{"id":4194,"date":"2023-01-17T07:47:38","date_gmt":"2023-01-17T07:47:38","guid":{"rendered":"\/cybersecurity-blog\/?p=4194"},"modified":"2023-01-17T11:04:09","modified_gmt":"2023-01-17T11:04:09","slug":"wannacry-ransomware","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/","title":{"rendered":"WannaCry: The Most Preventable Ransomware is Still at Large"},"content":{"rendered":"\n<p>The WannaCry attack of 2017 is the perfect example of why you should always install security updates as soon as they\u2019re released. This was, probably, the most avoidable ransomware incident. And, at the same time, one of the most damaging and rapidly spreading malware outbreaks.<\/p>\n\n\n\n<p>This is the story of the WannaCry ransomware: a story involving North Korean hackers, unpatched Windows PCs and, oddly enough, American spies. Well, sort of.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is WannaCry ransomware?<\/h2>\n\n\n\n<p><a rel=\"noreferrer noopener\" aria-label=\"WannaCry (opens in a new tab)\" href=\"https:\/\/any.run\/malware-trends\/wannacry\" target=\"_blank\">WannaCry<\/a> and this is a mouthful, is a network cryptoworm ransomware.<\/p>\n\n\n\n<p>Unlike most ransomware that spread through malicious email attachments, WannaCry has a&nbsp;worm component that exploits a Server Message Block (SMB) protocol implementation in older versions of Windows.&nbsp;<\/p>\n\n\n\n<p>SMB is a protocol that essentially allows multiple nodes to talk to each other over a network. Because of its flawed design, hackers were able to execute arbitrary code and the malware could self-propagate, spreading at incredible speeds. Once it infected one machine, its transmission rate grew almost exponentially.&nbsp;<\/p>\n\n\n\n<p>Unlike most worms that don\u2019t have ransomware functionality, WannaCry, has a module that encrypts files. After corrupting the data it directs victims to a website which explains how to make a bitcoin payment to restore the lost information.<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/Y-nJBp4wJm29tlPB596yR2WKB2AvJTcQZnH4MO6GIxgImO9gHJcUisFcxXaLyyQfsQoDVa1ocZb4_UENyHY-HLi5pYbIjZYtg9MXT36Qzk80sbOUA_5Sw9LsMV5Aou2abOGPRmyjPSZycyZ_n8nScOHcP7vXmJqpPLz5fgDzD5U88t1vLYDuMQziHdss6A\" alt=\"\"\/><\/figure>\n\n\n\n<p>Some people paid and still didn\u2019t get data back, though, which is a reminder that it\u2019s never a good idea to give in to the demands of cybercriminals.<\/p>\n\n\n\n<p>In the case of WannaCry, the ransom amount was $300, but delaying the payment increased it to $600. This is a surprisingly small demand for cyber gangs that focus on extortion.<\/p>\n\n\n\n<p>Most ransomware hacks are highly targeted, take a lot of preparation and attempt to score big. The Sobikonibi gang is a perfect example: they chose targets carefully, hit hard, and then demanded tens of millions of dollars.&nbsp;<\/p>\n\n\n\n<p>But WannaCry striked wide instead, banking on the sheer number of infections. And indeed, the infection rate of the initial attack in 2017 was astronomical.<\/p>\n\n\n\n<p>In fact, it would have been even greater if not for a shortsighted implementation of an anti-evasion technique: before executing, WannCry would query a hardcoded domain, which did not exist:&nbsp;<\/p>\n\n\n\n<p>iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com.<br><\/p>\n\n\n\n<p>Day after the attack Marcus Hutchins, a security researcher, discovered this function and registered that domain. This killswitch didn\u2019t stop the attack completely, but greatly blunted the rate at which it was spreading.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The timeline of 2017 WannaCry ransomware attack<\/h2>\n\n\n\n<p>The WannaCry outbreak played out incredibly quickly. And although it was swiftly stopped, it still delivered insane damage. Here\u2019s how it all unfolded:<br><\/p>\n\n\n\n<p><strong>May 12, 2017<\/strong><br>The first signs of WannaCry appeared in Asia at about 07:00 UTC. The initial infection, which used an exposed SMB port, began spreading like wildfire. Within a day over 200,000 computers in 150 countries were wrecked by the ransomware.<br><\/p>\n\n\n\n<p><strong>May 13, 2017<\/strong><br>Microsoft re-released an out-of-band security update for Windows XP, Windows 8 and Windows Server 2003. At the same time, Researcher Marcus Hutchins reverse-engineered the ransomware and registered a killswitch domain.&nbsp;<br><\/p>\n\n\n\n<p><strong>May 14, 2017<\/strong><br>The second variant of WannaCry was released into the wild, querying a different domain. A researcher named Matt Suiche registered the new kill-switch, promptly stopping its transmission.<br><\/p>\n\n\n\n<p><strong>May 19, 2017<\/strong><br>Hackers attempted to DDoS the killswitch domains using a Mirai botnet variant. When that failed, they began working on a new version of WannaCry without a killswitch.&nbsp;<br><\/p>\n\n\n\n<p><strong>May 22&nbsp; 2017<\/strong><br>Hutchins improved the DDoS resistance of his killswitch website. Independently, researchers from&nbsp; University College London and Boston University shared that they had a way to recover the encryption keys.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Shortly after that, the decryption on Windows PCs was automated with a tool called WannaKey. This was pretty much the last nail in the WannaCry\u2019s coffin. All combined together, these measures had cut off the flow of infections. But when the dust settled, the damages were still measured in billions.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What made the WannaCry ransomware attack possible?<\/h2>\n\n\n\n<p>This is where the story really takes a surreal turn. Although this is not proved definitively, the EternalBlue exploit behind the WannaCry outbreak was allegedly discovered by the NSA, the US National Security Agency.&nbsp;<br><\/p>\n\n\n\n<p>But instead of reporting the vulnerability to Microsoft, the NSA went on to develop it for their own offensive use. (The NSA\u2019s involvement in global surveillance is, obviously, a myth.)&nbsp;<br><\/p>\n\n\n\n<p>The NSA itself was then hacked by a group called The Shadow Brokers, who leaked the exploit into the wild. After that, it was picked up by North Korean hackers who developed WannaCry. Some say the attack was ordered by the North Korean government, but other researchers blame a private gang called the Lazarus Group.<br><\/p>\n\n\n\n<p>However, the whole story could have been avoided altogether. Microsoft discovered the flaw in their SMB implementation independently, and on March 14, 2017 released updates for all operating systems that were supported at the time. These warnings were issued a month before the attack, and the security update was flagged as critical.<br><\/p>\n\n\n\n<p>But despite Microsoft&#8217;s alarm, many organizations were slow to install the patch. Among them were such big names as Honda, Renault, Boeing and FedEx, who all fell victim to WannaCry.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is WannaCry ransomware still a threat?<\/h2>\n\n\n\n<p>Unfortunately, yes. Researchers from CheckPoint <a href=\"https:\/\/blog.checkpoint.com\/2021\/03\/30\/unfair-exchange-ransomware-attacks-surge-globally-amid-microsoft-exchange-server-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">warned<\/a> in 2021 that WannaCry-related incidents were inexplicably on the rise. The information came some four years after Hutchins released the first killwith. Because the ransomware exploits a vulnerability in older versions of Windows, this may indicate that many organizations have not yet installed a patch. The risk of infection is highest in hospitals, where some models of medical equipment rely on older Windows operating systems with no way to update them.<br><\/p>\n\n\n\n<p>But while some businesses are stuck with legacy software out of necessity, others put off updating because it is costly and inconvenient.<br><\/p>\n\n\n\n<p>Installing a patch can be a laborious process that causes a long outage. In some cases, systems even need to be rebuilt from scratch when moving to a new generation of OS. This is why, while there is a remedy for WannaCry, it will take a long time before it is completely eradicated.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Checking for ransomware with ANY.RUN<\/h2>\n\n\n\n<p>With <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=wannacry&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"ANY.RUN online malware sandbox  (opens in a new tab)\">ANY.RUN online malware sandbox <\/a>organizations and independent researchers can find ransomware in suspicious files or links.&nbsp;<br><\/p>\n\n\n\n<p>Interact with Wannacry ransom note and so called &#8220;decryptor&#8221; inside VMs. This ransomware is detected by different behavior activities, such as command line and dropped binary file. All processes and commands you may check in process tree or process graph. For example, this ransomware drops file @WanaDecryptor@.exe and typically deletes shadow copies by vssadmin using the command <em>vssadmin&nbsp; delete shadows \/all \/quiet.<\/em><br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/dqZzLdURtFSJXvwyompRtDBsjMcvlYLydt5uPtaiJshODqzkFhRoOxhjzVDiVKGumpWcZaLGPQCvgZkKJ8nBa5hSPAtrA6FilrpQR-sX-y7_aJKRnF1hgm8POtdWJIWFFl6FLHz9DiD8xyTtaFyi4mQkmIYKbMcP_aUkZY8SZZ9J-hPEqeiCp9lLuy766g\" alt=\"WannaCry's processes and commands\"\/><\/figure>\n\n\n\n<p>MITRE map gives you a good illustration of the tactics and techniques this malware uses: <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/jUapN6NoOdNt5Mw21ChHzzL97s1TarUtYQ2rO7soyEa-RJBb9ithXxduSzqEPwoExLSXdaIXoJAximQVDsNXAP9a7KNPxTIjXCdZujImXaaQAywPVf_NIZVe3ebekmREitYAE1pU5siJQ8FM_jpbapfmOjIoU_K_x_z7mt67IfTEaDwuuzqdh-gpEijPQA\" alt=\"WannaCry's MITRE map\"\/><\/figure>\n\n\n\n<p>WannaCry sample for your analysis:<br> <a href=\"https:\/\/app.any.run\/tasks\/b28a4f68-c06b-40dc-8d8a-8b0df1ab75a3?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=wannacry&amp;utm_content=task\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/app.any.run\/tasks\/b28a4f68-c06b-40dc-8d8a-8b0df1ab75a3<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>While the original version of WannCry is inactive, thanks to the killswitch discovered by Marcus Hutchins, the variants that are at large today still use the EternalBlue exploit. The worm is, in fact, present in over 100 countries.&nbsp;<\/p>\n\n\n\n<p>What\u2019s more, if your organization uses or used to use computers running older windows versions, chances are they are infected right now. Perhaps, with an older version of WannaCry that persists dormantly after establishing contact with one of the killswitch domains.<\/p>\n\n\n\n<p>Don&#8217;t let yourself fall prey to ransomware. Update your systems frequently.<\/p>\n\n\n\n<p>If you want to read more about malicious history? Check out<a rel=\"noreferrer noopener\" aria-label=\" ILOVEYOU malware (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/iloveyou\/\" target=\"_blank\"> ILOVEYOU malware<\/a> created back in May 2000. Or read about the<a rel=\"noreferrer noopener\" aria-label=\"&nbsp;Sobig history (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-history-sobig\/\" target=\"_blank\">&nbsp;Sobig history<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-history-mydoom\/\" target=\"_blank\">,<\/a> which activity was first recorded in January 2003.&nbsp;<\/p>\n\n\n\n<p>And, as always, stay vigilant online and check your files with&nbsp;<a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=wannacry&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a>.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The WannaCry attack of 2017 is the perfect example of why you should always install security updates as soon as they\u2019re released. This was, probably, the most avoidable ransomware incident. And, at the same time, one of the most damaging and rapidly spreading malware outbreaks. This is the story of the WannaCry ransomware: a story [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4197,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[29],"class_list":["post-4194","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-history","tag-historical-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WannaCry Ransomware - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"A look back at the 2017 WannaCry ransomware outbreak that affected 200,000 computers in 150 countries. How it spread and why it could have been prevented.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"WannaCry: The Most Preventable Ransomware is Still at Large\",\"datePublished\":\"2023-01-17T07:47:38+00:00\",\"dateModified\":\"2023-01-17T11:04:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/\"},\"wordCount\":1274,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"historical malware\"],\"articleSection\":[\"Malicious History\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/\",\"name\":\"WannaCry Ransomware - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-01-17T07:47:38+00:00\",\"dateModified\":\"2023-01-17T11:04:09+00:00\",\"description\":\"A look back at the 2017 WannaCry ransomware outbreak that affected 200,000 computers in 150 countries. How it spread and why it could have been prevented.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malicious History\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/history\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"WannaCry: The Most Preventable Ransomware is Still at Large\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WannaCry Ransomware - ANY.RUN&#039;s Cybersecurity Blog","description":"A look back at the 2017 WannaCry ransomware outbreak that affected 200,000 computers in 150 countries. How it spread and why it could have been prevented.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"WannaCry: The Most Preventable Ransomware is Still at Large","datePublished":"2023-01-17T07:47:38+00:00","dateModified":"2023-01-17T11:04:09+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/"},"wordCount":1274,"commentCount":3,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["historical malware"],"articleSection":["Malicious History"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/","url":"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/","name":"WannaCry Ransomware - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-01-17T07:47:38+00:00","dateModified":"2023-01-17T11:04:09+00:00","description":"A look back at the 2017 WannaCry ransomware outbreak that affected 200,000 computers in 150 countries. How it spread and why it could have been prevented.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malicious History","item":"https:\/\/any.run\/cybersecurity-blog\/category\/history\/"},{"@type":"ListItem","position":3,"name":"WannaCry: The Most Preventable Ransomware is Still at Large"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4194"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4194"}],"version-history":[{"count":5,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4194\/revisions"}],"predecessor-version":[{"id":4205,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4194\/revisions\/4205"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4197"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}