{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreieotsfykn7oylh4nmgba3h5yybykpsdtznaor6fjie5xev5lv5jzu",
"uri": "at://did:plc:xb5etev7ncohgebas3kjeqek/app.bsky.feed.post/3mlusn6k42re2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiaazproamfavje44rgj5yyuqe3k3pf6j5itdlkiq7p6d2fc5pvu7m"
},
"mimeType": "image/jpeg",
"size": 27109
},
"path": "/famoussparrow-oil-gas-ms-exchange-server-exploit/",
"publishedAt": "2026-05-14T12:20:02.000Z",
"site": "https://hackread.com",
"tags": [
"Security",
"Cyber Attacks",
"Malware",
"Azerbaijan",
"China",
"Cyber Attack",
"Cybersecurity",
"FamousSparrow",
"Microsoft",
"MS Exchange",
"Oil and Gas"
],
"textContent": "Bitdefender Labs reveals how the China-linked FamousSparrow hacking group targeted an Azerbaijani energy firm using ProxyNotShell, Deed RAT,…",
"title": "FamousSparrow Targeted Oil and Gas Industry via MS Exchange Server Exploit"
}