{"id":15709,"date":"2013-07-08T13:18:58","date_gmt":"2013-07-08T20:18:58","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=15709"},"modified":"2016-02-12T10:40:38","modified_gmt":"2016-02-12T18:40:38","slug":"how-malware-is-researched-part-2","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/","title":{"rendered":"How Malware is Researched \u2013 Part 2"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Goat.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-15767\" alt=\"Goat\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Goat.jpg\" width=\"500\" height=\"500\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Goat.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Goat-150x150.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Goat-300x300.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>There are lots of useful ways of looking at a file to determine whether it\u2019s malware, and if it is, what it\u2019s trying to do. Some of those ways involve dissecting the file on disk for clues to a file\u2019s structure (static analysis), and some of those ways involve watching the file in action (dynamically) to see what it actually does. These are both useful pieces of the puzzle, and in most instances researchers will first use static and then dynamic methods of analyzing the file.<\/p>\n<p>In <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/\">Part 1 \u2013 Static Analysis<\/a> we covered some methods of Static analysis; namely Text View, Hex View and Assembler View. All three methods are ways of looking for clues that tell you what a file might be trying to do. For instance, is the file armored in some way to dissuade analysis? Is the text in the file indicative of a professional piece of software, or is it more casual, using curse-words or \u201c<a href=\"http:\/\/www.computerhope.com\/jargon\/l\/leetspea.htm\" target=\"_blank\">leetspeak<\/a>?\u201d Does the file have structures that seem to be indicative of exploiting vulnerabilities in other software, or does it seem to be trying to achieve persistence? These things are not conclusive evidence alone, but help create a picture of what the file is trying to do.<\/p>\n<p>The other important part of static analysis is to figure out what sorts of dependencies a file has. The first and most obvious dependency is the type of operating system \u2013 does this file run on Windows, OS X or Linux, for example? A file may have other requirements to run too, depending on what programming language it was written in, or if it tries to spread (such as through an instant messaging or peer-to-peer file sharing app) or infect certain types of files.<\/p>\n<p>Once we have given the file a thorough look with static analysis methods, we hopefully have a good picture of how we need to set up our test environments.<\/p>\n<h3><b>Goat Machines<\/b><\/h3>\n<p>You know that scene in Jurassic Park where they\u2019re driving through the park and a <a href=\"http:\/\/www.youtube.com\/watch?v=tlk0PRrDWWk\" target=\"_blank\">goat is brought up as a snack for the T-Rex<\/a>? (Apologies, I could only find the scene with added sheep-commentary.) In malware analysis, we have a similar idea for tempting malware to do its thing. Researchers use what we call a \u201csacrificial goat machine\u201d \u2013 or just \u201cgoat\u201d for short. This machine is set up to be the tastiest possible treat for the malware, by giving it all the conditions it needs to do what it intends to do, and appearing as much as possible to be a real user\u2019s machine rather than a safely quarantined test machine.<\/p>\n<p>In order to do this quickly, most researchers have several standard \u201cimages\u201d that are either physical or virtual machines that can be quickly taken back to a known-clean state. This is helpful for either repeating analysis on one file if needed, or getting ready to analyze other files. Usually these include an image for various different OS versions, to see if the malware behaves differently on one versus another. If, for instance, a researcher specializes in just Mac threats they might have an image for all the supported version of OS X plus any versions that are in beta. The same goes for researchers specializing in other operating systems as well. (Though things get complicated when you throw in different Linux flavors or the limitations of different carrier or handset-manufacturers\u2019 versions of Android.)<\/p>\n<p>Once a researcher has an image all set up, the next thing he or she needs to do is start up any recording tools they might have, so they can see what changes are made by the file. A lot of malware is essentially silent, if you\u2019re just looking at it on your screen, so we need to have tools that will report any system changes or network traffic. And those tools need to be smart enough not to be fooled by <a href=\"https:\/\/www.intego.com\/mac-security-blog\/rootkits-defined-what-they-are-and-how-they-can-be-used-maliciously\/\" target=\"_blank\">rootkit techniques<\/a> that try to hide the changes.<\/p>\n<p>When everything\u2019s all ready to go, the researcher will start the file up (usually just double-clicking it), and then let it do its thing for a few minutes. Sometimes the file will need a little extra coaxing to perform its various actions, so a researcher will usually spend those minutes interacting with the goat system like a regular user would, by opening files and moving around the system. This can activate various trigger-events that malware sometimes have, hoping to verify that it is on a real user\u2019s machine rather than in an automated <a href=\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/\" target=\"_blank\">honeypot<\/a> machine.<\/p>\n<h3><b> Debugging Files<\/b><\/h3>\n<p>Sometimes it can be helpful to isolate specific parts of a file\u2019s behavior, especially if a sample is going to extraordinary lengths to hide its actions \u2013 and for this purpose, we have what\u2019s called a Debugger. These tools were originally created for programmers to help them step through small sections of code, so they could find and correct bugs. Debugging files can be equally useful to a malware researcher that wants to step through small sections of code to figure out certain specific behavior within a file. It can be very helpful to get a file\u2019s decryption routine, or to figure out passwords they use to join <a href=\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/\" target=\"_blank\">C&amp;C channels<\/a>, as well as to identify certain conditions used for trigger events, for instance.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Debug.png\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-15711\" alt=\"Debug\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Debug.png\" width=\"600\" height=\"734\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Debug.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Debug-122x150.png 122w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Debug-245x300.png 245w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>If you have ever wondered why you sometimes see really in-depth analysis way after a particular malware was first discovered, it\u2019s often because the researcher went through much of the malware\u2019s code with a debugger. Most malware is pretty small in size, but much of the code is usually convoluted and repetitive. Going through a sample in a debugger may require analyzing a section of code once, changing a variable, stepping back through the code again, then changing another variable and doing it yet again\u2026 it can be a very arduous and time-consuming process. This sort of thorough analysis isn\u2019t something that gets done with every sample, but with high profile or particularly tricky malware as needed.<\/p>\n<h3><b>In the End<\/b><\/h3>\n<p>Malware analysis can be a fairly quick and dirty process or a months-long process, depending on the skill and effort of the malware author that created it as well as the malware analyst that receives it. If an analyst is looking at his or her umpteenth variant of a family that\u2019s been publicly released, it can be dealt with in a matter of minutes. If it\u2019s the first sample of a heavily armored and feature-rich spyware that\u2019s hitting hundreds of thousands of users, dozens of researchers around the world are probably going to spend a lot of long nights trying to provide useful and juicy tidbits about its behavior. Hopefully we\u2019ve given you some insight into what that process entails, so it\u2019ll seem less mysterious.<\/p>\n<p><span style=\"font-size: x-small;\"><i>photo credit: &#8216;<a href=\"http:\/\/www.flickr.com\/photos\/63114962@N08\/8628767002\">Sing It Again<\/a>&#8216; Found on <a href=\"http:\/\/www.flickrcc.net\" target=\"_blank\">flickrcc<\/a><\/i><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are lots of useful ways of looking at a file to determine whether it\u2019s malware, and if it is, what it\u2019s trying to do. Some of those ways involve dissecting the file on disk for clues to a file\u2019s structure (static analysis), and some of those ways involve watching the file in action (dynamically) [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":15771,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[493,489,491,495],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"There are lots of useful ways of looking at a file to determine whether it\u2019s malware, and if it is, what it\u2019s trying to do. Some of those ways involve\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Malware is Researched \u2013 Part 2 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"There are lots of useful ways of looking at a file to determine whether it\u2019s malware, and if it is, what it\u2019s trying to do. Some of those ways involve\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-08T20:18:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:40:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/GoatFT.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/GoatFT.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/GoatFT.png\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/\",\"name\":\"How Malware is Researched \\u2013 Part 2 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#primaryimage\"},\"datePublished\":\"2013-07-08T20:18:58+00:00\",\"dateModified\":\"2016-02-12T18:40:38+00:00\",\"description\":\"There are lots of useful ways of looking at a file to determine whether it\\u2019s malware, and if it is, what it\\u2019s trying to do. Some of those ways involve\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Malware is Researched \\u2013 Part 2\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"How Malware is Researched \\u2013 Part 2\",\"datePublished\":\"2013-07-08T20:18:58+00:00\",\"dateModified\":\"2016-02-12T18:40:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#webpage\"},\"wordCount\":1152,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/GoatFT.png\",\"keywords\":[\"debugger\",\"Goat Machine\",\"Honeypot\",\"Malware Analysis\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"There are lots of useful ways of looking at a file to determine whether it\u2019s malware, and if it is, what it\u2019s trying to do. Some of those ways involve","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/","og_locale":"en_US","og_type":"article","og_title":"How Malware is Researched \u2013 Part 2 - The Mac Security Blog","og_description":"There are lots of useful ways of looking at a file to determine whether it\u2019s malware, and if it is, what it\u2019s trying to do. Some of those ways involve","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-07-08T20:18:58+00:00","article_modified_time":"2016-02-12T18:40:38+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/GoatFT.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/GoatFT.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/GoatFT.png","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/","name":"How Malware is Researched \u2013 Part 2 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#primaryimage"},"datePublished":"2013-07-08T20:18:58+00:00","dateModified":"2016-02-12T18:40:38+00:00","description":"There are lots of useful ways of looking at a file to determine whether it\u2019s malware, and if it is, what it\u2019s trying to do. Some of those ways involve","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How Malware is Researched \u2013 Part 2"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"How Malware is Researched \u2013 Part 2","datePublished":"2013-07-08T20:18:58+00:00","dateModified":"2016-02-12T18:40:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#webpage"},"wordCount":1152,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/GoatFT.png","keywords":["debugger","Goat Machine","Honeypot","Malware Analysis"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/GoatFT.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-45n","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15709"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=15709"}],"version-history":[{"count":38,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15709\/revisions"}],"predecessor-version":[{"id":50239,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15709\/revisions\/50239"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/15771"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=15709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=15709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=15709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}