{"id":12137,"date":"2013-05-15T09:11:24","date_gmt":"2013-05-15T16:11:24","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=12137"},"modified":"2013-07-08T13:24:19","modified_gmt":"2013-07-08T20:24:19","slug":"how-is-malware-researched","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/","title":{"rendered":"How is Malware Researched?"},"content":{"rendered":"<p><strong><\/strong>You may wonder what goes on behind the scenes between the time when researchers get malware samples and the time\u00a0virus definitions magically appear on your machine. All researchers do things a little differently, but there are some basic techniques that are common to a lot of them. For instance, which technique a researcher uses as his or her first or primary method of analyzing a file will depend on a lot of things. Some might seem obvious (such as how complicated or armored is the threat or how quickly do we need to analyze this), while others might seem a bit odd (how old is the researcher?).<\/p>\n<p>There are two basic types of research: static and dynamic. Static analysis is a bit like dissecting a frog in a laboratory, where the sample isn\u2019t moving around doing froggy things but you can see what it\u2019s designed to do. Dynamic analysis is like setting up a lab for live frogs, but all you can see is frogs doing their lively froggy things.<\/p>\n<p><strong>Part 1: Static Analysis \u2013 Under the Microscope<\/strong><\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBug.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-14301\" alt=\"MicroBug\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBug.jpg\" width=\"500\" height=\"268\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBug.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBug-150x80.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBug-300x160.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p><strong>Text View <\/strong><\/p>\n<p>There are a few ways to statically analyze malware, which are all different ways to represent machine code (the language any computer speaks) into things a human can make some sense out of. There are three levels at which you can view any file \u2013 Text, hex and assembler. Text is\u2026well, what you\u2019re viewing right now. It\u2019s a pretty imperfect and difficult way to view a file, because not all codes have a visible representation. And a lot of the codes translate to weird-looking characters like squiggly lines and happy faces. If you\u2019ve ever tried to view a file that is not strictly speaking a text file in a text viewer, you see what I mean.<\/p>\n<p>If a researcher understands what a sequence of characters represents in machine code, or if they are just looking for words that might give clues as to the function of a file, it can be a very quick and dirty way to figure out where to go next. The only researchers I\u2019ve ever met who look at a file only in text view are those guys that worked on computers way back when you had to program computers on huge stacks of paper punch cards. The rest of us look on at researchers using this technique as if we\u2019re watching a mystic that reads the future by casting bones or reading tea leaves.<\/p>\n<p>In the image below, you can see a file that&#8217;s shown in both text and hex view.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/viewer\/\" rel=\"attachment wp-att-12139\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12139\" title=\"Viewer\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Viewer.png\" width=\"383\" height=\"182\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Viewer.png 383w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Viewer-150x71.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Viewer-300x142.png 300w\" sizes=\"(max-width: 383px) 100vw, 383px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Hex View<br \/>\n<\/strong><\/p>\n<p>The next way of viewing the file is in hex. This is a representation of machine code in hexadecimal, which looks a little weird if you think of counting as including numbers from 0 to 9, because it\u2019s base sixteen instead of base ten. If you ever did alternate base math in school, this will probably give you horrible flashbacks. For anyone that needs a refresher: In hex, the numbers go from 0 to 9, but because you don\u2019t stop counting at ten, you count from 0 to 9 and then keep going from A to F. And when you get to F, you start at 10 (which equals sixteen) and increment that last digit, as the numbers get larger.<\/p>\n<p>As with viewing a file in text, you need to understand what those characters represent. Because hex shows you everything, not just printable characters, it\u2019s a little easier. But to a lot of researchers, viewing a file in hex alone is still a bit mystical. If there is encryption or other sorts of obfuscation, it\u2019ll look like a lot of gobbledygook. You&#8217;re probably not going to get much by way of hints in readable words.<\/p>\n<p><strong>Assembler View<\/strong><\/p>\n<p>Last and most definitely not least is assembler. This is the point at which the file starts looking a bit like a recognizable programming instructions that mere mortals can read. But because viewing a bunch of programming instructions is not linear like reading an article such as this one, it\u2019s not like you can start at the top of a file in assembler view and just read it down to the end and understand what\u2019s going on. There\u2019s a lot of jumping and looping around that can be hard to follow when you\u2019re looking at a flat representation of tens of thousands or even millions of instructions. But it\u2019s a good place to start, and it\u2019s the jumping off point for dynamic analysis.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/assembler\/\" rel=\"attachment wp-att-12143\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12143\" title=\"Assembler\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Assembler.png\" width=\"251\" height=\"108\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Assembler.png 251w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/Assembler-150x64.png 150w\" sizes=\"(max-width: 251px) 100vw, 251px\" \/><\/a><\/p>\n<p><strong>In a Nutshell<br \/>\n<\/strong><\/p>\n<p>You can quickly view the outside of the metaphorical frog, to see if you can get an idea what sort of animal you\u2019re looking at, and what its basic structure and function are. Then you can dissect it to get a better idea of how those structures are linked together. Static analysis allows you to do that with a potential malware sample. While it\u2019s seldom enough information just to look at the structures of a specimen, it can give you a lot of clues about how you might need to set up an environment for dynamic analysis, or what areas are interesting enough for more in-depth analysis. In <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/\" target=\"_blank\">How Is Malware Researched \u2013\u00a0Part 2<\/a>, we will look at different types of dynamic analysis, which is what researchers use to understand how all those instructions come together to do their nefarious deeds.<\/p>\n<p><em><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/museumwales\/2385071146\/\">MuseumWales<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.0\/\">cc<\/a><\/span><\/em><br \/>\n<em><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/museumwales\/2384240281\/\">MuseumWales<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.0\/\">cc<\/a><\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may wonder what goes on behind the scenes between the time when researchers get malware samples and the time\u00a0virus definitions magically appear on your machine. All researchers do things a little differently, but there are some basic techniques that are common to a lot of them. For instance, which technique a researcher uses as [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":14307,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[503,501,495,497,499],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"You may wonder what goes on behind the scenes between the time when researchers get malware samples and the time\u00a0virus definitions magically appear on\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How is Malware Researched? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"You may wonder what goes on behind the scenes between the time when researchers get malware samples and the time\u00a0virus definitions magically appear on\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-15T16:11:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-07-08T20:24:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBugFT.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBugFT.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBugFT.png\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/\",\"name\":\"How is Malware Researched? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#primaryimage\"},\"datePublished\":\"2013-05-15T16:11:24+00:00\",\"dateModified\":\"2013-07-08T20:24:19+00:00\",\"description\":\"You may wonder what goes on behind the scenes between the time when researchers get malware samples and the time\\u00a0virus definitions magically appear on\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How is Malware Researched?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"How is Malware Researched?\",\"datePublished\":\"2013-05-15T16:11:24+00:00\",\"dateModified\":\"2013-07-08T20:24:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#webpage\"},\"wordCount\":919,\"commentCount\":4,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBugFT.png\",\"keywords\":[\"Assembler View\",\"Hex View\",\"Malware Analysis\",\"Static Analysis\",\"Text View\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"You may wonder what goes on behind the scenes between the time when researchers get malware samples and the time\u00a0virus definitions magically appear on","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/","og_locale":"en_US","og_type":"article","og_title":"How is Malware Researched? - The Mac Security Blog","og_description":"You may wonder what goes on behind the scenes between the time when researchers get malware samples and the time\u00a0virus definitions magically appear on","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-05-15T16:11:24+00:00","article_modified_time":"2013-07-08T20:24:19+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBugFT.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBugFT.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBugFT.png","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/","name":"How is Malware Researched? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#primaryimage"},"datePublished":"2013-05-15T16:11:24+00:00","dateModified":"2013-07-08T20:24:19+00:00","description":"You may wonder what goes on behind the scenes between the time when researchers get malware samples and the time\u00a0virus definitions magically appear on","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How is Malware Researched?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"How is Malware Researched?","datePublished":"2013-05-15T16:11:24+00:00","dateModified":"2013-07-08T20:24:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#webpage"},"wordCount":919,"commentCount":4,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBugFT.png","keywords":["Assembler View","Hex View","Malware Analysis","Static Analysis","Text View"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/MicroBugFT.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-39L","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12137"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=12137"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12137\/revisions"}],"predecessor-version":[{"id":14407,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12137\/revisions\/14407"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/14307"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=12137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=12137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=12137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}