{"id":7469,"date":"2024-03-27T08:11:03","date_gmt":"2024-03-27T08:11:03","guid":{"rendered":"\/cybersecurity-blog\/?p=7469"},"modified":"2024-04-08T08:09:19","modified_gmt":"2024-04-08T08:09:19","slug":"new-bunnyloader-version","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/","title":{"rendered":"New BunnyLoader Version Gains Modular Capabilities"},"content":{"rendered":"\n<p>BunnyLoader is a rapidly evolving malware written in C\/C++. Originally released in September 2023, it has already reached version 3.0 in just six months. In this article, we&#8217;ll cover the new features in the latest version and how to analyze this threat using ANY.RUN.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What&#8217;s new&nbsp;<\/h2>\n\n\n\n<p>BunnyLoader 3.0 <a href=\"https:\/\/thehackernews.com\/2024\/03\/new-bunnyloader-malware-variant.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">comes<\/a> with rewritten data-stealing modules, an improved keylogger, and a smaller payload size. What&#8217;s more, the creators have added DoS functionality, enabling the malware to launch HTTP flood attacks.&nbsp;&nbsp;<\/p>\n\n\n\n<p>According to an update by hackers dated February 11, 2024, the latest version separates the modules for data theft, keylogging, and DoS into separate binaries.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nAnalyze BunnyLoader in <span class=\"highlight\">ANY.RUN sandbox<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/#register\/\" rel=\"noopener\" target=\"_blank\">\nSign up for free\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">What can BunnyLoader do?&nbsp;<\/h2>\n\n\n\n<p>BunnyLoader packs a wide range of malicious functions. The malware:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Exfiltrates credentials.&nbsp;<\/li>\n\n\n\n<li>Logs keystrokes.&nbsp;<\/li>\n\n\n\n<li>Steals cryptoccurency wallets.&nbsp;<\/li>\n\n\n\n<li>Launches DoS attacks against target URLs.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Drops additional malware.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This threat is rapidly evolving. Version 2.0 arrived just a month after the initial release, and the latest update \u2014 about 5 months after the previous. At this rate, it&#8217;s unlikely the creators will stop there.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">BunnyLoader\u2019s complex attack chain&nbsp;<\/h2>\n\n\n\n<p>The malware&#8217;s attack chain has become increasingly complex since its emergence. The current chain unfolds as follows:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>The initial compromise occurs via an undocumented dropper.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>It loads the <a href=\"https:\/\/app.any.run\/submissions\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=bunny_loader&amp;utm_content=linktoservice&amp;utm_term=270324\" target=\"_blank\" rel=\"noreferrer noopener\">PureCrypter<\/a> payload onto the compromised system.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>PureCrypter then forks into two parallel branches.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p><strong>The first branch:<\/strong> Runs the PureLogs loader, ultimately installing the PureLogs stealer on the system. We have provided a detailed analysis of this chain in our <a href=\"https:\/\/any.run\/cybersecurity-blog\/pure-malware-family-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">comprehensive report on the Pure malware family<\/a>.&nbsp;<\/p>\n\n\n\n<p><strong>The second branch<\/strong>: Drops BunnyLoader, which in turn installs the Meduza malware on the system.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">BunnyLoader sandbox analysis in ANY.RUN&nbsp;<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/app.any.run\/tasks\/3375ba33-70b2-4fae-a228-050f9901ef3e\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=bunny_loader&amp;utm_content=linktoservice&amp;utm_term=270324\" target=\"_blank\" rel=\"noreferrer noopener\">BunnyLoader<\/a> execution chain typically unfolds as follows: The loader usually gets delivered to the victim&#8217;s system through a phishing email as a malicious attachment or link. During execution, BunnyLoader decompresses and decrypts itself in memory.&nbsp;<\/p>\n\n\n\n<p>BunnyLoader then sets up persistence: it modifies registry keys or creates scheduled tasks. Next, the malware establishes communication with a C2 server, receives instructions and payloads, such as PureLogs. Optionally \u2014 depending on commands from the C2 \u2014 it downloads and executes additional payloads such as ransomware or banking trojans.&nbsp;<\/p>\n\n\n\n<p>After executing its intended payloads, BunnyLoader may attempt to cover its tracks by deleting temporary files or logs.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN\u2019s flagship product is an interactive malware sandbox that helps security teams efficiently analyze malware.&nbsp;<\/p>\n\n\n\n<p>Every day, a community of 400,000 analysts and 3000 corporate clients use our cloud-based platform to analyze Windows and Linux threats.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nIntegrate <span class=\"highlight\">ANY.RUN Threat Intelligence<\/span> in your organization&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/contact-us\/\" rel=\"noopener\" target=\"_blank\">\nContact Sales\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p><strong>Key advantages of ANY.RUN for businesses:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Interactive analysis: <\/strong>Analysts can \u201cplay with the sample\u201d in a VM to learn more about its behavior.&nbsp;<\/li>\n\n\n\n<li><strong>Fast and easy configuration. <\/strong>Launch VMs with different configurations in a matter of seconds.&nbsp;<\/li>\n\n\n\n<li><strong>Fast detection: <\/strong>Detects malware within roughly 40 seconds of uploading a file.&nbsp;<\/li>\n\n\n\n<li><strong>Cloud-based solution<\/strong> eliminates setup and maintenance costs.&nbsp;<\/li>\n\n\n\n<li><strong>Intuitive interface<\/strong>: Enables even junior SOC analysts to conduct malware analysis.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Learn how ANY.RUN can benefit you or your security team. Schedule a free demo with one of our sales representatives, and we&#8217;ll walk you through real-world examples.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/calendly.com\/d\/3nd-rzd-xvx\/any-run-demo-blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Schedule a demo \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BunnyLoader is a rapidly evolving malware written in C\/C++. Originally released in September 2023, it has already reached version 3.0 in just six months. In this article, we&#8217;ll cover the new features in the latest version and how to analyze this threat using ANY.RUN.&nbsp; What&#8217;s new&nbsp; BunnyLoader 3.0 comes with rewritten data-stealing modules, an improved [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":7471,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[57,10,34],"class_list":["post-7469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-anyrun","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New BunnyLoader Version Gains Modular Capabilities - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Learn more about the new features of the BunnyLoader malware and see how to analyze this threat using ANY.RUN.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Zalesskiy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/\"},\"author\":{\"name\":\"Jack Zalesskiy\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"New BunnyLoader Version Gains Modular Capabilities\",\"datePublished\":\"2024-03-27T08:11:03+00:00\",\"dateModified\":\"2024-04-08T08:09:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/\"},\"wordCount\":571,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"Cybersecurity Lifehacks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/\",\"name\":\"New BunnyLoader Version Gains Modular Capabilities - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-03-27T08:11:03+00:00\",\"dateModified\":\"2024-04-08T08:09:19+00:00\",\"description\":\"Learn more about the new features of the BunnyLoader malware and see how to analyze this threat using ANY.RUN.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New BunnyLoader Version Gains Modular Capabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Jack Zalesskiy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp\",\"caption\":\"Jack Zalesskiy\"},\"description\":\"Jack Zalesskiy is a technology writer with five years of experience under his belt. He closely follows malware incidents, data breaches, and the way in which cyber threats manifest in our day-to-day lives.\",\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New BunnyLoader Version Gains Modular Capabilities - ANY.RUN&#039;s Cybersecurity Blog","description":"Learn more about the new features of the BunnyLoader malware and see how to analyze this threat using ANY.RUN.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/","twitter_misc":{"Written by":"Jack Zalesskiy","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/"},"author":{"name":"Jack Zalesskiy","@id":"https:\/\/any.run\/"},"headline":"New BunnyLoader Version Gains Modular Capabilities","datePublished":"2024-03-27T08:11:03+00:00","dateModified":"2024-04-08T08:09:19+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/"},"wordCount":571,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/","url":"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/","name":"New BunnyLoader Version Gains Modular Capabilities - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-03-27T08:11:03+00:00","dateModified":"2024-04-08T08:09:19+00:00","description":"Learn more about the new features of the BunnyLoader malware and see how to analyze this threat using ANY.RUN.\u00a0","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/new-bunnyloader-version\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"New BunnyLoader Version Gains Modular Capabilities"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Jack Zalesskiy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp","caption":"Jack Zalesskiy"},"description":"Jack Zalesskiy is a technology writer with five years of experience under his belt. He closely follows malware incidents, data breaches, and the way in which cyber threats manifest in our day-to-day lives.","url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7469"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=7469"}],"version-history":[{"count":5,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7469\/revisions"}],"predecessor-version":[{"id":7552,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7469\/revisions\/7552"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7471"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=7469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=7469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=7469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}