{"id":4086,"date":"2022-12-13T05:50:08","date_gmt":"2022-12-13T05:50:08","guid":{"rendered":"\/cybersecurity-blog\/?p=3326"},"modified":"2022-12-21T06:40:50","modified_gmt":"2022-12-21T06:40:50","slug":"the-end-of-sodinokibi-ransomware","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/","title":{"rendered":"The End of Sodinokibi: the\u00a0Infamous Ransomware Goes Down"},"content":{"rendered":"\n<p>Sodinokibi was, perhaps, the most ill-renowned ransomware. While it was active, it netted crooks hundreds of millions of dollars, hitting prominent targets such as Apple, Acer, Donald Trump\u2019s lawyers, and most recently, HX5, a US defense company.<br><\/p>\n\n\n\n<p>It took a law enforcement operation coordinated between 17 countries to bring it down. Through the joint efforts of the FBI, INTERPOL, and Europol, crucial C2 servers were shut down, countless backups of the ransomware scuffed, millions of extortion payments seized, and the gang\u2019s infrastructure totally destroyed.<br><\/p>\n\n\n\n<p>But let&#8217;s track back a few steps and see how the story unfolded.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A quick Sodinokibi Ransomware review<\/h2>\n\n\n\n<p>Like all ransomware, <a href=\"https:\/\/any.run\/malware-trends\/sodinokibi?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=sodinokibi&amp;utm_content=mtt_sodinokibi\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Sodinokibi<\/a> (also known as REvil or Sodin) encrypted files on infected hosts and displayed a ransom note, directing the victims to make a cryptocurrency payment in exchange for corrupted data. Delaying the payment increased the cost.&nbsp;<br><\/p>\n\n\n\n<p>Sodinokibi, though, was somewhat unique because of its Ransomware-as-a-Service model (RaaS): the core developers, the ones controlling the source code, \u2018rented out\u2019 the program to lower-level criminals called affiliates, who actually performed attacks.&nbsp;<br><\/p>\n\n\n\n<p>Affiliates agreed to share 40% of profits with the core gang to access the ransomware itself and tech support. Funny enough, many of them were also cheated because of a backdoor left in several versions of REvil.&nbsp;<br><\/p>\n\n\n\n<p>The ransomware is believed to have originated in the former Soviet Union, and like many families from that region, REvil did not target companies in the former Soviet-bloc. The researchers also found many similarities with the DarkSide ransomware in its source code and ransom note composition. This may indicate that the two crews are connected in some way or that both strains were operated by the same crew.<br><\/p>\n\n\n\n<p>Analysts note that Sodinokibi\u2019s code was skilfully written: this malware was characterized by rapid execution and encryption, leaving little chance for victims to respond to attacks.<br><\/p>\n\n\n\n<p>The distribution channels of Sodinokibi were as varied as its affiliates: spam phishing, spear phishing, and APTs.&nbsp;<br><\/p>\n\n\n\n<p>But it was the targeted attacks and excessively large demands that first drew attention to this&nbsp;ransomware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">High-profile Sodinokibi hacks<\/h2>\n\n\n\n<p>Sodinokibi activity began shortly after <a href=\"https:\/\/any.run\/malware-trends\/gandcrab?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=sodinokibi&amp;utm_content=mtt_gandcrab\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">GandCrab<\/a> disappeared from the wild. The attackers wasted no time in staging a series of major hacks that occurred in quick succession:<br><\/p>\n\n\n\n<p><strong>May 2020<\/strong>. The group behind Sodikokibi hacks Grubman Shire Meiselas &amp; Sacks, a law firm representing Donald Trump. They demand $42 million in ransom before bragging about it in a press interview and, allegedly, selling the data.<br><\/p>\n\n\n\n<p><strong>March 2021<\/strong>. The ransomware breaches Acer, encrypts an undisclosed amount of files, and the gang puts out a $50 million request which grows to $100 million if not paid in time.<br><\/p>\n\n\n\n<p><strong>May 2021<\/strong>. An attack hits JBS S.A., the largest meat processor in the world, its plants in the US are all shutdown, and the company pays $11 million.<br><\/p>\n\n\n\n<p><strong>July 2021<\/strong>. The breach of Kaseya cripples hundreds of managed service providers. One store chain in Sweden temporarily closes 800 locations. The extortion amount starts at $70 million.&nbsp;<br><\/p>\n\n\n\n<p><strong>July 2021.<\/strong> A US-based weapon developer HX5 gets breached, and the gang steals and leaks sensitive documents.<br><\/p>\n\n\n\n<p>Besides all of that, Sodinokibi was used in countless smaller attacks and wide-hitting phishing campaigns carried out by less prominent affiliates. All and all, the whole operation has generated around $200 million, 10% of what the REvil gang had publicly declared they would steal.&nbsp;<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The downfall of Sodinokibi<\/h2>\n\n\n\n<p>In the end, the sheer audacity of these hacks attracted the closest attention of law enforcement. During Operation GoldDust, 17 countries coordinated their efforts to find and capture the criminals behind Sodinokibi. They arrested 7 suspects responsible for 5,000 attacks.<br><\/p>\n\n\n\n<p>In fall of 2021, C2 locations associated with REvil began to go dark after the US found out the whereabouts of several gang members. In October 2201, Yaroslav Vasinskyi \u2014 one of the most active Sodinokibi affiliates&nbsp; \u2014 was <a href=\"https:\/\/techcrunch.com\/2022\/03\/10\/revil-hacker-kaseya-arrested\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">arrested<\/a> in Poland while trying to flee, and extradited to the US. He is responsible for the Kaseya hack, and many more, and faces up to 115 years in prison if found guilty on all counts.<br><\/p>\n\n\n\n<p>That same month, the FBI, the Secret Service, and several other law enforcement agencies launched a wave of counter-hacks that breached Sodinokibi servers right back and destroyed the remaining infrastructure. From that moment on, REvil members were practically paralyzed.&nbsp;<br><\/p>\n\n\n\n<p>Finally, in January 2022, multiple Sodinokibi members were <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.bbc.com\/news\/technology-59998925\" target=\"_blank\">arrested<\/a> and the gang had &#8220;ceased&nbsp;to&nbsp;exist.\u2019\u2019<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Recognizing REvil ransomware with ANY.RUN<\/h2>\n\n\n\n<p>Ransomware attacks, in general, are extremely hard to mitigate \u2014 once the malware is downloaded, it executes quickly and locks you out or encrypts your files. Unless a public decryptor is available for that exact strain and version \u2014 which it usually isn\u2019t \u2014&nbsp; there is nothing you can do. Sometimes, even backups get corrupted as the program propagates laterally and roots itself deep in your network.<br><\/p>\n\n\n\n<p>So the strategy is to avoid getting infected in the first place.<br><\/p>\n\n\n\n<p>And one great way to do that is with <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=sodinokibi&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ANY.RUN online malware sandbox (opens in a new tab)\">ANY.RUN online malware sandbox<\/a>. It uses Suricata rulesets to identify malicious programs \u2014 even those that successfully evade detection by various AV software. The service can scan both files and links for signs of malicious activity. And analysis results are available in less than 2 minutes, with MITRE ATT&amp;CK and IOC indicators displayed on a visual process graph.<br><\/p>\n\n\n\n<p>For a while, Sodinokibi could be detected using the changes it made in the registry. It wrote keys such as HKEY_CURRENT_USER\\SOFTWARE\\RECFG with the name PK_KEY and others. Also, it created a ransom note with a consistent copy.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/XAc2NJnXvxc-oR3gtx5qu5GEwNdrNmjakUaqtinybTZLf9f-MKx850QXtSPWRnrT72_aJyCBfUjq0X5nzfhuHWxBhcBqFaIwZ1z1bgNGb85GjIVhfco_pTW5BB5zXSMe6EyIN4ViqVfKF_8HY0tA5pgJGh5qPbfMyzorqimsbQzLUzCKESq3PIdit0ZiQw\" alt=\"Sodinokibi sample in ANY.RUN\"\/><\/figure>\n\n\n\n<p>Interestingly, malware authors created a <a href=\"https:\/\/app.any.run\/tasks\/22e6d6e5-f5e3-473a-8599-620e3643c9e2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=sodinokibi&amp;utm_content=task\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Sodinokibi sample<\/a> with a polished website available at the domain decryptor[.]top, where victims could decrypt three images for free. A trial of sorts. Also, the website provided a countdown (\u201cafter the time runs out, the ransom amount will be set to 5 000 dollars\u201d), payment instructions in bitcoins, as well as information about the decryption process. If decryptor[.[top wasn\u2019t available, the victims could visit its [.]onion clone through the Tor web browser.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>This story teaches us 3 things:&nbsp;<br><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>We can say good riddance to one of the most prominent players in the ransomware arena.&nbsp;<\/li><li>Law enforcement must learn how to come up with better codenames than GoldDust.&nbsp;<\/li><li>None of that work would have been needed if all those companies used ANY.RUN malware sandbox which detects REvil just fine.<\/li><\/ol>\n\n\n\n<p>Jokes aside, taking down Sodinokibi was a huge win in the war against ransomware. It was an enormous effort requiring unprecedented coordination between countries, and it paid off, this time at least. But squashing cyberthreats is a bit like playing Whac-A-Mole: bop one on the head, and another is already poking out somewhere else.<br><\/p>\n\n\n\n<p>The dismantlement of REvil left a void in the market, which other, more low-key ransomware crews are already filling in \u2014 like Donut, which is definitely worth keeping an eye on.<br><\/p>\n\n\n\n<p>If you want to read more stories like this, check out our recount of the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/rise-and-fall-of-emotet\/\" target=\"_blank\">rise and fall of Emotet<\/a>, the omnipresent trojan of 2019 and 2020. Or read about the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-history-mydoom\/\" target=\"_blank\">history of MyDoom<\/a>, the most damaging computer worm of its time that \u2014 excuse the terrible pun \u2014 doomed countless computers in&nbsp;the&nbsp;aughts.<br><\/p>\n\n\n\n<p>And, as always, stay vigilant online and check your files with <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=sodinokibi&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ANY.RUN (opens in a new tab)\">ANY.RUN<\/a>.&nbsp;<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Questions and answers (Q&amp;A)&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>What is Sodinokibi?<\/strong><\/li><\/ul>\n\n\n\n<p>Sodinokibi is ransomware \u2014 a type of computer virus that works by encrypting files on infected systems and giving an option to restore them, if a payment is made.<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Who is behind Sodinokibi?<\/strong><\/li><\/ul>\n\n\n\n<p>Sodinokibi was developed by a crew of russian speaking hackers, known as the REvil gang. Many believe that they are the same people who previously ran \u2014 or were a part of \u2014 the infamous GandCrab group.<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>How to remove Sodinokibi ransomware?<\/strong><\/li><\/ul>\n\n\n\n<p>Removal of any ransomware, including Sodinokibi, is a difficult process. You must first identify&nbsp; the infected components, then isolate and either delete them, or replace them from a trusted backup.&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sodinokibi was, perhaps, the most ill-renowned ransomware. While it was active, it netted crooks hundreds of millions of dollars, hitting prominent targets such as Apple, Acer, Donald Trump\u2019s lawyers, and most recently, HX5, a US defense company. It took a law enforcement operation coordinated between 17 countries to bring it down. Through the joint efforts [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4104,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[29,15],"class_list":["post-4086","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-history","tag-historical-malware","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The End of Sodinokibi: the\u00a0Infamous Ransomware Goes Down - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"The dismantlement of the Sodinokibi ransomware gang probably was this year\u2019s biggest win in the war against malware. Read how it happened here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"The End of Sodinokibi: the\u00a0Infamous Ransomware Goes Down\",\"datePublished\":\"2022-12-13T05:50:08+00:00\",\"dateModified\":\"2022-12-21T06:40:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/\"},\"wordCount\":1326,\"commentCount\":6,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"historical malware\",\"malware\"],\"articleSection\":[\"Malicious History\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/\",\"name\":\"The End of Sodinokibi: the\u00a0Infamous Ransomware Goes Down - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-12-13T05:50:08+00:00\",\"dateModified\":\"2022-12-21T06:40:50+00:00\",\"description\":\"The dismantlement of the Sodinokibi ransomware gang probably was this year\u2019s biggest win in the war against malware. Read how it happened here.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malicious History\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/history\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The End of Sodinokibi: the\u00a0Infamous Ransomware Goes Down\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The End of Sodinokibi: the\u00a0Infamous Ransomware Goes Down - ANY.RUN&#039;s Cybersecurity Blog","description":"The dismantlement of the Sodinokibi ransomware gang probably was this year\u2019s biggest win in the war against malware. Read how it happened here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"The End of Sodinokibi: the\u00a0Infamous Ransomware Goes Down","datePublished":"2022-12-13T05:50:08+00:00","dateModified":"2022-12-21T06:40:50+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/"},"wordCount":1326,"commentCount":6,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["historical malware","malware"],"articleSection":["Malicious History"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/","url":"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/","name":"The End of Sodinokibi: the\u00a0Infamous Ransomware Goes Down - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-12-13T05:50:08+00:00","dateModified":"2022-12-21T06:40:50+00:00","description":"The dismantlement of the Sodinokibi ransomware gang probably was this year\u2019s biggest win in the war against malware. Read how it happened here.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malicious History","item":"https:\/\/any.run\/cybersecurity-blog\/category\/history\/"},{"@type":"ListItem","position":3,"name":"The End of Sodinokibi: the\u00a0Infamous Ransomware Goes Down"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4086"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4086"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4086\/revisions"}],"predecessor-version":[{"id":4106,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4086\/revisions\/4106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4104"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}