{"id":3627,"date":"2015-02-18T16:00:06","date_gmt":"2015-02-18T16:00:06","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3627"},"modified":"2020-02-26T11:00:11","modified_gmt":"2020-02-26T16:00:11","slug":"non-conventional-top-security-news-stories-january-2015","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/non-conventional-top-security-news-stories-january-2015\/3627\/","title":{"rendered":"Non-conventional top security news stories: January 2015"},"content":{"rendered":"<p>Hi all!  After a successful <a href=\"http:\/\/habrahabr.ru\/company\/kaspersky\/blog\/246745\/\" target=\"_blank\" rel=\"noopener nofollow\">news digest covering the entire 2014 year<\/a>, we decided to make this kind of column  regular \u2013 or, rather, monthly. Today we discuss the most important news on  information security from January. The method by which these were picked is a  bit different this time. We still take the most viewed news stories from  Threatpost.com and try to comprehend how and why they have drawn that much  attention. But in the monthly digest there will be just five news stories. Let  me first remind you that Threatpost accumulates all IT security industry news,  while Kaspersky Lab\u2019s own research is published on <a href=\"https:\/\/securelist.com\" target=\"_blank\" rel=\"noopener\">Securelist<\/a>.<\/p>\n<p>Summary:  GLIBC flaw, physics don\u2019t get along well with lyrists, North Korea browser,  keylogging charger and keyboard vulnerabilities, Cryptowall ransomware and  cracking WiFi. Alright, let\u2019s go.<\/p>\n<p><strong>5. Wifiphisher: WiFi cracking under the thick  layer of social engineering<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/wifiphisher-wi-fi-hacking-tool-automates-phishing-attacks\/110201\" target=\"_blank\" rel=\"noopener nofollow\">The story<\/a>. A <a href=\"http:\/\/security.stackexchange.com\/questions\/23351\/can-my-wifi-home-router-be-brought-down-to-cause-me-to-connect-to-a-fake-ap\" target=\"_blank\" rel=\"noopener nofollow\">discussion<\/a> on Stackexchange, where the problem  had been highlighted as far back as three years ago.<\/p>\n<p>In a  previous post, we told you that the Internet was <a href=\"https:\/\/threatpost.com\/the-internet-is-broken-act-accordingly\/104141\" target=\"_blank\" rel=\"noopener nofollow\">broken<\/a>. Of all that is \u2018broken\u2019 in computer networks,  wireless is broken most severely. We\u2019ve survived the \u2018prelapsarian naivety\u2019 of  WEP protocol, been convinced a few times that unprotected public wireless  networks are <a href=\"https:\/\/www.kaspersky.com\/blog\/wi-fi-sao-paulo\/4351\/\" target=\"_blank\" rel=\"noopener nofollow\">bad<\/a> and <a href=\"https:\/\/threatpost.com\/wps-implementation-issue-exposes-wi-fi-routers-to-attack\/108011\" target=\"_blank\" rel=\"noopener nofollow\">gazed<\/a> into the security abyss named WPS. Now there  is a tsunami of bugs in routers\u2019 firmware \u2013 default passwords embedded into the  firmware (<a href=\"https:\/\/threatpost.com\/d-link-planning-to-patch-router-backdoor-bug\/102581\" target=\"_blank\" rel=\"noopener nofollow\">or something like this<\/a>), <a href=\"https:\/\/threatpost.com\/nat-pmp-protocol-vulnerability-puts-1-2-million-soho-routers-at-risk\/108998\" target=\"_blank\" rel=\"noopener nofollow\">miscoded<\/a> NAT or something else. As if social engineering  was all that we wanted.<\/p>\n<div class=\"pullquote\">Non-conventional  top #security news stories: January 2015<\/div>\n<p>You want it?  You got it. It\u2019s easy: all that it takes is to create a new hotspot with the  same SSID as the legitimate one within the victim\u2019s acceptance area. As soon as  the victim tries to access it, we request the password to the \u2018real\u2019 hotspot  and secure it for ourselves. That\u2019s all it takes, now we can do a MITM attack. Ah,  maybe not yet. First we need to talk the victim\u2019s PC or mobile device into  accessing \u2018our\u2019 hotspot. This we\u2019ll do by spamming the area with  de-authentication packets. They disconnect the legitimate clients so that they  can connect to the fake hotspot.<\/p>\n<p>Yet another  thread on Stackexchange <a href=\"http:\/\/security.stackexchange.com\/questions\/20219\/preventing-deauthentication-attacks\" target=\"_blank\" rel=\"noopener nofollow\">implies<\/a> that the problem is long-known about and that  it is either barely treatable (as with deauth packets) or unfixable completely.  So what\u2019s the news? \u2013 This method of stealing passwords has been just  automated, with a utility named Wifiphisher, made available on Github. The  first moral of the story: if someone is asking you for your password, no matter  where, think twice before entering it. The second moral of the story: there\u2019s  no way to get protected from man-in-the-middle attacks by excluding the very  possibility that they happen. There\u2019s no way to exclude it, not in this state  of the Internet.<\/p>\n<p>By the way,  Marriott Hotels\u2019 networks <a href=\"https:\/\/threatpost.com\/marriott-agrees-to-stop-blocking-guest-wifi-devices\/110441\" target=\"_blank\" rel=\"noopener nofollow\">dallied<\/a> with deauth packets, using them to block out  the visitors\u2019 own hotspots. The FCC fined Marriott hard for this.<\/p>\n<p><strong>4. Cryptolockers. How is the phantom menace different  from the apparent one?<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/inside-cryptowall-2-0-ransomware\/110228\" target=\"_blank\" rel=\"noopener nofollow\">The story<\/a>. <a href=\"https:\/\/threatpost.com\/cryptowall-3-0-slims-down-removes-exploits-from-dropper\/110923\" target=\"_blank\" rel=\"noopener nofollow\">One more story<\/a>. \u00a0<a href=\"https:\/\/securelist.com\/analysis\/publications\/64608\/a-new-generation-of-ransomware\/\" target=\"_blank\" rel=\"noopener\">Detailed research on cryptolockers<\/a> as a malware species.<\/p>\n<p>Earlier I  wrote that if we poll companies on the cyberthreats that they encounter the  most often, that spam would most likely be in first place. But spam is  something that doesn\u2019t inflict any apparent damage. It does exist, but it\u2019s  hard to calculate. And if it\u2019s hard to calculate, it\u2019s not easy to evaluate how  sensible the expenses are to fight it either. Besides, antispam technologies  are mature, widely available and affordable.<\/p>\n<p>Cryptolockers  are a different story. The damage they inflict is rather easy to calculate:  your company is attacked, important data is encrypted and becomes inaccessible  and then the ransom is demanded. You lose money. You lose time. A single  incident can bury your business completely (here\u2019s an <a href=\"https:\/\/business.kaspersky.com\/how-a-single-cybersecurity-incident-can-kill-your-business\/3540\" target=\"_blank\" rel=\"noopener nofollow\">example<\/a>). It\u2019s clear that protection from cryptolockers  is necessary.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/02\/06020254\/2-1.jpg\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/02\/06020254\/2-1.jpg\" alt=\"2\" width=\"600\" height=\"390\" class=\"aligncenter size-full wp-image-3629\"><\/a><\/p>\n<p>For  criminals, cryptolockers are easy money. It\u2019s not a botnet that should be built  first and then sold to someone. That\u2019s why cryptolockers, unfortunately, are  actively developed, and continue to grow in number and distribution.<\/p>\n<p>So what\u2019s  the news? Ah, nothing peculiar! We\u2019ve <a href=\"https:\/\/securelist.com\/analysis\/publications\/64608\/a-new-generation-of-ransomware\/\" target=\"_blank\" rel=\"noopener\">described<\/a> the main trends of cryptolockers\u2019  evolution during the summer of last year (and we keep researching them). Next  to all security vendors are doing the same, including Microsoft and Cisco, for  instance. The job is large enough for everyone. For instance, ransomware  comprises all modern technologies for concealing the criminal conduct: Bitcoin  payment, Tor and I2P communications, obfuscations, etc.<\/p>\n<p>ut that\u2019s  not the main point. Most interesting are the technologies used by malware to  get onto the victim\u2019s PC. Cisco\u2019s research in February shows that creators of  one of the Cryptowall variants bet on exploit-kits. For businesses, this means  that the weakest point of the infrastructure is vulnerable software. This may  not be the discovery of the ages, but it is an important topic, nevertheless,  and the fact that almost every news story on cryptolockers draws an immense  interest, proves it.<\/p>\n<p><strong>3. USB wall charger with a built-in keylogger <\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/how-a-10-usb-charger-can-record-your-keystrokes-over-the-air\/110367\" target=\"_blank\" rel=\"noopener nofollow\">The story<\/a><\/p>\n<p>Here is yet  another story on how difficult it is to control wireless communications. It began  with the work of three researchers who decided to analyze the security of  Microsoft\u2019s wireless keyboards. In the marketing materials for these keyboards  there are likely a few lines on how securely encrypted the data exchange is  between the device and USB-receiver. It is indeed encrypted, but there are  doubts on how \u201csecurely\u201d it is actually done.<\/p>\n<p>In a  nutshell, the MAC-address of the keyboard serves as the key to the encrypted  symbols; it can be \u2018snooped\u2019, first, and second it can be used to steal  remotely, using some peculiarities of the chip used for data transmission (also  in quite a few devices, including some medical equipment \u2013 oops!). Then again, stealing  it isn\u2019t even necessary: the first byte of the MAC-address is the same for all keyboards  which makes bruteforcing a cakewalk.<\/p>\n<p>The only  problem left is how to get close enough to the keyboard to continuously keylog  it. Here comes Sami Kamkar, offering an original proof of concept. Take a  common USB wall charger used for smartphones and tablets, beef it up with  Arduino, a specifically crafted firmware, and get an electric Trojan horse.  Which, by the way, remains operational even if the charger isn\u2019t plugged into  the AC outlet, a small rechargeable battery is there as well. The device itself  costs $10; it\u2019s very good that this is just a proof of concept (for now).<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/WqkmGG0biXc?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>Microsoft refused  to comment on the problem, merely saying that it \u2018<a href=\"http:\/\/venturebeat.com\/2015\/01\/12\/this-usb-wall-charger-secretly-logs-keystrokes-from-microsoft-wireless-keyboards-nearby\/\" target=\"_blank\" rel=\"noopener nofollow\">explores the problem<\/a>.\u2019 Yet the problem is very  interesting: it\u2019s barely fixable with firmware upgrades (if it is at all  possible), only device replacement. Now, what if a similarly \u2018untreatable\u2019 bug  was found, not in a $40 keyboard, but in a $70,000 luxury car? That\u2019s a  different story.<\/p>\n<p><strong>2. A backdoor in a North Korea browser<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/inside-north-koreas-naenara-browser\/110307\" target=\"_blank\" rel=\"noopener nofollow\">The story<\/a><\/p>\n<p>Impressed  with the story on Sony Pictures Entertainment\u2019s megahack, researcher Robert  Hansen decided to take a look at the North Korean Internet. Let me remind you  that N. Korea probably (still not proven reliably) was behind the attack  carried out due to hard feelings towards the film about its leader\u2019s  assassination \u2013 probably, the dumbest comedy of 2014.<\/p>\n<p>N. Korea  uses its own Linux-based operating system known as <a href=\"https:\/\/ru.wikipedia.org\/wiki\/Red_Star_OS\" target=\"_blank\" rel=\"noopener nofollow\">Red Star OS<\/a> (<em>Pulg\u016dnby\u014fl)<\/em>. As for a browser, it uses a  Firefox fork titled <em>Naenara<\/em> (\u201cMy Country\u201d). While exploring the browser,  Hansen detected that at every launch, Naenara connects to a local IP-address  within an isolated N. Korean network. Moreover, the entire country\u2019s network is  built the same way that local business area networks are constructed: internal  addresses, almost totally isolated from the outside world and all  communications via proxy. Probably, all traffic, including encrypted traffic,  can be tapped: the browser accepts only one certificate \u2013 the state-issued one.  It probably also has some romantic name.<\/p>\n<p>In other  words, all the tools needed to track users in the country with a single  provider is already embedded into the only available OS. And that happens now, in  North Korea! Wow! Breaking news!<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/02\/06020254\/3-1.jpg\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/02\/06020254\/3-1.jpg\" alt=\"3\" width=\"499\" height=\"474\" class=\"aligncenter size-full wp-image-3630\"><\/a><\/p>\n<p>This story  is probably only popular due to the attack on Sony Pictures Entertainment and  the possible involvement of North Korea. Additionally, Robert Hansen indeed  uncovered a couple of tricks devised by the folks who really know how to limit  and prohibit <em>everything<\/em>, not just  Internet. Take a read!<\/p>\n<p><strong>1. GLIBC flaw or Why Patching Matters<\/strong><\/p>\n<p><a href=\"https:\/\/threatpost.com\/ghost-glibc-remote-code-execution-vulnerability-affects-all-linux-systems\/110679\" target=\"_blank\" rel=\"noopener nofollow\">The Story<\/a>. <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0235\" target=\"_blank\" rel=\"noopener nofollow\">CVE record<\/a>. <a href=\"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=CVE-2015-0235\" target=\"_blank\" rel=\"noopener nofollow\">RedHat Advisory<\/a>.<\/p>\n<p><strong>A lyrical digression. <\/strong>Among the most important events in 2014  was the OpenSSL flaw, currently known as Heartbleed. It was quite interesting  to watch the development\u2014how a completely technical topic was first discussed  on tech forums and editions, then came out to the completely non-tech media  outlets. And with good reason! The problem indeed affected everyone: business  owners, admins, developers and users alike. In other words \u2013 a lot of people  and businesses. It became necessary to explain to \u2018non-techy\u2019 people, such as  business owners, again, or top managers, what the buzz was about and what should  be done, in simple and plain language.<\/p>\n<p>Now, you  come to such a \u2018non-tech\u2019 person and say, Heartbleed is important because the OpenSSL  where the bug was found is used everywhere. Your website may be vulnerable,  your environment may be vulnerable, even your Yahoo mail may be flawed. What  does \u201cflawed\u201d mean? It means that they can steal your password and mail and they  can plant some malware on your side. They can also steal your sensitive data. So  what is there to do? Patch and check everything, change all passwords and  improve your infrastructure\u2019s defenses, since it\u2019s neither the first nor the last  time you will see such a flaw.<\/p>\n<p>And the  person who has no knowledge of science gets impressed, comprehends everything  and asks you: where in blazes were you, techies, before? Why were you not sounding  the alarm? Why were there no announcements in \u201cTimes\u201d and on CNN? Then it  appears in most cases that everything was there: alarms, announcements,  discussions and research. Technical ones. Seriously, <strong>in order to evaluate the scope of a certain flaw, we need to know what  makes the bug, the attack scenarios, and be able to calculate possible damage  (or, simply put, what can be stolen and how much).<\/strong><\/p>\n<p>Now, these  are tasks so different that in most cases different people work on them, and  even if they find a way to join forces, they don\u2019t care about explaining the  nature of the problem to a wide audience.<\/p>\n<p>That\u2019s why  for non-tech people, problems like Heartbleed seem to appear out of the blue.<\/p>\n<p>Now, the  GNU C Library flaw is in the \u201ctechy\u201d stage right now. The vulnerability had  been discovered, its influence on the security is proven, even some attack  scenarios have been envisioned already. But it\u2019s still unclear how it can turn  out in real life, within a real infrastructure and what scope the damage could  have.<\/p>\n<p>An  unprepared person will most likely see the problem\u2019s description this way:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/02\/06020253\/4-1.gif\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/02\/06020253\/4-1.gif\" alt=\"4\" width=\"640\" height=\"480\" class=\"aligncenter size-full wp-image-3631\"><\/a><\/p>\n<p>I\u2019ll try to  explain what happened to GLIBC as easily as possible. <em>First of all, I have to state I\u2019m not a coder. My job is to popularize complex  things to a wider audience. This blog is barely a place where the GLIBC  technical details are appropriate. I\u2019d like to see your comment below the text.  How would you solve the task \u201cexplain it simply\u201d? What would you say  differently? <s>Have I explained everything properly<\/s>? Marketing  people use an easy tool; they write an important concept thrice, making a short  text, then a longer one, and then the longest one. Finally, according to the  situation, they will use one of them. I\u2019ll try it that way. <\/em><\/p>\n<blockquote class=\"twitter-pullquote\"><p>For non-tech people, problems like #Heartbleed seem to appear out of the blue. In fact they don\u2019t.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FY1N9&amp;text=For++non-tech+people%2C+problems+like+%23Heartbleed+seem+to+appear+out+of+the+blue.+In++fact+they+don%26%238217%3Bt.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>The short version:<\/strong><\/p>\n<p>Update the  software on a PC and servers regularly. It improves the security. Recently  there was a serious bug in Linux found, and it should be patched as well, if  you are using Linux.<\/p>\n<p><strong>The longer one:<\/strong><\/p>\n<p>The GLIBC  flaw affects almost all Linux-based systems; in theory, it allows the running  of an arbitrary code, so it is quite dangerous. There are no menacing real life  attack scenarios yet, but it doesn\u2019t mean they will not be appearing in the  future. So the software should be updated regularly.<\/p>\n<p><strong>The longest variant: <\/strong><\/p>\n<p>GLIBC is a standard C library for all  Linux-based operating systems. It contains a large number of programs  performing standard tasks like displaying something to monitor, allocating an  area in memory for an application, etc. It is used by those who write Linux  programs; instead of writing a unique code for every task, they \u201ctake\u201d a  certain program from the GNU C Library. Thus developers save on time and  provide a standardized approach to performing typical tasks.<\/p>\n<p>So what is  most important here is to understand that GLIBC affects a huge number of  programs: if there is an error in the code within this library, it can affect  the performance of a program that contains this code. And if the code is  vulnerable, so are the programs using it. See?<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/02\/06020252\/5-1.jpg\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/02\/06020252\/5-1.jpg\" alt=\"5\" width=\"800\" height=\"534\" class=\"aligncenter size-full wp-image-3632\"><\/a><\/p>\n<p>Let\u2019s move  on. This vulnerability had been discovered in the function family, gethostbyname.  These are small programs from the GLIBC collection that perform a single simple  task: getting a website name on input (<a href=\"http:\/\/www.kaspersky.com\" target=\"_blank\" rel=\"noopener nofollow\">www.kaspersky.com<\/a>). They yield its IP address in the  form: 123.123.123.123. If your program needs to perform such a task (and almost  every network program needs it), you\u2019re addressing this function.<\/p>\n<p>The problem  is that the function isn\u2019t checking the input well enough. How is it going  usually? A program receives some data on input and wants to write it into the  specifically allocated area in memory, an area of a <em>certain size. <\/em>It does not check, at all, whether the data is going  to fit there. So what? Data is also written outside of the allocated zone. Why  is this bad? First, other data related to this or some other program can be  contained there already, so that program may stop working. This is the  best-case scenario. At worst, the data can replace the code which is supposed  to be executed. And if we manage to \u201cfeed\u201d the buggy program a piece of code  and make sure it is written the right way to the right place, <strong>we can run our own program (an arbitrary  code) on a PC without asking anyone. <\/strong><\/p>\n<p>Now, we\u2019ve  shown the problem. What are the attack scenarios? The Qualys researchers <a href=\"https:\/\/www.qualys.com\/research\/security-advisories\/GHOST-CVE-2015-0235.txt\" target=\"_blank\" rel=\"noopener nofollow\">have shown<\/a> how an arbitrary code can be run  exploiting this flaw, using this flaw, when <a href=\"http:\/\/www.exim.org\/\" target=\"_blank\" rel=\"noopener nofollow\">Exim<\/a> (a mail client) addresses  gethostbyname functions. Theoretically we can attack the mail server of a company  using Exim and run an arbitrary code there that way. Can we steal corporate  mail or access important documents or inflict some other real damage?  Theoretically, <strong>we can.<\/strong> But  considering all details and provisions (not mentioned here), we can\u2019t evaluate  the danger level of using this bug to still the real-world data. <em>For now.<\/em><\/p>\n<p>And that\u2019s  how GLIBC is different from Heartbleed. With that bug we had an obvious and  well-defined peril. This current threat is purely theoretic. While describing  the vulnerability, I omitted a number of important provisions: the  gethostbyname functions are obsolete already, the conditions needed to create  the buffer overflow situation here are extremely specific and when we try to  fit the flaw to the programs using this function, things get really  complicated.<\/p>\n<p>Again, <em>for now<\/em>. There is a possibility that  someone (hopefully, a security researcher and not a criminal) will find a way  to crack the Linux servers <em>in droves <\/em>using  this vulnerability. Then this vulnerability will be covered by Forbes, US  Weekly and CNN, while Fox News will run a talk show on the matter. Predictably,  everyone will say, <em>how come that bug has  existed since 2000 and nobody noticed? <\/em>But it will be too late. Hence the conclusion:  Get things patched in time. The discovered vulnerabilities should be covered  even if the menace looks \u2018phantom\u2019 \u2013 <em>for  now.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today we discuss the most important news on information security from January.<\/p>\n","protected":false},"author":53,"featured_media":15750,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[648,2290,97,2291],"class_list":{"0":"post-3627","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cryptolocker","10":"tag-glibc","11":"tag-security-2","12":"tag-top5"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/non-conventional-top-security-news-stories-january-2015\/3627\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/non-conventional-top-security-news-stories-january-2015\/3627\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/non-conventional-top-security-news-stories-january-2015\/3627\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cryptolocker\/","name":"cryptolocker"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3627"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3627\/revisions"}],"predecessor-version":[{"id":33465,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3627\/revisions\/33465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15750"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}