{"id":21623,"date":"2014-01-07T06:02:27","date_gmt":"2014-01-07T14:02:27","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=21623"},"modified":"2016-10-07T12:19:41","modified_gmt":"2016-10-07T19:19:41","slug":"flashback-botnet-is-adrift","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/","title":{"rendered":"Flashback Botnet is Adrift"},"content":{"rendered":"<p>In 2011, Intego&#8217;s Malware Research Team discovered <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-september-26-2011-mac-flashback-trojan-horse-masquerades-as-flash-player-installer-package\/\" target=\"_blank\">OSX\/Flashback.A<\/a>, a trojan horse that used social engineering to trick users into installing a malicious Flash player package. Then in early 2012, Flashback spread to infect up to 600,000 machines, as new variants were using <a title=\"New Flashback Variant Takes Advantage of Unpatched Java Vulnerability\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-flashback-variant-takes-advantage-of-unpatched-java-vulnerability\/\" target=\"_blank\">Java exploits and drive-by downloads<\/a>. Today, our latest research shows that the Flashback botnet is adrift and still in the wild.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/\" target=\"_blank\">Once installed on a Mac<\/a>, Flashback created a backdoor, allowing it to take almost any activity on the infected machine. Users with infected Macs are at risk of being exposed to an almost limitless variety of malicious actions, as hackers can access infected Macs and snoop on the user, copying usernames and passwords, and more.<\/p>\n<p>The Apple Product Security Response team took serious actions in 2012 to mitigate the threat using XProtect and security updates (including a\u00a0<a title=\"Apple Releases Standalone Flashback Removal Tool\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-standalone-flashback-removal-tool\/\">Malware Removal Tool<\/a>), however, the botnet count was only divided by six according to <a title=\"Flashback Mac Malware: Number of Infected Macs Not Decreasing (Update)\" href=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-number-of-infected-macs-not-decreasing\/\" target=\"_blank\">our sinkhole<\/a>. Since then, Apple quietly shut down domains, eventually acquiring all generated domains until end of year 2013, i.e. one domain name registered on five TLDs each day (.com, .net, .info, .in, .kz).<\/p>\n<p>Now in 2014, it appears the Flashback botnet is silently adrift and still in the wild.<\/p>\n<p>Intego purchased some of the command and control (C&amp;C) server domain names to monitor the Flashback threat that infected hundreds of thousands of Macs. Beginning January 2, we studied those domains and our sinkhole servers recorded all connections from Macs where Flashback is still active and trying to contact the C&amp;C servers.<\/p>\n<p>Below is a screenshot of the Apache Server log:<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/apache-server-log-flashback-malware\/\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-21681\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Apache-Server-log-Flashback-malware.png\" alt=\"Apache Server log screenshot shows the date of the http packet, the domain name used by the flashback malware, the URL, the Flashback version, and more\" width=\"600\" height=\"245\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Apache-Server-log-Flashback-malware.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Apache-Server-log-Flashback-malware-150x61.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Apache-Server-log-Flashback-malware-300x122.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>After recording for five days, we counted at least 22,000 infected machines. As of this morning, we counted 14,248\u00a0unique identifiers of the latest Flashback variants:<\/p>\n<table style=\"margin-bottom: 10px; text-align: center;\">\n<tbody>\n<tr>\n<th style=\"border-bottom: 1px solid grey; font-weight: bold;\" width=\"60\">Version<\/th>\n<th style=\"border-bottom: 1px solid grey; font-weight: bold;\" width=\"60\">Count<\/th>\n<\/tr>\n<tr>\n<td>sv:1<\/td>\n<td>1,556<\/td>\n<\/tr>\n<tr>\n<td>sv:2<\/td>\n<td>1,813<\/td>\n<\/tr>\n<tr>\n<td>sv:4<\/td>\n<td>955<\/td>\n<\/tr>\n<tr>\n<td>sv:5<\/td>\n<td>9,924<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>While the domain names still registered by Apple and other security researchers are being closely monitored for now, the <a title=\"Flashback Author Identified by Brian Krebs\" href=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-author-identified-by-brian-krebs\/\" target=\"_blank\">author<\/a> can buy the domain names in the future, or the botnet could even slip into other malicious hands if the C&amp;C server domains were no longer monitored by security researchers.<\/p>\n<p>By design, Flashback is\u00a0<a title=\"More About the Flashback Trojan Horse\" href=\"https:\/\/www.intego.com\/mac-security-blog\/more-about-the-flashback-trojan-horse\/\" target=\"_blank\">versatile<\/a>; it is a nasty little malware. It is self-encrypted, and with the UUID of the infected machine it sends unique information about the machine owner to its command and control server, so targeted variants could already be in the wild.<\/p>\n<p>Intego strongly encourages all Mac users to verify that their machine is not infected with Flashback. Mac users can download our <a title=\"Mac Antivirus Malware Detection Test Ranks Intego #1\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-antivirus-malware-detection-test-ranks-intego-1\/\">top ranked<\/a> antivirus product, <a title=\"Mac Internet Security\" href=\"https:\/\/www.intego.com\/virusbarrier\" target=\"_blank\">Intego VirusBarrier<\/a>, to find and remove any variant of Flashback, and any other malware on your Mac.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2011, Intego&#8217;s Malware Research Team discovered OSX\/Flashback.A, a trojan horse that used social engineering to trick users into installing a malicious Flash player package. Then in early 2012, Flashback spread to infect up to 600,000 machines, as new variants were using Java exploits and drive-by downloads. Today, our latest research shows that the Flashback [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":21869,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[505,153,174,86,859,509],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In 2011, Intego&#039;s Malware Research Team discovered OSX\/Flashback.A, a trojan horse that used social engineering to trick users into installing a malicious\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Flashback Botnet is Adrift - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In 2011, Intego&#039;s Malware Research Team discovered OSX\/Flashback.A, a trojan horse that used social engineering to trick users into installing a malicious\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-07T14:02:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-07T19:19:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Flashback-Botnet-Threat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"325\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arnaud Abbati\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Flashback-Botnet-Threat.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Flashback-Botnet-Threat.jpg\",\"width\":325,\"height\":350},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/\",\"name\":\"Flashback Botnet is Adrift - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#primaryimage\"},\"datePublished\":\"2014-01-07T14:02:27+00:00\",\"dateModified\":\"2016-10-07T19:19:41+00:00\",\"description\":\"In 2011, Intego's Malware Research Team discovered OSX\/Flashback.A, a trojan horse that used social engineering to trick users into installing a malicious\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Flashback Botnet is Adrift\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/cbc02d2ed3bdeeb64e8cf2737c231ce8\"},\"headline\":\"Flashback Botnet is Adrift\",\"datePublished\":\"2014-01-07T14:02:27+00:00\",\"dateModified\":\"2016-10-07T19:19:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#webpage\"},\"wordCount\":438,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Flashback-Botnet-Threat.jpg\",\"keywords\":[\"Botnet\",\"Flashback\",\"Mac\",\"Malware\",\"OSX\/Flashback\",\"Sinkhole\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/cbc02d2ed3bdeeb64e8cf2737c231ce8\",\"name\":\"Arnaud Abbati\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ac67b13519d6788f0f6e2df392735a3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ac67b13519d6788f0f6e2df392735a3?s=96&d=mm&r=g\",\"caption\":\"Arnaud Abbati\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/aabbati\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In 2011, Intego's Malware Research Team discovered OSX\/Flashback.A, a trojan horse that used social engineering to trick users into installing a malicious","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/","og_locale":"en_US","og_type":"article","og_title":"Flashback Botnet is Adrift - The Mac Security Blog","og_description":"In 2011, Intego's Malware Research Team discovered OSX\/Flashback.A, a trojan horse that used social engineering to trick users into installing a malicious","og_url":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-01-07T14:02:27+00:00","article_modified_time":"2016-10-07T19:19:41+00:00","og_image":[{"width":325,"height":350,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Flashback-Botnet-Threat.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Arnaud Abbati","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Flashback-Botnet-Threat.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Flashback-Botnet-Threat.jpg","width":325,"height":350},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/","name":"Flashback Botnet is Adrift - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#primaryimage"},"datePublished":"2014-01-07T14:02:27+00:00","dateModified":"2016-10-07T19:19:41+00:00","description":"In 2011, Intego's Malware Research Team discovered OSX\/Flashback.A, a trojan horse that used social engineering to trick users into installing a malicious","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Flashback Botnet is Adrift"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/cbc02d2ed3bdeeb64e8cf2737c231ce8"},"headline":"Flashback Botnet is Adrift","datePublished":"2014-01-07T14:02:27+00:00","dateModified":"2016-10-07T19:19:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#webpage"},"wordCount":438,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Flashback-Botnet-Threat.jpg","keywords":["Botnet","Flashback","Mac","Malware","OSX\/Flashback","Sinkhole"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/flashback-botnet-is-adrift\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/cbc02d2ed3bdeeb64e8cf2737c231ce8","name":"Arnaud Abbati","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ac67b13519d6788f0f6e2df392735a3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ac67b13519d6788f0f6e2df392735a3?s=96&d=mm&r=g","caption":"Arnaud Abbati"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/aabbati\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/01\/Flashback-Botnet-Threat.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-5CL","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/21623"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=21623"}],"version-history":[{"count":127,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/21623\/revisions"}],"predecessor-version":[{"id":36901,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/21623\/revisions\/36901"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/21869"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=21623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=21623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=21623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}