{"id":2839,"date":"2022-09-20T06:18:00","date_gmt":"2022-09-20T06:18:00","guid":{"rendered":"\/cybersecurity-blog\/?p=2839"},"modified":"2022-12-14T07:25:44","modified_gmt":"2022-12-14T07:25:44","slug":"how-we-discovered-prevented-a-recent-img-based-malware-attack","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/","title":{"rendered":"How We Discovered and Prevented an IMG-Based Malware Attack"},"content":{"rendered":"\n<p>Malicious actors always seek new techniques and methods to gain a foothold in networks. One of the tried-and-true methods, phishing, continues to be utilized as a primary method. Recently, my company has seen an uptick in phishing IMG-based attacks that contain attached <a href=\"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">malware<\/a>.&nbsp;<br><\/p>\n\n\n\n<p>However, instead of attacking a single person, the attackers have pivoted to sending emails to support shared mailboxes with targeted subjects based on the perceived use case. This has brought about some interesting new malware that left my team very intrigued by how it was able to evade initial detection by our EDR solution. Today, I&#8217;ll share how we discovered and prevented this attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">IMG-Based Malware Attack<\/h3>\n\n\n\n<p>The method of exploiting\/bypassing the IMG-based malware attacks is interesting. While using an IMG file, it could bypass some of the security mechanisms used for downloaded files like this <a href=\"https:\/\/any.run\/cybersecurity-blog\/mitre-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">MITRE ATT&amp;CK<\/a> technique:<a href=\"https:\/\/attack.mitre.org\/techniques\/T1553\/005\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> https:\/\/attack.mitre.org\/techniques\/T1553\/005\/<\/a>.&nbsp;<br><\/p>\n\n\n\n<p>Within about two weeks, we encountered two different versions of the same attack, one utilizing an approach that interacted with the user and a follow-up that could deploy silently.&nbsp;<br><\/p>\n\n\n\n<p>Additionally, the first phishing email that was a part of each of these attacks was able to bypass the O365 machine learning and <a href=\"https:\/\/any.run\/cybersecurity-blog\/retrospective-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">analysis<\/a>. However, multiple other attacks with identical payloads were <a href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">detected<\/a> and quarantined before getting to the end users\u2019 mailboxes.&nbsp;<br><\/p>\n\n\n\n<p>Before getting into some of the analysis, we, as a company, evaluated the need to allow users to send and receive ISO\/IMG files going forward. We expect this is a temporary fix, and the malicious actors will pivot to another approach.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Malware analysis use case&nbsp;<\/h3>\n\n\n\n<p>Here is the analysis and events that led to the detection and termination of the attack chain.<br><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>The first stage<\/strong><\/h4>\n\n\n\n<p>The initial download of the file was not detected as malicious, and it was able to place a zone.identifier ADS on the files, similar to the following:<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/RPI57-jfOzOgKsm9bI83yeRjUUCHcm4NjzwU-ltuB6w9j8bLsl5ork48I1Gnbtzr_ymc7iW7-g3wJginf3-GKISRjJCBGul0MVcQuOZv7Fur49Q7MD8fhh2mWhpMY3S-WSYmEhmynD1xyHhRzE18FiMnwif3G731CfbARpkyp-0Oqa5KQCKD3xFf5A\" alt=\"The initial download of the file\" width=\"887\" height=\"447\"\/><figcaption><em>The initial download of the file<\/em><\/figcaption><\/figure>\n\n\n\n<p>It was not until the user interacted with the document, a .pdf.img file, that an EDR alert was triggered based on behavioral actions taken with Powershell. The user was most likely unable to detect that this was an odd file due to a setting in their file explorer. Then they went to open what they thought was a supporting doc file to a case submitted via the shared mailbox.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/RzE2k6FqaTLloc93X4P4agFQprpCqkXWe5w6HyrT199YHGvQBGm1X-r_CPHP50Ikzkp2En6mwiAmsd7sfwPj_8MPmN0NA_gHhRO4QSNRHD9Rw_nQbwJjE6CGg365u5KPs91n-XBWTAthTjGJeQEmC_DbSIWqtXe0NUJ-JA5vUZgpKMoN57D3RpCCEg\" alt=\"Malicious supporting doc file\" width=\"935\" height=\"379\"\/><figcaption><em>Malicious supporting doc file<\/em><\/figcaption><\/figure>\n\n\n\n<p>If the user had configured their system to show file extensions, they might have noticed this was an iso image. However, since they missed this, users clicked to open and started the payload deployment to the system.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/rmV14JGcgF44eZ5xJ4GPb3XEIhdmLGDHwQbHKesIAAj351TxAj1bC_wkL_cPQ_84xUdb8wX-hKsv7mSYdAhWh98-e6EZBIGAgY2bknws4rpiiJ61V6UNd0UyGnJqML3btLyBbD4n-6UTSW1pL8U0GFqdz0Jj7AXP_sN3Q9-oofmKZoxthhXFDp2_gQ\" alt=\"Malicious supporting image file\" width=\"968\" height=\"423\"\/><figcaption><em>Malicious supporting image file<\/em><\/figcaption><\/figure>\n\n\n\n<p>At this step, the user was not paying attention to this strain of malware, as it did pop up a warning for them to accept the actions.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>The second stage&nbsp;<\/strong><\/h4>\n\n\n\n<p>A few days later, the second train of malware came through that was able to bypass this pop-up. In this attack, with the same initial config as the first, the ADS was not written to the files contained in the IMG\/ISO containers, allowing them to execute without running. And because the EDR solution did not detect these files, the malware execution downloaded the IMG\/ISO containing the malicious files and mounted them without being detected.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/xe4Vz6qepLr3z2z33ONwpAWZy7pu8XSMHoso93ToE425o5GSyIFjptDifUlShbIpbzE0gPMjhDWOVi7XlSF3VI1k1jAeb7UoJW2HfQERB0vyKVobcR8IIJhN2x5IGDKilSe3mt6-6LCOvX6teS345JM5QNihjNQnTSs62wnp4oURsK94t71OROCbZw\" alt=\"Initial malware popup\n\"\/><figcaption><em>Initial malware popup<\/em><br><\/figcaption><\/figure>\n\n\n\n<p>What was ultimately detected by the EDR was a Powershell command that called out to a website for additional files. In this case, the malicious command reversed the address to attempt to bypass search and detect mechanisms. Because this was not a standard action (running Powershell) for this user, the EDR managed to identify and stop the attack at this point in the chain.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/qd35r-PCRjDO4zfbCyLtplQBFXt4gDcPsyw9EGY1g4pdEiQrYd9HbjT_5oW8g3l3DE49fJcWRjjTiFCBekjmPoNUj6wGq08CZK7DhqtreJPSTnw3UNKOALV3EgYyKsrm_KFywrm2CkZjeCMBT4gGKAeKD7Xdp1ygSl9B69ZYhiKrmkeF8k-HTTD4FQ\" alt=\" The sample\u2019s malicious command\n\"\/><figcaption><em>&nbsp;The sample\u2019s malicious command<\/em><br><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Similar samples in ANY.RUN&nbsp;&nbsp;<\/h3>\n\n\n\n<p>I found tasks with similar behavior in <a href=\"https:\/\/app.any.run\/submissions?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=img_based_malware_attack\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Public Submissions<\/a> of <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=img_based_malware_attack\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN service<\/a>. Going through such tasks gives additional ability to re-run tasks and take a closer look at how malware behaves in infected systems. I watched execution flow, file creation, and registry changes to determine what new rules may be created for our EDR system.<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/ncVqsaLrjpImqU8_e1wEJ3kokPQgNWApT5hymDyKLf9CUEasNjeQR8ozcnix0qj1t84rb72RdQYveEqa0O-ljNFhbwAIykVawiXf3FUwQTn74HuNGbRXOwWin1Wmk6zt7cH27qBn5kxhjAhEpDnCTz7w8aOeA1971uYhm7BTmyJnIZxpGzpShsLNEw\" alt=\"Sample\u2019s process tree \" width=\"890\" height=\"830\"\/><figcaption><em>Sample\u2019s process tree&nbsp;<\/em><\/figcaption><\/figure>\n\n\n\n<p>Check the <a href=\"https:\/\/app.any.run\/tasks\/ad5c2629-abd1-4cb6-8e44-576b1c2fae26\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=img_based_malware_attack\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">sample<\/a> and try to analyze it by yourself! <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malicious actors always seek new techniques and methods to gain a foothold in networks. One of the tried-and-true methods, phishing, continues to be utilized as a primary method. Recently, my company has seen an uptick in phishing IMG-based attacks that contain attached malware.&nbsp; However, instead of attacking a single person, the attackers have pivoted to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2971,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[34,63],"class_list":["post-2839","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-malware-analysis","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Discovered and Prevented IMG-Based Malware Attack<\/title>\n<meta name=\"description\" content=\"ANY.RUN&#039;s guest author has seen an uptick in phishing IMG-based attacks that contain attached malware. Here is how he discovered and prevented it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nathaniel Cole\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/\"},\"author\":{\"name\":\"Nathaniel Cole\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"How We Discovered and Prevented an IMG-Based Malware Attack\",\"datePublished\":\"2022-09-20T06:18:00+00:00\",\"dateModified\":\"2022-12-14T07:25:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/\"},\"wordCount\":710,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"malware analysis\",\"phishing\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/\",\"name\":\"Discovered and Prevented IMG-Based Malware Attack\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-09-20T06:18:00+00:00\",\"dateModified\":\"2022-12-14T07:25:44+00:00\",\"description\":\"ANY.RUN's guest author has seen an uptick in phishing IMG-based attacks that contain attached malware. Here is how he discovered and prevented it.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malicious History\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/history\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How We Discovered and Prevented an IMG-Based Malware Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Nathaniel Cole\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/nathaniel-cole.jpeg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/nathaniel-cole.jpeg\",\"caption\":\"Nathaniel Cole\"},\"description\":\"Nathaniel Cole is a Chief Information Security Officer with 15 years of experience building &amp; running modern security programs. He writes a cybersecurity advice column for business leaders at NetworkAssured.com\",\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Discovered and Prevented IMG-Based Malware Attack","description":"ANY.RUN's guest author has seen an uptick in phishing IMG-based attacks that contain attached malware. Here is how he discovered and prevented it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/","twitter_misc":{"Written by":"Nathaniel Cole","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/"},"author":{"name":"Nathaniel Cole","@id":"https:\/\/any.run\/"},"headline":"How We Discovered and Prevented an IMG-Based Malware Attack","datePublished":"2022-09-20T06:18:00+00:00","dateModified":"2022-12-14T07:25:44+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/"},"wordCount":710,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["malware analysis","phishing"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/","url":"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/","name":"Discovered and Prevented IMG-Based Malware Attack","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-09-20T06:18:00+00:00","dateModified":"2022-12-14T07:25:44+00:00","description":"ANY.RUN's guest author has seen an uptick in phishing IMG-based attacks that contain attached malware. Here is how he discovered and prevented it.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/how-we-discovered-prevented-a-recent-img-based-malware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malicious History","item":"https:\/\/any.run\/cybersecurity-blog\/category\/history\/"},{"@type":"ListItem","position":3,"name":"How We Discovered and Prevented an IMG-Based Malware Attack"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Nathaniel Cole","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/nathaniel-cole.jpeg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2022\/10\/nathaniel-cole.jpeg","caption":"Nathaniel Cole"},"description":"Nathaniel Cole is a Chief Information Security Officer with 15 years of experience building &amp; running modern security programs. He writes a cybersecurity advice column for business leaders at NetworkAssured.com","url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2839"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=2839"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2839\/revisions"}],"predecessor-version":[{"id":2972,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/2839\/revisions\/2972"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/2971"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=2839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=2839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=2839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}