{"id":13315,"date":"2025-05-07T10:54:22","date_gmt":"2025-05-07T10:54:22","guid":{"rendered":"\/cybersecurity-blog\/?p=13315"},"modified":"2025-05-07T10:54:23","modified_gmt":"2025-05-07T10:54:23","slug":"nitrogen-ransomware-report","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/","title":{"rendered":"Nitrogen Ransomware Exposed: How ANY.RUN Helps Uncover Threats to Finance\u00a0"},"content":{"rendered":"\n<p>The financial sector is heavily targeted by cybercriminals. Banks, investment firms, and credit unions are prime victims of attacks aimed at stealing sensitive data or holding it hostage for massive ransoms. One emerging threat in this landscape is Nitrogen Ransomware, a malicious group discovered in September 2024.\u00a0\u00a0<\/p>\n\n\n\n<p>It has since then been notoriously renowned for several successful attacks like that on SRP Federal Credit Union in South Carolina in December 2024. However, there is still a scarcity of information on the group\u2019s TTPs, and this deficit highlights the value of solutions like <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=nitrogen_ransomware&amp;utm_term=070525&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s threat intelligence and malware analysis suite<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Financial Sector Is Vulnerable&nbsp;<\/h2>\n\n\n\n<p>The numbers don\u2019t lie: in 2024, 10% of all cyberattacks targeted the financial industry, <a href=\"https:\/\/www.kroll.com\/en\/insights\/publications\/cyber\/threat-intelligence-reports\/q4-2024-threat-landscape-report-phishing\" target=\"_blank\" rel=\"noreferrer noopener\">according to reports<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>From ransomware to financial fraud and cloud infrastructure exploits, banks and credit unions face all the kinds of threats that there are. The stakes are high \u2014 cyberattacks now cost organizations up to $2.5 billion per incident, with ransomware attacks alone spiking to 20\u201325 major incidents daily, a fourfold increase in financial losses since 2017.&nbsp;<\/p>\n\n\n\n<p>Why is the <a href=\"https:\/\/any.run\/cybersecurity-blog\/how-investment-bank-improved-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">financial sector<\/a> so attractive? It\u2019s simple: money and data. Financial institutions hold sensitive customer information and control vast sums of capital, which makes them tempting targets for ransomware groups like Nitrogen. Early detection and adversary tactics analysis are critical to minimizing damage, and that\u2019s where services like ANY.RUN&#8217;s <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=nitrogen_ransomware&amp;utm_term=070525&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a> and <a href=\"http:\/\/intelligence.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=nitrogen_ransomware&amp;utm_term=070525&amp;utm_content=linktotilookup\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> come in handy.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Meet Nitrogen Ransomware&nbsp;<\/h2>\n\n\n\n<p>There are traces of Nitrogen from July 2023, but it\u2019s consensual to track it from September 2024. It was initially observed targeting not only finance but also construction, manufacturing, and tech, primarily in the United States, Canada, and the United Kingdom. The routine was to encrypt critical data and demand a ransom to unlock it. One of their confirmed victims, SRP Federal Credit Union, a South Carolina-based institution serving over 195,000 customers, fell prey on December 5, 2024.&nbsp;<\/p>\n\n\n\n<p>Little is known about Nitrogen\u2019s tactics due to limited public data, but <a href=\"https:\/\/streamscan.ai\/en\/blog\/analyse-du-rancongiciel-nitrogen\/\" target=\"_blank\" rel=\"noreferrer noopener\">a report by StreamScan<\/a> provides a starting point.&nbsp;&nbsp;<\/p>\n\n\n\n<p>It offers key indicators of compromise and some insights into the methods. Interestingly, Nitrogen shares similarities with another ransomware strain, LukaLocker, including identical file extensions for encrypted files and similar ransom notes. This overlap raises questions about their origins, but deeper analysis is needed to confirm connections.&nbsp;<\/p>\n\n\n\n<p>The StreamScan report is the primary source of information on Nitrogen, detailing a few <a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">critical IOCs<\/a>:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ransomware File<\/strong>: A malicious executable with the SHA-256 hash <em>55f3725ebe01ea19ca14ab14d747a6975f9a6064ca71345219a14c47c18c88be<\/em>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Mutex<\/strong>: A unique identifier, <em>nvxkjcv7yxctvgsdfjhv6esdvsx<\/em>, created by the ransomware before encryption.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Vulnerable Driver<\/strong>: truesight.sys, a legitimate but exploitable driver used to disable antivirus and endpoint detection tools.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>System Manipulation<\/strong>: Use of bcdedit.exe to disable Windows Safe Boot, hindering system recovery.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>While this report is a good start, it\u2019s light on details. This is where ANY.RUN steps in, offering deeper insights through dynamic analysis and threat intelligence enrichment.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN\u2019s Threat Intelligence Versus Nitrogen&nbsp;<\/h2>\n\n\n\n<p>Let\u2019s research some of the above-mentioned indicators via Threat Intelligence Lookup to find more IOCs, behavioral data, and technical details on Nitrogen attacks.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Tracking the Mutex&nbsp;<\/h3>\n\n\n\n<p>Before encrypting files, Nitrogen creates a <a href=\"https:\/\/any.run\/cybersecurity-blog\/mutex-search-in-ti-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">unique mutex<\/a> (<em>nvxkjcv7yxctvgsdfjhv6esdvsx<\/em>) to ensure only one instance of the ransomware runs at a time. Using ANY.RUN\u2019s Threat Intelligence Lookup, analysts can search for this mutex and uncover over 20 related samples, with <a href=\"https:\/\/app.any.run\/tasks\/bfd9f258-3056-4493-8281-f3a79518a5ee\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=nitrogen_ransomware&amp;utm_term=070525&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">the earliest dating back to September 2, 2024<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=nitrogen_ransomware&amp;utm_term=070525&amp;utm_content=linktotilookup#%257B%2522query%2522:%2522syncObjectName:%255C%2522nvxkjcv7yxctvgsdfjhv6esdvsx%255C%2522%2522,%2522dateRange%2522:180%257D\" target=\"_blank\" rel=\"noreferrer noopener\">syncObjectName:&#8221;nvxkjcv7yxctvgsdfjhv6esdvsx&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"709\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-1024x709.png\" alt=\"\" class=\"wp-image-13320\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-1024x709.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-300x208.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-768x532.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-1536x1063.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-2048x1418.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-370x256.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-270x187.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-435x300.png 435w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-740x512.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Mutex search results in TI Lookup&nbsp;<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>For each sample, an analysis session can be explored to enrich the understanding of the threat and gather additional indicators not featured in public research.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"648\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-1024x648.png\" alt=\"\" class=\"wp-image-13321\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-1024x648.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-300x190.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-768x486.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-1536x972.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-2048x1296.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-370x234.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-270x171.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-740x468.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>All sandbox analyses contain a selection of linked IOCs<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>ANY.RUN\u2019s analyses also link Nitrogen to LukaLocker, as both share similar code structures and behaviors. By identifying additional IOCs from related tasks, ANY.RUN helps organizations update their detection systems to block Nitrogen before it strikes.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"589\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-1024x589.png\" alt=\"\" class=\"wp-image-13322\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-1024x589.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-300x172.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-768x441.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-1536x883.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-2048x1177.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-370x213.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-270x155.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-740x425.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>An analysis session in the sandbox where Luka was detected<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nCollect threat intelligence with <span class=\"highlight\">TI Lookup<\/span> to improve your company&#8217;s security&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=nitrogen_ransomware&#038;utm_term=070525&#038;utm_content=linktotiplans\" rel=\"noopener\" target=\"_blank\">\nGet 50 free requests\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">2. Exposing the Vulnerable Driver&nbsp;<\/h3>\n\n\n\n<p>Nitrogen exploits truesight.sys, a legitimate driver from RogueKiller AntiRootkit, to kill AV\/EDR processes and thus disable antivirus and endpoint detection tools. This driver, listed in the LOLDrivers catalog, is used by threat actors because it\u2019s not inherently malicious, so it does not trigger standard defenses.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"417\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-1024x417.jpg\" alt=\"\" class=\"wp-image-13323\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-1024x417.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-300x122.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-768x313.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-370x151.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-270x110.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-740x301.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image.jpg 1328w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>truesight.sys description in LOLDrivers\u2019 catalog<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>ANY.RUN\u2019s TI Lookup reveals over 50 analyses linked to truesight.sys:&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=nitrogen_ransomware&amp;utm_term=070525&amp;utm_content=linktotilookup#%257B%2522query%2522:%2522sha256:%255C%2522Bfc2ef3b404294fe2fa05a8b71c7f786b58519175b7202a69fe30f45e607ff1c%255C%2522%2522,%2522dateRange%2522:180%257D\" target=\"_blank\" rel=\"noreferrer noopener\">sha256:&#8221;Bfc2ef3b404294fe2fa05a8b71c7f786b58519175b7202a69fe30f45e607ff1c&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"704\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-1024x704.png\" alt=\"\" class=\"wp-image-13325\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-1024x704.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-300x206.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-768x528.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-1536x1056.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-2048x1408.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-370x254.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-270x186.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-435x300.png 435w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-740x509.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Sandbox sessions featuring the abused driver&nbsp;<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>By parsing these analyses, teams see how the driver can be abused, from terminating security processes to evading detection.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"528\" height=\"414\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7.png\" alt=\"\" class=\"wp-image-13326\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7.png 528w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7-300x235.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7-370x290.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7-270x212.png 270w\" sizes=\"(max-width: 528px) 100vw, 528px\" \/><figcaption class=\"wp-element-caption\"><em>Malicious behavior exposed by a sandbox analysis<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The driver\u2019s name as a search query with the &#8220;CommandLine&#8221; parameter gives a selection of system events involving the driver:&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=nitrogen_ransomware&amp;utm_term=070525&amp;utm_content=linktotilookup#%257B%2522query%2522:%2522commandLine:%255C%2522*truesight.sys%255C%2522%2522,%2522dateRange%2522:180%257D\" target=\"_blank\" rel=\"noreferrer noopener\">commandLine:&#8221;*truesight.sys&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"541\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-1024x541.png\" alt=\"\" class=\"wp-image-13329\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-1024x541.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-300x158.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-768x405.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-1536x811.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-2048x1081.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-370x195.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-270x143.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-740x391.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>System events observed via TI Lookup<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>ANY.RUN&#8217;s Interactive Sandbox&#8217;s ability to detect and flag this activity ensures organizations can block such exploits early.&nbsp;<\/p>\n\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"Enrich your threat knowledge with TI Lookup\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>Learn to Track Emerging Cyber Threats<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nCheck out expert guide to collecting intelligence on emerging threats with <span class=\"highlight\">TI Lookup<\/span>\n\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/emerging-threats\/\"><div class=\"cta__split-link\">Read full guide<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">3. Catching System Manipulation&nbsp;<\/h3>\n\n\n\n<p>Nitrogen uses the Windows utility bcdedit.exe to disable Safe Boot, a recovery mechanism that could otherwise help restore an infected system. As the StreamScan report says:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"682\" height=\"212\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image9.png\" alt=\"\" class=\"wp-image-13351\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image9.png 682w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image9-300x93.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image9-370x115.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image9-270x84.png 270w\" sizes=\"(max-width: 682px) 100vw, 682px\" \/><figcaption class=\"wp-element-caption\"><em>Example from the StreamScan report<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>ANY.RUN allows analysts to use YARA rules to search for this behavior, identifying samples that tamper with system settings.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"415\" height=\"229\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image.png\" alt=\"\" class=\"wp-image-13316\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image.png 415w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-370x204.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-270x149.png 270w\" sizes=\"(max-width: 415px) 100vw, 415px\" \/><figcaption class=\"wp-element-caption\"><em>YARA rule from the StreamScan report<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>A simple <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA search<\/a> in ANY.RUN\u2019s TI Lookup returned several files linked to this tactic, each with associated analysis sessions that reveal additional IOCs.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"709\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-1024x709.png\" alt=\"\" class=\"wp-image-13332\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-1024x709.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-300x208.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-768x531.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-1536x1063.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-2048x1417.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-370x256.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-270x187.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-435x300.png 435w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-740x512.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">YARA<em> rule search in TI Lookup<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>By integrating these IOCs into SIEM or EDR systems, organizations can detect and block attempts to modify Windows boot settings before encryption begins, stopping Nitrogen in its tracks. To defend against threats like Nitrogen, security teams should:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitor for unusual use of PowerShell, WMI, and DLL sideloading.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Block known malicious infrastructure and domains.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Educate employees about phishing and social engineering tactics.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use threat intelligence services to proactively hunt for related IOCs and <a href=\"https:\/\/any.run\/cybersecurity-blog\/malware-ttps-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">TTPs<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp;<\/h2>\n\n\n\n<p>The financial sector\u2019s battle against ransomware is far from over, but solutions like <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=nitrogen_ransomware&amp;utm_term=070525&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> are leveling the playing field. By dissecting Nitrogen Ransomware\u2019s tactics \u2014system manipulation, driver exploitation, and mutex creation \u2014 ANY.RUN empowers cybersecurity teams to detect, analyze, and respond to the threat faster. Its dynamic analysis capabilities let analysts observe malware in action, from file encryption to system components abuse, in a safe sandbox environment. Meanwhile, its TI Lookup enriches threat data by providing additional indicators, uncovering connections to other attacks, campaigns, and techniques.&nbsp;<\/p>\n\n\n\n<p>Nitrogen is a reminder that today\u2019s cyberattacks are not only persistent \u2014 they\u2019re precise. As Nitrogen and similar groups continue to evolve, staying proactive with dynamic analysis and enriched threat intelligence is the key to keeping financial institutions safe, to avoid direct capital losses, reputation damage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN<\/h2>\n\n\n\n<p><a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=nitrogen_ransomware&amp;utm_term=070525&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find IOCs or files to learn more about the threats and respond to incidents faster.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=nitrogen_ransomware&amp;utm_term=070525&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial of ANY.RUN&#8217;s services \u2192&nbsp;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The financial sector is heavily targeted by cybercriminals. Banks, investment firms, and credit unions are prime victims of attacks aimed at stealing sensitive data or holding it hostage for massive ransoms. One emerging threat in this landscape is Nitrogen Ransomware, a malicious group discovered in September 2024.\u00a0\u00a0 It has since then been notoriously renowned for [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,15,34],"class_list":["post-13315","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Nitrogen Ransomware Exposed: New Threat to Finance Industry<\/title>\n<meta name=\"description\" content=\"Discover report on Nitrogen Ransomware, a new threat to financial institutions in the United States and see how your company can counter it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"4OURUP\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/\"},\"author\":{\"name\":\"4OURUP\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Nitrogen Ransomware Exposed: How ANY.RUN Helps Uncover Threats to Finance\u00a0\",\"datePublished\":\"2025-05-07T10:54:22+00:00\",\"dateModified\":\"2025-05-07T10:54:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/\"},\"wordCount\":1308,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware\",\"malware analysis\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/\",\"name\":\"Nitrogen Ransomware Exposed: New Threat to Finance Industry\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-05-07T10:54:22+00:00\",\"dateModified\":\"2025-05-07T10:54:23+00:00\",\"description\":\"Discover report on Nitrogen Ransomware, a new threat to financial institutions in the United States and see how your company can counter it.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Nitrogen Ransomware Exposed: How ANY.RUN Helps Uncover Threats to Finance\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"4OURUP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/4up.jpg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/4up.jpg\",\"caption\":\"4OURUP\"},\"description\":\"I research malicious activity, attack tactics, and techniques. I analyze cyber threats, process data, and help stay one step ahead of adversaries.\",\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nitrogen Ransomware Exposed: New Threat to Finance Industry","description":"Discover report on Nitrogen Ransomware, a new threat to financial institutions in the United States and see how your company can counter it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/","twitter_misc":{"Written by":"4OURUP","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/"},"author":{"name":"4OURUP","@id":"https:\/\/any.run\/"},"headline":"Nitrogen Ransomware Exposed: How ANY.RUN Helps Uncover Threats to Finance\u00a0","datePublished":"2025-05-07T10:54:22+00:00","dateModified":"2025-05-07T10:54:23+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/"},"wordCount":1308,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware","malware analysis"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/","url":"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/","name":"Nitrogen Ransomware Exposed: New Threat to Finance Industry","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-05-07T10:54:22+00:00","dateModified":"2025-05-07T10:54:23+00:00","description":"Discover report on Nitrogen Ransomware, a new threat to financial institutions in the United States and see how your company can counter it.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"Nitrogen Ransomware Exposed: How ANY.RUN Helps Uncover Threats to Finance\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"4OURUP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/4up.jpg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/01\/4up.jpg","caption":"4OURUP"},"description":"I research malicious activity, attack tactics, and techniques. I analyze cyber threats, process data, and help stay one step ahead of adversaries.","url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13315"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=13315"}],"version-history":[{"count":30,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13315\/revisions"}],"predecessor-version":[{"id":13365,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13315\/revisions\/13365"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/13363"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=13315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=13315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=13315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}