{"id":7226,"date":"2024-03-07T10:04:27","date_gmt":"2024-03-07T10:04:27","guid":{"rendered":"\/cybersecurity-blog\/?p=7226"},"modified":"2025-01-31T06:53:19","modified_gmt":"2025-01-31T06:53:19","slug":"lockbit-resurges","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/","title":{"rendered":"LockBit is Back from the Dead. Here\u2019s How to Prepare For its Return"},"content":{"rendered":"\n<p>In February, The FBI and international law enforcement allies <a href=\"https:\/\/edition.cnn.com\/2024\/02\/19\/politics\/fbi-ransomware-lockbit-dark-web-site\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">claimed<\/a> a big victory. They\u2019ve seized the operations of LockBit, got hold of the gang\u2019s source code, and took over their website:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"614\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-min-1024x614.png\" alt=\"\" class=\"wp-image-7227\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-min-1024x614.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-min-300x180.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-min-768x461.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-min-1536x922.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-min-2048x1229.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-min-370x222.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-min-270x162.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-min-740x444.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">This screenshot has been all over cybersecurity news sites&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Unfortunately, it seems the win was only temporary. The core members of the gang weren\u2019t arrested, and the takedown by Operation Cronos was short-lived, as the gang recovered within days.&nbsp;<\/p>\n\n\n\n<p>At ANY.RUN, we noted a period of inactivity followed by a spike, as <a href=\"https:\/\/any.run\/malware-trends\/lockbit\" target=\"_blank\" rel=\"noreferrer noopener\">LockBit<\/a> detections in our sandbox reached 0 and then began to grow, starting a few days after the takedown.&nbsp;<\/p>\n\n\n\n<p>The LockBit ransomware gang has resumed its attacks, then. Now they\u2019re <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lockbit-ransomware-returns-to-attacks-with-new-encryptors-servers\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">employing<\/a> updated encryptors and ransom notes that lead to new servers.&nbsp;<\/p>\n\n\n\n<p>Rather than rebranding, LockBit gang promised to return with enhanced infrastructure and updated security measures to prevent the law enforcement from accessing their descriptors again.&nbsp;<\/p>\n\n\n\n<p>We&#8217;ve seen this pattern before. Shortly after GandCrab was taken down in June 2019, <a href=\"https:\/\/any.run\/malware-trends\/sodinokibi\" target=\"_blank\" rel=\"noreferrer noopener\">REvil<\/a> \u2014 also known as Sodinokibi \u2014 ransomware emerged, and it was based on GandCrab\u2019s source code at least partially. Security researchers who took the opportunity to study GandCrab\u2019s code during the quiet period were better prepared to deal with REvil when it appeared.&nbsp;<\/p>\n\n\n\n<p><a href=\"http:\/\/history%20repeats%20iself.\/\" target=\"_blank\" rel=\"noreferrer noopener\">History repeats iself. <\/a><a href=\"https:\/\/any.run\/cybersecurity-blog\/the-end-of-sodinokibi-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read about the rise and fall of REvil<\/a>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is LockBit?&nbsp;<\/h2>\n\n\n\n<p>LockBit is both a ransomware and an APT group with the same name. The group has claimed responsibility for many high-profile attacks. LockBit has extorted over $120 million from 2,000 victims.&nbsp;<\/p>\n\n\n\n<p>LockBit ransomware primarily targets Windows systems, but it&#8217;s also capable of encrypting files on Linux and MacOS. The group operates using a Ransomware-as-a-Service (RaaS) model, wherein the core members develop the ransomware and then sell it to affiliates who carry out the actual attacks.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Analyzing LockBit in ANY.RUN&nbsp;<\/h2>\n\n\n\n<p>Similar to the story of GandCrab&#8217;s demise and resurrection as REvil, it&#8217;s likely that LockBit creators will modify the code of this threat. Even if they don\u2019t, ransomware activity as a whole has been <a href=\"https:\/\/www.chainalysis.com\/blog\/ransomware-2024\/#:~:text=In%202023%2C%20the%20ransomware%20landscape,say%20their%20numbers%20are%20increasing.\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">climbing<\/a> since 2023, and LockBit is one of the most widely deployed strains you&#8217;re likely to encounter.&nbsp;<\/p>\n\n\n\n<p>That&#8217;s why it&#8217;s important to study its behavioral patterns, TTPs, and collect Lockbit IOCs to set up your TIP and SIEM systems. With ANY.RUN, you can run extensive LockBit ransomware analysis in seconds and just with a couple of clicks. This way, you can detect and isolate an intrusion before LockBit encrypts your files and causes damage to your infrastructure.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"559\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-min-1024x559.png\" alt=\"\" class=\"wp-image-7228\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-min-1024x559.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-min-300x164.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-min-768x419.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-min-1536x838.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-min-2048x1118.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-min-370x202.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-min-270x147.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-min-740x404.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">LockBit\u2019s ransom note in ANY.RUN&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The primary function of this ransomware is still the same: it encrypts files and deposits a ransom note with contact information and instructions \u2014 like we see in <a href=\"https:\/\/app.any.run\/tasks\/bb0dfe0f-105f-41ad-b3a2-ad25ae29574d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=lockbitreturns&amp;utm_content=linktoservice&amp;utm_term=070324\" target=\"_blank\" rel=\"noreferrer noopener\">this task<\/a>.&nbsp;<\/p>\n\n\n\n<p>The latest version is LockBit 4.0, and it&#8217;s a bit different from the previous 3.0 version. In 4.0, it doesn&#8217;t change the wallpaper anymore, and it takes a lot longer to decrypt all the files on the infected system. Unlike 3.0 which deleted itself after encrypting, version 4.0 doesn&#8217;t do that.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Wrapping up&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>LockBit has bounced back from the takedown: <\/strong>the gang resumed its operations with updated encryptors, and infrastructure.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>LockBit overview: <\/strong>LockBit targets primarily Windows systems but also capable of affecting Linux and MacOS. With over $120 million extorted from 2,000 victims, LockBit is perhaps the most infamous ransomware.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Preparation is Key:<\/strong> Understanding LockBit&#8217;s behavioral patterns, tactics, techniques, and TTPs, and collecting IOCs can help you set up&nbsp;security systems appropriately.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What is ANY.RUN?&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN is a cloud malware sandbox that handles the heavy lifting of security teams. Every day, 400,000 professionals use our platform to investigate incidents and streamline threat analysis on Windows and Linux cloud VMs.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nIntegrate <span class=\"highlight\">ANY.RUN security products<\/span> in your organization&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/plans\/\" rel=\"noopener\" target=\"_blank\">\nReach out to Sales\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Advantages of ANY.RUN&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Real-time detection:<\/strong> Within roughly 40 seconds of uploading a file, ANY.RUN can detect malware and automatically identify many malware families using YARA and Suricata rules.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Interactive analysis:<\/strong> Unlike many automated solutions, ANY.RUN allows you to interactively engage with the virtual machine directly through your browser. This interactive capability helps prevent zero-day exploits and sophisticated malware that can evade signature-based detection.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cost-Effective:<\/strong> For businesses, ANY.RUN\u2019s cloud nature translates into a cost-effective solution, as it doesn&#8217;t require any setup or maintenance effort from your DevOps team.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Great for onboarding new security team members:<\/strong> ANY.RUN&#8217;s intuitive interface allows even junior SOC analysts to quickly learn how to analyze malware and extract indicators of compromise IOCs.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>If these capabilities sound beneficial for you or your team, give ANY.RUN a try. The best part is \u2014 we offer a completely free starter plan and a personalized demo for your team.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/calendly.com\/d\/3nd-rzd-xvx\/any-run-demo-blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Schedule a call with us<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In February, The FBI and international law enforcement allies claimed a big victory. They\u2019ve seized the operations of LockBit, got hold of the gang\u2019s source code, and took over their website: Unfortunately, it seems the win was only temporary. The core members of the gang weren\u2019t arrested, and the takedown by Operation Cronos was short-lived, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":7230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,10,15],"class_list":["post-7226","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-cybersecurity","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>LockBit is Back from the Dead. Prepare For its Return<\/title>\n<meta name=\"description\" content=\"The LockBit ransomware gang has resumed attacks after the FBI takedown in February 2024. Learn more the latest version 4.0.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vlad Ananin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/\"},\"author\":{\"name\":\"Vlad Ananin\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"LockBit is Back from the Dead. Here\u2019s How to Prepare For its Return\",\"datePublished\":\"2024-03-07T10:04:27+00:00\",\"dateModified\":\"2025-01-31T06:53:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/\"},\"wordCount\":831,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/\",\"name\":\"LockBit is Back from the Dead. Prepare For its Return\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-03-07T10:04:27+00:00\",\"dateModified\":\"2025-01-31T06:53:19+00:00\",\"description\":\"The LockBit ransomware gang has resumed attacks after the FBI takedown in February 2024. Learn more the latest version 4.0.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"LockBit is Back from the Dead. Here\u2019s How to Prepare For its Return\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Vlad Ananin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g\",\"caption\":\"Vlad Ananin\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/vlad-ananin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LockBit is Back from the Dead. Prepare For its Return","description":"The LockBit ransomware gang has resumed attacks after the FBI takedown in February 2024. Learn more the latest version 4.0.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/","twitter_misc":{"Written by":"Vlad Ananin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/"},"author":{"name":"Vlad Ananin","@id":"https:\/\/any.run\/"},"headline":"LockBit is Back from the Dead. Here\u2019s How to Prepare For its Return","datePublished":"2024-03-07T10:04:27+00:00","dateModified":"2025-01-31T06:53:19+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/"},"wordCount":831,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/","url":"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/","name":"LockBit is Back from the Dead. Prepare For its Return","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-03-07T10:04:27+00:00","dateModified":"2025-01-31T06:53:19+00:00","description":"The LockBit ransomware gang has resumed attacks after the FBI takedown in February 2024. Learn more the latest version 4.0.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/lockbit-resurges\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"LockBit is Back from the Dead. Here\u2019s How to Prepare For its Return"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Vlad Ananin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g","caption":"Vlad Ananin"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/vlad-ananin\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7226"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=7226"}],"version-history":[{"count":6,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7226\/revisions"}],"predecessor-version":[{"id":11388,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7226\/revisions\/11388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7230"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=7226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=7226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=7226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}