{"id":4273,"date":"2023-02-02T06:03:00","date_gmt":"2023-02-02T06:03:00","guid":{"rendered":"\/cybersecurity-blog\/?p=4273"},"modified":"2025-03-11T12:20:41","modified_gmt":"2025-03-11T12:20:41","slug":"malware-news-digest-january-2023","status":"publish","type":"post","link":"\/cybersecurity-blog\/malware-news-digest-january-2023\/","title":{"rendered":"Malware News Digest: January 2023"},"content":{"rendered":"\n<p>Welcome to our new monthly synopsis of noteworthy malware and security news.&nbsp;<\/p>\n\n\n\n<p>Let&#8217;s take a look at what&#8217;s been going on.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. New threat alert: Rhadamanthys Stealer<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/blog.cyble.com\/2023\/01\/12\/rhadamanthys-new-stealer-spreading-through-google-ads\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">newly discovered<\/a> malware strain is an infostealer that is being distributed through Google Ads phishing campaigns. It collects system data and targets the most popular cryptocurrency wallets.<\/p>\n\n\n\n<p>Google\u2019s advertising network is rapidly turning into a potent malware distribution channel. Despite the ongoing criticism from the cybersecurity community, Google seemingly does nothing to stop its abuse.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Malicious Python packages spread malware on Python Package Index (PyPI)<\/h2>\n\n\n\n<p>Three malicious packages named &#8220;colorslib,&#8221; &#8220;httpslib,&#8221; and &#8220;libhttps&#8221; were <a href=\"https:\/\/thehackernews.com\/2023\/01\/researchers-uncover-3-pypi-packages.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">uploaded<\/a> to Python Package Index (PyPI) repository by a threat actor named Lolip0p.&nbsp;<\/p>\n\n\n\n<p>These packages were downloaded over 550 times before being removed from PyPI. The packages have identical setup scripts that download and run a malicious binary (&#8220;Oxzy.exe&#8221;) hosted on Dropbox.&nbsp;<\/p>\n\n\n\n<p>The binary triggers the retrieval of another binary called &#8220;update.exe,&#8221; which is an information stealer and can drop additional malware, one of which is a trojan detected by Microsoft as Wacatac.<\/p>\n\n\n\n<p>The packages were made to look legitimate by including a convincing project description.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Attackers hide malware in blank images to bypass the detection<\/h2>\n\n\n\n<p>A new phishing scam called the Blank Image Attack has been <a href=\"https:\/\/www.hackread.com\/blank-image-attack-evade-anti-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">discovered<\/a> by Avanan researchers.&nbsp;<\/p>\n\n\n\n<p>The attack sends a blank image in an HTML attachment, which when opened, redirects the recipient to a malicious landing page that delivers malware. The attacker uses a legitimate link from DocuSign to trick the victim into trusting the email and its attachments.&nbsp;<\/p>\n\n\n\n<p>The blank image contains an encoded JavaScript that bypasses antivirus services and redirects the victim to the malicious link. To avoid this attack, users should avoid opening .htm attachments to block HTML attachments.<\/p>\n\n\n\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-group alignwide has-text-color has-background\" style=\"color:#000000;background-color:#ffffff\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading alignwide has-text-align-center\" id=\"schedule-a-visit\" style=\"font-size:30px;font-style:normal;font-weight:600;line-height:1.15;text-transform:uppercase\"><strong>Try ANY.RUN for Enterprises <\/strong><\/h3>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"schedule-a-visit\" style=\"font-size:15px;line-height:1.15;text-transform:lowercase\">Combat new threats together  \u2013 ANALYZE MALWARE IN A TEAM<\/h2>\n\n\n\n<div class=\"wp-block-buttons alignwide has-custom-font-size has-normal-font-size is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50 has-custom-font-size is-style-fill has-normal-font-size\"><a class=\"wp-block-button__link has-text-color has-background wp-element-button\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=digest1&amp;utm_content=demo_button\" style=\"border-radius:45px;color:#ffffff;background-color:#00b0e8\" target=\"_blank\" rel=\"noreferrer noopener\">Get a demo<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Google Ads phishing attacks target password managers<\/h2>\n\n\n\n<p>Reports <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bitwarden-password-vaults-targeted-in-google-ads-phishing-attack\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">indicate<\/a> that malicious actors are running Google Ads phishing scams, targeting popular password management software. They\u2019re after users&#8217; master passwords.&nbsp;<\/p>\n\n\n\n<p>Master passwords are used to encrypt credentials stored in online \u201cpassword vaults\u201d, which hold sensitive login data online to make it accessible from multiple devices. Getting access to the master password grants attackers full control over the vault.<\/p>\n\n\n\n<p>Security breaches at LastPass and Norton have already shown just how effective such attacks can be.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Windows 11 now protects users from themselves<\/h2>\n\n\n\n<p>Smart App Control is a new safety feature that was <a href=\"https:\/\/www.techradar.com\/news\/windows-11-has-a-new-way-to-protect-you-from-your-own-bad-judgement\" target=\"_blank\" rel=\"noreferrer noopener\">added<\/a> to Windows 11 in January. It is designed to block untrusted apps from running or files to be opened.<\/p>\n\n\n\n<p>When a user clicks on a potentially malicious app, windows will now show a pop suggesting that the application may be unsafe. Only time will tell if Microsoft\u2019s implementation will prove effective or if it evolves into scareware, similar to Apple&#8217;s implementation on Mac OS.<\/p>\n\n\n\n<p>For now, the feature is available for testing to select users.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6. OneNote maldocs usage spiked in January<\/h2>\n\n\n\n<p>We&#8217;re seeing a spike in OneNote maldoc usage lately and crooks using different lures, such as Office365 and blurred documents. We found a fresh maldoc with &#8220;Legal Notice&#8221; lure which download Redline as a payload. Check out <a href=\"https:\/\/app.any.run\/tasks\/b5396b9e-42ae-4141-9573-b1aec1c2bb1c\" target=\"_blank\" rel=\"noreferrer noopener\">this task in ANY.RUN<\/a> to see it in action.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"570\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/02\/maldoc_onenote-2-1024x570.png\" alt=\"OneNote maldoc\" class=\"wp-image-4306\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/02\/maldoc_onenote-2-1024x570.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/02\/maldoc_onenote-2-300x167.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/02\/maldoc_onenote-2-768x428.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/02\/maldoc_onenote-2-370x206.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/02\/maldoc_onenote-2-270x150.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/02\/maldoc_onenote-2-740x412.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/02\/maldoc_onenote-2.png 1121w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">OneNote maldoc<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN\u2019s January updates<\/h2>\n\n\n\n<p>Deep malware analysis from our analyst team, the history of the most preventable ransomware, the most effective ways to use virtualization to provide additional security, and trends of the last year and ANY.RUN achievements in 2022 \u2013 ANY.RUN Blog is ready to share its own digest. <\/p>\n\n\n\n<p>January gave us an amazing starting point with these posts:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2022\/\">Annual Report 2022<\/a>: trends of the last year and ANY.RUN achievements in 2022.<\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/5-ways-virtualization-can-improve-security\/\">5 Ways Virtualization Can Improve Security<\/a>: most effective ways to use virtualization to provide additional security.<\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/wannacry-ransomware\/\">WannaCry<\/a>: the history of the most preventable <a href=\"https:\/\/any.run\/malware-trends\/wannacry\">WannaCry ransomware<\/a>.<\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/cryptbot-infostealer-malware-analysis\/\">CryptBot Infostealer<\/a>: deep malware analysis from our analyst team.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Wrapping up<\/h2>\n\n\n\n<p>What kind of posts are you looking forward to in February?&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Malware analysis<\/li>\n\n\n\n<li>Lifehacks<\/li>\n\n\n\n<li>Malicious history<\/li>\n<\/ul>\n\n\n\n<p>Or suggest your idea in the comments!&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to our new monthly synopsis of noteworthy malware and security news.&nbsp; Let&#8217;s take a look at what&#8217;s been going on. 1. New threat alert: Rhadamanthys Stealer The newly discovered malware strain is an infostealer that is being distributed through Google Ads phishing campaigns. It collects system data and targets the most popular cryptocurrency wallets. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4280,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[10,15],"class_list":["post-4273","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-cybersecurity","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware News Digest: January 2023 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"New threats alert, malicious packages, blank image attacks &amp; Google Ads phishing scams \u2014 this month&#039;s review of the cybersecurity world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"y.shvetsov\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"Article\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/#article\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/\"\n\t            },\n\t            \"author\": {\n\t                \"name\": \"y.shvetsov\",\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"headline\": \"Malware News Digest: January 2023\",\n\t            \"datePublished\": \"2023-02-02T06:03:00+00:00\",\n\t            \"dateModified\": \"2025-03-11T12:20:41+00:00\",\n\t            \"mainEntityOfPage\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/\"\n\t            },\n\t            \"wordCount\": 686,\n\t            \"commentCount\": 1,\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"keywords\": [\n\t                \"cybersecurity\",\n\t                \"malware\"\n\t            ],\n\t            \"articleSection\": [\n\t                \"News\"\n\t            ],\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"CommentAction\",\n\t                    \"name\": \"Comment\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/#respond\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/\",\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/\",\n\t            \"name\": \"Malware News Digest: January 2023 - ANY.RUN&#039;s Cybersecurity Blog\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"datePublished\": \"2023-02-02T06:03:00+00:00\",\n\t            \"dateModified\": \"2025-03-11T12:20:41+00:00\",\n\t            \"description\": \"New threats alert, malicious packages, blank image attacks & Google Ads phishing scams \u2014 this month's review of the cybersecurity world.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"News\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 3,\n\t                    \"name\": \"Malware News Digest: January 2023\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN&#039;s Cybersecurity Blog\",\n\t            \"description\": \"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/any.run\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": \"required name=search_term_string\"\n\t                }\n\t            ],\n\t            \"inLanguage\": \"en-US\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"contentUrl\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"width\": 1,\n\t                \"height\": 1,\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"sameAs\": [\n\t                \"https:\/\/www.facebook.com\/www.any.run\/\",\n\t                \"https:\/\/twitter.com\/anyrun_app\",\n\t                \"https:\/\/www.linkedin.com\/company\/30692044\",\n\t                \"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"Person\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"y.shvetsov\",\n\t            \"image\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g\",\n\t                \"contentUrl\": \"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g\",\n\t                \"caption\": \"y.shvetsov\"\n\t            },\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/author\/y-shvetsov\/\"\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware News Digest: January 2023 - ANY.RUN&#039;s Cybersecurity Blog","description":"New threats alert, malicious packages, blank image attacks & Google Ads phishing scams \u2014 this month's review of the cybersecurity world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/","twitter_misc":{"Written by":"y.shvetsov","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/"},"author":{"name":"y.shvetsov","@id":"https:\/\/any.run\/"},"headline":"Malware News Digest: January 2023","datePublished":"2023-02-02T06:03:00+00:00","dateModified":"2025-03-11T12:20:41+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/"},"wordCount":686,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity","malware"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/","url":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/","name":"Malware News Digest: January 2023 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-02-02T06:03:00+00:00","dateModified":"2025-03-11T12:20:41+00:00","description":"New threats alert, malicious packages, blank image attacks & Google Ads phishing scams \u2014 this month's review of the cybersecurity world.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-news-digest-january-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"Malware News Digest: January 2023"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"y.shvetsov","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g","caption":"y.shvetsov"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/y-shvetsov\/"}]}},"_links":{"self":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4273"}],"collection":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4273"}],"version-history":[{"count":19,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4273\/revisions"}],"predecessor-version":[{"id":12061,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4273\/revisions\/12061"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4280"}],"wp:attachment":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4273"},{"taxonomy":"post_tag","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}