/faq_channels"}},{"type":"Link","bounds":[90,949,170,25],"objref":"168","action":{"type":"URI","uri":"https://telegram.org/faq_channels"}}]},{"page":14,"annotations":[{"type":"TextLink","bounds":[92,807,492,11],"action":{"type":"URI","uri":"https://techcrunch.com/2022/12/07/telegram-is-auctioning-phone-numbers-to-let-users-sign-up-to-the-service-without-any-sim/"}},{"type":"TextLink","bounds":[83,821,116,11],"action":{"type":"URI","uri":"https://techcrunch.com/2022/12/07/telegram-is-auctioning-phone-numbers-to-let-users-sign-up-to-the-service-without-any-sim/"}},{"type":"TextLink","bounds":[83,860,303,11],"action":{"type":"URI","uri":"https://telegram.org/faq#:~:text=You%20can%20log%20in%20to"}},{"type":"TextLink","bounds":[92,885,465,11],"action":{"type":"URI","uri":"https://cointelegraph.com/news/telegram-to-allow-no-sim-accounts-via-anon-blockchain-numbers"}},{"type":"TextLink","bounds":[92,909,509,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/software/telegram-adds-content-protection-support-for-groups-and-channels/"}},{"type":"TextLink","bounds":[83,924,66,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/software/telegram-adds-content-protection-support-for-groups-and-channels/"}},{"type":"TextLink","bounds":[92,949,164,11],"action":{"type":"URI","uri":"https://core.telegram.org/mtproto"}},{"type":"Link","bounds":[90,805,515,15],"objref":"170","action":{"type":"URI","uri":"https://techcrunch.com/2022/12/07/telegram-is-auctioning-phone-numbers-to-let-users-sign-up-to-the-service-without-any-sim/"}},{"type":"Link","bounds":[81,821,122,25],"objref":"171","action":{"type":"URI","uri":"https://techcrunch.com/2022/12/07/telegram-is-auctioning-phone-numbers-to-let-users-sign-up-to-the-service-without-any-sim/"}},{"type":"Link","bounds":[81,860,520,25],"objref":"172","action":{"type":"URI","uri":"https://telegram.org/faq#:~:text=You%20can%20log%20in%20to,cloud%20chats%20will%20sync%20instantly"}},{"type":"Link","bounds":[90,885,471,25],"objref":"173","action":{"type":"URI","uri":"https://cointelegraph.com/news/telegram-to-allow-no-sim-accounts-via-anon-blockchain-numbers"}},{"type":"Link","bounds":[90,909,515,15],"objref":"174","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/software/telegram-adds-content-protection-support-for-groups-and-channels/"}},{"type":"Link","bounds":[81,924,72,25],"objref":"175","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/software/telegram-adds-content-protection-support-for-groups-and-channels/"}},{"type":"Link","bounds":[90,949,170,25],"objref":"176","action":{"type":"URI","uri":"https://core.telegram.org/mtproto"}}]},{"page":15,"annotations":[{"type":"TextLink","bounds":[92,876,139,11],"action":{"type":"URI","uri":"https://core.telegram.org/api"}},{"type":"TextLink","bounds":[92,900,144,11],"action":{"type":"URI","uri":"https://core.telegram.org/bots"}},{"type":"TextLink","bounds":[92,924,174,11],"action":{"type":"URI","uri":"https://core.telegram.org/bots/inline"}},{"type":"TextLink","bounds":[92,949,158,11],"action":{"type":"URI","uri":"https://instantview.telegram.org/"}},{"type":"Link","bounds":[90,876,145,25],"objref":"178","action":{"type":"URI","uri":"https://core.telegram.org/api"}},{"type":"Link","bounds":[90,900,151,25],"objref":"179","action":{"type":"URI","uri":"https://core.telegram.org/bots"}},{"type":"Link","bounds":[90,924,182,25],"objref":"180","action":{"type":"URI","uri":"https://core.telegram.org/bots/inline"}},{"type":"Link","bounds":[90,949,164,25],"objref":"181","action":{"type":"URI","uri":"https://instantview.telegram.org/"}}]},{"page":16,"annotations":[{"type":"TextLink","bounds":[92,949,271,11],"action":{"type":"URI","uri":"https://techcrunch.com/2016/11/22/telegram-telegraph/"}},{"type":"Link","bounds":[90,949,277,25],"objref":"183","action":{"type":"URI","uri":"https://techcrunch.com/2016/11/22/telegram-telegraph/"}}]},{"page":17,"annotations":[{"type":"TextLink","bounds":[92,854,402,11],"action":{"type":"URI","uri":"https://krebsonsecurity.com/2022/04/raidforums-get-raided-alleged-admin-arrested/"}},{"type":"TextLink","bounds":[92,879,471,11],"action":{"type":"URI","uri":"https://www.cnbc.com/2022/04/05/darknet-hydra-market-site-seized-and-shut-down-doj-says.html"}},{"type":"TextLink","bounds":[90,903,338,11],"action":{"type":"URI","uri":"https://techcrunch.com/2022/06/08/fbi-ssndob-millions-social-security-marketplace/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAA"}},{"type":"TextLink","bounds":[83,918,515,11],"action":{"type":"URI","uri":"https://techcrunch.com/2022/06/08/fbi-ssndob-millions-social-security-marketplace/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAA"}},{"type":"Link","bounds":[90,854,410,25],"objref":"185","action":{"type":"URI","uri":"https://krebsonsecurity.com/2022/04/raidforums-get-raided-alleged-admin-arrested/"}},{"type":"Link","bounds":[90,879,477,25],"objref":"186","action":{"type":"URI","uri":"https://www.cnbc.com/2022/04/05/darknet-hydra-market-site-seized-and-shut-down-doj-says.html"}},{"type":"Link","bounds":[89,903,517,15],"objref":"187","action":{"type":"URI","uri":"https://techcrunch.com/2022/06/08/fbi-ssndob-millions-social-security-marketplace/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAACQlfuYl5gqG590C5_wEme6L9Ley9vw-FKP3X0kl__KdUxxlWzbGDAZ0bzXbsPMf9m00CRBkUOIeCCiSA-J0tupJStdIHCEort3yNSWSbZPjt7nKOzpmIcG8g6cFCInAKs194co7dzH8Csez1kRIV-6U225Uc17mrrSi45bA8yWi"}},{"type":"Link","bounds":[81,918,524,15],"objref":"188","action":{"type":"URI","uri":"https://techcrunch.com/2022/06/08/fbi-ssndob-millions-social-security-marketplace/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAACQlfuYl5gqG590C5_wEme6L9Ley9vw-FKP3X0kl__KdUxxlWzbGDAZ0bzXbsPMf9m00CRBkUOIeCCiSA-J0tupJStdIHCEort3yNSWSbZPjt7nKOzpmIcG8g6cFCInAKs194co7dzH8Csez1kRIV-6U225Uc17mrrSi45bA8yWi"}},{"type":"Link","bounds":[81,934,524,15],"objref":"189","action":{"type":"URI","uri":"https://techcrunch.com/2022/06/08/fbi-ssndob-millions-social-security-marketplace/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAACQlfuYl5gqG590C5_wEme6L9Ley9vw-FKP3X0kl__KdUxxlWzbGDAZ0bzXbsPMf9m00CRBkUOIeCCiSA-J0tupJStdIHCEort3yNSWSbZPjt7nKOzpmIcG8g6cFCInAKs194co7dzH8Csez1kRIV-6U225Uc17mrrSi45bA8yWi"}},{"type":"Link","bounds":[81,949,506,25],"objref":"190","action":{"type":"URI","uri":"https://techcrunch.com/2022/06/08/fbi-ssndob-millions-social-security-marketplace/?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAACQlfuYl5gqG590C5_wEme6L9Ley9vw-FKP3X0kl__KdUxxlWzbGDAZ0bzXbsPMf9m00CRBkUOIeCCiSA-J0tupJStdIHCEort3yNSWSbZPjt7nKOzpmIcG8g6cFCInAKs194co7dzH8Csez1kRIV-6U225Uc17mrrSi45bA8yWi"}}]},{"page":18,"annotations":[{"type":"TextLink","bounds":[92,869,417,11],"action":{"type":"URI","uri":"https://intel471.com/blog/mazafaka-hacked-cybercrime-forums-exploit-crdclub-verified/"}},{"type":"TextLink","bounds":[92,894,504,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/darknet-market-versus-shuts-down-after-hacker-leaks-security-flaw/"}},{"type":"TextLink","bounds":[83,909,63,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/darknet-market-versus-shuts-down-after-hacker-leaks-security-flaw/"}},{"type":"TextLink","bounds":[92,934,492,11],"action":{"type":"URI","uri":"https://www.darkreading.com/threat-intelligence/metaparasites-the-dark-web-scammers-turn-on-their-own"}},{"type":"TextLink","bounds":[83,949,19,11],"action":{"type":"URI","uri":"https://www.darkreading.com/threat-intelligence/metaparasites-the-dark-web-scammers-turn-on-their-own"}},{"type":"Link","bounds":[90,869,423,25],"objref":"192","action":{"type":"URI","uri":"https://intel471.com/blog/mazafaka-hacked-cybercrime-forums-exploit-crdclub-verified/"}},{"type":"Link","bounds":[90,894,515,15],"objref":"193","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/darknet-market-versus-shuts-down-after-hacker-leaks-security-flaw/"}},{"type":"Link","bounds":[81,909,69,25],"objref":"194","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/darknet-market-versus-shuts-down-after-hacker-leaks-security-flaw/"}},{"type":"Link","bounds":[90,934,515,15],"objref":"195","action":{"type":"URI","uri":"https://www.darkreading.com/threat-intelligence/metaparasites-the-dark-web-scammers-turn-on-their-own"}},{"type":"Link","bounds":[81,949,25,25],"objref":"196","action":{"type":"URI","uri":"https://www.darkreading.com/threat-intelligence/metaparasites-the-dark-web-scammers-turn-on-their-own"}}]},{"page":19,"annotations":[{"type":"TextLink","bounds":[92,876,319,11],"action":{"type":"URI","uri":"https://therecord.media/dark-web-marketplace-torrez-shuts-down/"}},{"type":"TextLink","bounds":[92,900,497,11],"action":{"type":"URI","uri":"https://www.darkreading.com/threat-intelligence/lockbit-alphv-ransomware-gang-leak-sites-ddos-attacks"}},{"type":"TextLink","bounds":[92,924,347,11],"action":{"type":"URI","uri":"https://www.cyberscoop.com/colonial-pipeline-ransomware-xss-criminal/"}},{"type":"TextLink","bounds":[92,949,443,11],"action":{"type":"URI","uri":"https://securityintelligence.com/news/ransomware-gangs-using-data-leak-sites-new-affiliates/"}},{"type":"Link","bounds":[90,876,326,25],"objref":"200","action":{"type":"URI","uri":"https://therecord.media/dark-web-marketplace-torrez-shuts-down/"}},{"type":"Link","bounds":[90,900,503,25],"objref":"201","action":{"type":"URI","uri":"https://www.darkreading.com/threat-intelligence/lockbit-alphv-ransomware-gang-leak-sites-ddos-attacks"}},{"type":"Link","bounds":[90,924,353,25],"objref":"202","action":{"type":"URI","uri":"https://www.cyberscoop.com/colonial-pipeline-ransomware-xss-criminal/"}},{"type":"Link","bounds":[90,949,451,25],"objref":"203","action":{"type":"URI","uri":"https://securityintelligence.com/news/ransomware-gangs-using-data-leak-sites-new-affiliates/"}}]},{"page":20,"annotations":[{"type":"TextLink","bounds":[92,885,491,11],"action":{"type":"URI","uri":"https://blog.checkpoint.com/2022/09/28/hacker-groups-take-to-telegram-signal-and-darkweb-to-assist-protestors-in-iran/"}},{"type":"TextLink","bounds":[83,900,86,11],"action":{"type":"URI","uri":"https://blog.checkpoint.com/2022/09/28/hacker-groups-take-to-telegram-signal-and-darkweb-to-assist-protestors-in-iran/"}},{"type":"TextLink","bounds":[92,924,446,11],"action":{"type":"URI","uri":"https://blog.checkpoint.com/2022/03/02/telegram-becomes-a-digital-forefront-in-the-conflict/"}},{"type":"TextLink","bounds":[92,949,335,11],"action":{"type":"URI","uri":"https://intel471.com/blog/why-cybercriminals-are-flocking-to-telegram"}},{"type":"Link","bounds":[90,885,515,15],"objref":"205","action":{"type":"URI","uri":"https://blog.checkpoint.com/2022/09/28/hacker-groups-take-to-telegram-signal-and-darkweb-to-assist-protestors-in-iran/"}},{"type":"Link","bounds":[81,900,92,25],"objref":"206","action":{"type":"URI","uri":"https://blog.checkpoint.com/2022/09/28/hacker-groups-take-to-telegram-signal-and-darkweb-to-assist-protestors-in-iran/"}},{"type":"Link","bounds":[90,924,454,25],"objref":"207","action":{"type":"URI","uri":"https://blog.checkpoint.com/2022/03/02/telegram-becomes-a-digital-forefront-in-the-conflict/"}},{"type":"Link","bounds":[90,949,341,25],"objref":"208","action":{"type":"URI","uri":"https://intel471.com/blog/why-cybercriminals-are-flocking-to-telegram"}}]},{"page":21,"annotations":[{"type":"TextLink","bounds":[92,924,480,11],"action":{"type":"URI","uri":"https://intel471.com/blog/how-cybercriminals-are-using-messaging-apps-to-launch-malware-schemes"}},{"type":"TextLink","bounds":[92,949,335,11],"action":{"type":"URI","uri":"https://intel471.com/blog/why-cybercriminals-are-flocking-to-telegram"}},{"type":"Link","bounds":[90,924,486,25],"objref":"210","action":{"type":"URI","uri":"https://intel471.com/blog/how-cybercriminals-are-using-messaging-apps-to-launch-malware-schemes"}},{"type":"Link","bounds":[90,949,341,25],"objref":"211","action":{"type":"URI","uri":"https://intel471.com/blog/why-cybercriminals-are-flocking-to-telegram"}}]},{"page":22,"annotations":[{"type":"TextLink","bounds":[92,949,286,11],"action":{"type":"URI","uri":"https://www.vpnmentor.com/blog/cybercrime-on-telegram/"}},{"type":"Link","bounds":[90,949,292,25],"objref":"213","action":{"type":"URI","uri":"https://www.vpnmentor.com/blog/cybercrime-on-telegram/"}}]},{"page":23,"annotations":[{"type":"TextLink","bounds":[92,900,460,11],"action":{"type":"URI","uri":"https://news.cybersixgill.com/telegram-a-cybercriminal-hotspot-compromised-financial-accounts/"}},{"type":"TextLink","bounds":[92,924,382,11],"action":{"type":"URI","uri":"https://www.ptsecurity.com/ww-en/analytics/cybercriminal-market-in-telegram/"}},{"type":"TextLink","bounds":[92,949,356,11],"action":{"type":"URI","uri":"https://ke-la.com/wp-content/uploads/2023/02/KELA_Telegram_CEBIN.pdf"}},{"type":"Link","bounds":[90,900,468,25],"objref":"215","action":{"type":"URI","uri":"https://news.cybersixgill.com/telegram-a-cybercriminal-hotspot-compromised-financial-accounts/"}},{"type":"Link","bounds":[90,924,388,25],"objref":"216","action":{"type":"URI","uri":"https://www.ptsecurity.com/ww-en/analytics/cybercriminal-market-in-telegram/"}},{"type":"Link","bounds":[90,949,361,25],"objref":"217","action":{"type":"URI","uri":"https://ke-la.com/wp-content/uploads/2023/02/KELA_Telegram_CEBIN.pdf"}}]},{"page":29,"annotations":[{"type":"TextLink","bounds":[92,885,286,11],"action":{"type":"URI","uri":"https://www.vpnmentor.com/blog/cybercrime-on-telegram/"}},{"type":"TextLink","bounds":[92,909,454,11],"action":{"type":"URI","uri":"https://www.welivesecurity.com/2022/02/10/hidden-plain-sight-dark-web-spilling-social-media/"}},{"type":"TextLink","bounds":[92,934,483,11],"action":{"type":"URI","uri":"https://blog.checkpoint.com/2021/04/22/turning-telegram-toxic-new-toxiceye-rat-is-the-latest-to-use-telegram-for-command-control/"}},{"type":"TextLink","bounds":[83,949,150,11],"action":{"type":"URI","uri":"https://blog.checkpoint.com/2021/04/22/turning-telegram-toxic-new-toxiceye-rat-is-the-latest-to-use-telegram-for-command-control/"}},{"type":"Link","bounds":[90,885,292,25],"objref":"234","action":{"type":"URI","uri":"https://www.vpnmentor.com/blog/cybercrime-on-telegram/"}},{"type":"Link","bounds":[90,909,460,25],"objref":"235","action":{"type":"URI","uri":"https://www.welivesecurity.com/2022/02/10/hidden-plain-sight-dark-web-spilling-social-media/"}},{"type":"Link","bounds":[90,934,515,15],"objref":"236","action":{"type":"URI","uri":"https://blog.checkpoint.com/2021/04/22/turning-telegram-toxic-new-toxiceye-rat-is-the-latest-to-use-telegram-for-command-control/"}},{"type":"Link","bounds":[81,949,156,25],"objref":"237","action":{"type":"URI","uri":"https://blog.checkpoint.com/2021/04/22/turning-telegram-toxic-new-toxiceye-rat-is-the-latest-to-use-telegram-for-command-control/"}}]},{"page":30,"annotations":[{"type":"TextLink","bounds":[92,787,387,11],"action":{"type":"URI","uri":"https://www.cybersprint.com/news/how-criminals-are-tracked-down-on-telegram"}},{"type":"TextLink","bounds":[92,811,333,11],"action":{"type":"URI","uri":"https://www.ft.com/content/cc3e3854-5f76-4422-a970-9010c3bc732b"}},{"type":"TextLink","bounds":[92,836,174,11],"action":{"type":"URI","uri":"https://telegram.org/privacy?setln=it"}},{"type":"TextLink","bounds":[92,860,410,11],"action":{"type":"URI","uri":"https://www.washingtonpost.com/technology/2021/01/15/parler-telegram-chat-apps/"}},{"type":"TextLink","bounds":[92,885,468,11],"action":{"type":"URI","uri":"https://www.dw.com/en/german-police-pressure-telegram-to-delete-far-right-content/a-60453402"}},{"type":"TextLink","bounds":[92,909,454,11],"action":{"type":"URI","uri":"https://www.welivesecurity.com/2022/02/10/hidden-plain-sight-dark-web-spilling-social-media/"}},{"type":"TextLink","bounds":[92,934,475,11],"action":{"type":"URI","uri":"https://www.forbes.com/sites/zakdoffman/2021/04/22/forget-whatsapp-new-telegram-warning-for-millions-of-windows-10-users/?sh=3b2cafa78575"}},{"type":"TextLink","bounds":[83,949,229,11],"action":{"type":"URI","uri":"https://www.forbes.com/sites/zakdoffman/2021/04/22/forget-whatsapp-new-telegram-warning-for-millions-of-windows-10-users/?sh=3b2cafa78575"}},{"type":"Link","bounds":[90,787,394,25],"objref":"239","action":{"type":"URI","uri":"https://www.cybersprint.com/news/how-criminals-are-tracked-down-on-telegram"}},{"type":"Link","bounds":[90,811,339,25],"objref":"240","action":{"type":"URI","uri":"https://www.ft.com/content/cc3e3854-5f76-4422-a970-9010c3bc732b"}},{"type":"Link","bounds":[90,836,180,25],"objref":"241","action":{"type":"URI","uri":"https://telegram.org/privacy?setln=it"}},{"type":"Link","bounds":[90,860,416,25],"objref":"242","action":{"type":"URI","uri":"https://www.washingtonpost.com/technology/2021/01/15/parler-telegram-chat-apps/"}},{"type":"Link","bounds":[90,885,474,25],"objref":"243","action":{"type":"URI","uri":"https://www.dw.com/en/german-police-pressure-telegram-to-delete-far-right-content/a-60453402"}},{"type":"Link","bounds":[90,909,460,25],"objref":"244","action":{"type":"URI","uri":"https://www.welivesecurity.com/2022/02/10/hidden-plain-sight-dark-web-spilling-social-media/"}},{"type":"Link","bounds":[90,934,515,15],"objref":"245","action":{"type":"URI","uri":"https://www.forbes.com/sites/zakdoffman/2021/04/22/forget-whatsapp-new-telegram-warning-for-millions-of-windows-10-users/?sh=3b2cafa78575"}},{"type":"Link","bounds":[81,949,235,25],"objref":"246","action":{"type":"URI","uri":"https://www.forbes.com/sites/zakdoffman/2021/04/22/forget-whatsapp-new-telegram-warning-for-millions-of-windows-10-users/?sh=3b2cafa78575"}}]},{"page":31,"annotations":[{"type":"TextLink","bounds":[92,924,422,11],"action":{"type":"URI","uri":"https://myntex.com/blog/index.php/2021/10/06/the-security-vulnerabilities-of-telegram/"}},{"type":"TextLink","bounds":[92,949,504,11],"action":{"type":"URI","uri":"https://theintercept.com/2021/09/21/surveillance-social-media-police-microsoft-shadowdragon-kaseware/"}},{"type":"Link","bounds":[90,924,429,25],"objref":"248","action":{"type":"URI","uri":"https://myntex.com/blog/index.php/2021/10/06/the-security-vulnerabilities-of-telegram/"}},{"type":"Link","bounds":[90,949,512,25],"objref":"249","action":{"type":"URI","uri":"https://theintercept.com/2021/09/21/surveillance-social-media-police-microsoft-shadowdragon-kaseware/"}}]}]},"created_at":"2023-04-04T09:01:50.474197Z","updated_at":"2026-04-17T04:49:27.475636Z","original_name":"Luminar Annual Threat Landscape Report 2023.pdf","uuid":"fd4d2baa-de3a-4257-8f81-bee2efd4e961","description":"Annual Threat Landscape Report The Shift from Traditional Underground Cybercrime Platforms to Telegram TLP: Amber March 2023 ","is_high_quality_thumbnails_available":true,"conversion_type":"DOCUMENT"}