{"id":2534,"date":"2022-07-12T05:28:55","date_gmt":"2022-07-12T05:28:55","guid":{"rendered":"\/cybersecurity-blog\/?p=2534"},"modified":"2024-07-24T08:07:33","modified_gmt":"2024-07-24T08:07:33","slug":"expert-qa-nao-sec-follina","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/","title":{"rendered":"Expert Q&#038;A: nao_sec Follina Zero-day Vulnerability"},"content":{"rendered":"\n<p>First of all, thank you for joining our expert Q&amp;A. You are one of the mystical research groups out there. And we are very excited to have you in ANY.RUN Blog.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Could you tell us more about the group? What is nao_sec? We guess that Sec is for security, but what about Nao? What does it stand for?&nbsp;<\/h4>\n\n\n\n<p><strong>nao_sec:<\/strong> <a href=\"https:\/\/nao-sec.org\/\">nao_sec <\/a>is a combination of&nbsp; \u201cNao Tomori\u201d and \u201cSecurity.\u201d Our roots are in a CTF team called \u201cTeam TomoriNao,\u201d which was composed of members who loved the heroine of the Japanese anime \u201cCharlotte,\u201d \u201cNao Tomori.\u201d Team TomoriNao is no longer active, but nao_sec is a branch of Team TomoriNao.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>nao_sec consists of 4 specialists: two researchers, an analyst, and a developer. How was your team created? And why do you \u0441all yourself, independent group?<\/strong><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>Initially, nao_sec was a Twitter account created by kkrnt to pass the time during university spring vacation. His university research topic was countermeasures against Drive-by Download attacks, and he used it to gather and disseminate threat information. Later, his friends began to support his activities and joined the team. nao_sec was a hobby for students.<br><\/p>\n\n\n\n<p>Today, all of us work for our respective companies, but nao_sec&#8217;s activities are still independent from them. By keeping our distance from all companies, we are free to do what we do.<br><\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-left is-style-default is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Being free is the highest priority for us.<\/strong><\/p>\n<cite><em>Chief Researcher of nao_sec<\/em><\/cite><\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>You are famous for detecting new malware cases. How do you look for them? And what samples do you find interesting?<\/strong><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>Our area of interest is not wide. We focus on targeted attacks in East Asia and web-based malware-related attacks. And we love the brand new. We spend a lot of time on interesting discoveries. We especially like <a href=\"https:\/\/app.any.run\/submissions?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expert_qa_nao_sec\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Public Submissions<\/a> on ANY.RUN. We use various search filters to narrow down what is of interest to us.<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Sometimes malware discoveries seem like a race. But mostly, you finish the first. How do you manage to detect anomalies first? How is it for you to be always the first one?<\/strong><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>For us, finding interesting samples is random. We visually check about 100 samples a day, and sometimes we don&#8217;t find anything for months. Still, we like the process.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>How much data do you look through until you get something significant? ANY.RUN also has a large database of samples.&nbsp;<\/strong><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>We use several services but spend the most time with <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expert_qa_nao_sec\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a>. We have been using ANY.RUN since the beta-test in 2017.<br><\/p>\n\n\n\n<p>The sandbox has a large amount of data that doesn&#8217;t exist in other services. That includes the samples themselves and, most importantly, all the data when it works. We are always grateful for the great data on the service.&nbsp;<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>How ANY.RUN sandbox can help to detect new malware samples?&nbsp;<\/strong><br><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>No other sandbox offers interactive operations with a sophisticated UI\/UX like<a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=expert_qa_nao_sec\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> ANY.RUN<\/a>. It also has a variety of features. For example, it has the feature to identify malware families and extract config. Also important are the detection results of good rules such as ET Pro.<br><\/p>\n\n\n\n<p>Additionally, the automatic tagging is excellent. We use these features to determine if it is known or unknown. It is very important that we don&#8217;t have to reanalyze what is known.<br><\/p>\n\n\n\n<p><strong>On May 27th, 2022, nao_sec identified a suspicious Word document uploaded from a Belarus IP address. It turned out to be &#8220;Follina,&#8221; a new zero-day vulnerability in Microsoft Office. And neither Microsoft nor any antivirus programs were aware of this exploit.<\/strong><br><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">&quot;VIP Invitation to Doha Expo 2023.rar&quot; -&gt; CVE-2022-30190 -&gt; (WebDAV) -&gt; CobaltStrike<a href=\"https:\/\/t.co\/kPdvmN8KmQ\">https:\/\/t.co\/kPdvmN8KmQ<\/a><\/p>&mdash; nao_sec (@nao_sec) <a href=\"https:\/\/twitter.com\/nao_sec\/status\/1532040742381789184?ref_src=twsrc%5Etfw\">June 1, 2022<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>How did you discover Follina <\/strong>CVE-2022-30190<strong>? And what is special about this new zero-day vulnerability?<\/strong><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>As mentioned above, we prefer targeted attacks and web-based attacks. Among them, we especially like attacks that exploit vulnerabilities in web browsers, such as the Drive-by Download attack.<br><\/p>\n\n\n\n<p>Recently, CVE-2021-40444 has become popular. We were actively collecting samples that exploited CVE-2021-40444. The one that caught on was a sample that exploits Follina.<br><\/p>\n\n\n\n<p>The sample loaded a web page by Microsoft Word in a similar way as the sample that exploited CVE-2021-40444, but it used the ms-msdt scheme to execute PowerShell. For us, the technique was unknown.<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>How long does Follina zero-day vulnerability<\/strong> <strong>exist? When did you notice the first tracks of its exploitation?&nbsp;<\/strong><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>As of 2020, a paper on the ms-msdt scheme was published, but we didn\u2019t know about it. As far as we know, the earliest sample of a Follina exploit is from early April 2022; there are older test samples on VirusTotal, but the actual exploit code (HTML\/PowerShell) can be seen in early April 2022. We found out about Follina on May 27, 2022. In fact, we had found a related sample in mid-April, but the web server was not responding at that time, and we could not observe the actual attack code.<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Do any APT groups use the vulnerability now? Or to deliver malware? Can you say what malware family is delivered more often?&nbsp;<\/strong><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>APT groups associated with China and Russia are exploiting Follina. We are observing a variety of malware, most notably CobaltStrike.<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Do you think that Follina <\/strong>CVE-2022-30190 <strong>is the next Stuxnet?&nbsp; What effect will it have on the future of cybersecurity?&nbsp;<\/strong><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>Follina reminded us of the breadth of attack directions in Windows. It is not enough for us to only focus on macros. There will be more unexpected attacks like Follina. We must be flexible and cautious.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Are you working on a new project now?<\/strong><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>Yes, we have several projects underway. Some of them are threat research and analysis projects, and some are development projects.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cybersecurity is a dynamic sphere: new malicious programs, techniques, and tools. <\/strong><strong>Could you share your thoughts on the current state of cybersecurity?<\/strong><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>We believe it is important to always remember to update recognition for cybersecurity. Attackers are constantly trying to get behind our assumptions. In order to nullify their tearful efforts, we must approach cyber security with more integrity and doggedness than they do.<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Are there any cybersecurity trends that you observe right now?&nbsp;<\/strong><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>Whether state-sponsored or crime, attackers are refining the division of labor between automatic and manual. The flexibility of human-led attacks is the most feared threat.<br><\/p>\n\n\n\n<p>In terms of attack origins, we are seeing more attacks originating from vulnerabilities and misconfigurations of external assets such as VPNs and RDPs than from malware origins.<br><\/p>\n\n\n\n<p>Also, threat actors these days are much more likely to use commercial penetration tools and share Exploit and malware. This makes analysis more difficult.<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>And for the final question \u2013&nbsp;what is cybersecurity for you?&nbsp;&nbsp;<\/strong><\/h4>\n\n\n\n<p><strong>nao_sec: <\/strong>It has only been about five years since we first stepped into the world of cybersecurity. But even in these five years, the world has constantly been moving, and threats that we could not have imagined five years ago are continually emerging. It inspires us more than anything else. Cybersecurity is something that drives us crazy.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Thank you for spending time answering our questions and for the work that you are doing. Good luck with finding new threats so that we can fight them together!&nbsp;&nbsp;<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>First of all, thank you for joining our expert Q&amp;A. You are one of the mystical research groups out there. And we are very excited to have you in ANY.RUN Blog.&nbsp; Could you tell us more about the group? What is nao_sec? We guess that Sec is for security, but what about Nao? What does [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8316,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[67],"tags":[10,34],"class_list":["post-2534","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interviews","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Expert Q&amp;A:nao_sec about Follina - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"nao_sec shares with ANY.RUN how they discovered Follina, new malware cases, and cybersecurity trends. Check out the interview in our blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Expert Q&#038;A: nao_sec Follina Zero-day Vulnerability\",\"datePublished\":\"2022-07-12T05:28:55+00:00\",\"dateModified\":\"2024-07-24T08:07:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/\"},\"wordCount\":1234,\"commentCount\":6,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"Interviews\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/\",\"name\":\"Expert Q&A:nao_sec about Follina - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-07-12T05:28:55+00:00\",\"dateModified\":\"2024-07-24T08:07:33+00:00\",\"description\":\"nao_sec shares with ANY.RUN how they discovered Follina, new malware cases, and cybersecurity trends. Check out the interview in our blog.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interviews\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/interviews\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Expert Q&#038;A: nao_sec Follina Zero-day Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Expert Q&A:nao_sec about Follina - ANY.RUN&#039;s Cybersecurity Blog","description":"nao_sec shares with ANY.RUN how they discovered Follina, new malware cases, and cybersecurity trends. Check out the interview in our blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Expert Q&#038;A: nao_sec Follina Zero-day Vulnerability","datePublished":"2022-07-12T05:28:55+00:00","dateModified":"2024-07-24T08:07:33+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/"},"wordCount":1234,"commentCount":6,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity","malware analysis"],"articleSection":["Interviews"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/","url":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/","name":"Expert Q&A:nao_sec about Follina - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-07-12T05:28:55+00:00","dateModified":"2024-07-24T08:07:33+00:00","description":"nao_sec shares with ANY.RUN how they discovered Follina, new malware cases, and cybersecurity trends. Check out the interview in our blog.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/expert-qa-nao-sec-follina\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Interviews","item":"https:\/\/any.run\/cybersecurity-blog\/category\/interviews\/"},{"@type":"ListItem","position":3,"name":"Expert Q&#038;A: nao_sec Follina Zero-day Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2534"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=2534"}],"version-history":[{"count":2,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2534\/revisions"}],"predecessor-version":[{"id":8318,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2534\/revisions\/8318"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/8316"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=2534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=2534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=2534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}