{"id":3472,"date":"2011-10-28T20:37:49","date_gmt":"2011-10-29T03:37:49","guid":{"rendered":"http:\/\/blog.intego.com\/?p=3472"},"modified":"2024-04-18T03:26:21","modified_gmt":"2024-04-18T10:26:21","slug":"new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/","title":{"rendered":"New Malware DevilRobber Grabs Files and Bitcoins, Performs Bitcoin Mining, and More"},"content":{"rendered":"<p>Intego has discovered a new malware called DevilRobber.A. This malware, which has been found in several applications distributed via BitTorrent trackers, steals data and Bitcoin virtual money, and uses CPU and GPU time on infected Macs to perform &#8220;Bitcoin mining.&#8221;<\/p>\n<p>This malware is complex, and performs many operations. It is a combination of several types of malware: it is a Trojan horse, since it is hidden inside other applications; it is a backdoor, as it opens ports and can accept commands from command and control servers; it is a stealer, as it steals data and Bitcoin virtual money; and it is a spyware, as it sends personal data to remote servers.<\/p>\n<p>DevilRobber has been found in a small number of Mac applications that are distributed via BitTorrent trackers, including a popular graphic program.<\/p>\n<p><center><br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/devilrobber.png\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-3473\" title=\"devilrobber\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/devilrobber.png\" alt=\"\" width=\"351\" height=\"331\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/devilrobber.png 351w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/devilrobber-300x282.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/devilrobber-100x94.png 100w\" sizes=\"(max-width: 351px) 100vw, 351px\" \/><\/a><\/center>When the doctored application is launched, a preflight script looks for Little Snitch, a network traffic blocker; if Little Snitch is found, the program terminates. If not, the malware adds a LaunchAgent file in the user&#8217;s ~\/Library\/LaunchAgents folder, to ensure that the malware launches on each reboot or login. The malware then searches for specific types of files with Spotlight, and writes data in a text file. It saves the user&#8217;s bash history file (this is a history of commands run in the Terminal application), saves the user&#8217;s Safari history file, takes a screenshot and saves that, and, if the user has a Bitcoin wallet, saves that as well. Another variant Intego has discovered also saves the user&#8217;s keychain files.<\/p>\n<p>DevilRobber then launches a proxy on port 34522, and waits for a user to enter their user name and password; if this happens, it records these credentials, and sends them to a remote server. The malware continues performing other operations, such as posting data to a remote server, looking for the infected Mac&#8217;s external IP address, scanning the local network the Mac is on, searching for child pornography, and more.<\/p>\n<p>One of the main tasks of this malware is to perform &#8220;Bitcoin mining.&#8221; This procedure is a way of defrauding the Bitcoin virtual money service by making calculations and generating Bitcoins. (<a href=\"https:\/\/www.youtube.com\/watch?v=3DW_MaoCmGU\">Learn more about how to protect your Mac from unwanted Bitcoin mining<\/a>.)<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/3DW_MaoCmGU?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>While this malware is fairly sophisticated in its actions, it is not very widespread. For now, Intego has only seen DevilRobber in a handful of Mac applications distributed via BitTorrent trackers. Mac users should avoid downloading software from untrusted sites, notably those that distribute software illegally, such as BitTorrent trackers. If possible, always download software from the publishers&#8217; web sites, or from trusted download sites.<\/p>\n<p>Intego&#8217;s the threat filters for <a href=\"https:\/\/www.intego.com\/virusbarrier\/\">VirusBarrier<\/a>\u00a0dated October 28, 2011 or later, will spot and block this malware as OSX\/DevilRobber.A.<\/p>\n<div class=\"blog-download\">\n<p class=\"button\"><a href=\"https:\/\/www.intego.com\/demo?blog2\">Download 30-day free trial<\/a><\/p>\n<h4><a href=\"https:\/\/www.intego.com\/demo?blog2\">Protect your Mac from malware<\/a><\/h4>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Intego has discovered a new malware called DevilRobber.A. This malware, which has been found in several applications distributed via BitTorrent trackers, steals data and Bitcoin virtual money, and uses CPU and GPU time on infected Macs to perform &#8220;Bitcoin mining.&#8221; This malware is complex, and performs many operations. It is a combination of several types [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3429,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[2752,4156,2749,86,4722],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego has discovered a new malware called DevilRobber.A. This malware, which has been found in several applications distributed via BitTorrent trackers,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Malware DevilRobber Grabs Files and Bitcoins, Performs Bitcoin Mining, and More - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego has discovered a new malware called DevilRobber.A. This malware, which has been found in several applications distributed via BitTorrent trackers,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-10-29T03:37:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-18T10:26:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/Warning.png\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"120\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/Warning.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/Warning.png\",\"width\":\"128\",\"height\":\"120\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/\",\"name\":\"New Malware DevilRobber Grabs Files and Bitcoins, Performs Bitcoin Mining, and More - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#primaryimage\"},\"datePublished\":\"2011-10-29T03:37:49+00:00\",\"dateModified\":\"2024-04-18T10:26:21+00:00\",\"description\":\"Intego has discovered a new malware called DevilRobber.A. This malware, which has been found in several applications distributed via BitTorrent trackers,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Malware DevilRobber Grabs Files and Bitcoins, Performs Bitcoin Mining, and More\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"New Malware DevilRobber Grabs Files and Bitcoins, Performs Bitcoin Mining, and More\",\"datePublished\":\"2011-10-29T03:37:49+00:00\",\"dateModified\":\"2024-04-18T10:26:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#webpage\"},\"wordCount\":481,\"commentCount\":13,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/Warning.png\",\"keywords\":[\"Bitcoins\",\"Cryptominer\",\"DevilRobber\",\"Malware\",\"Stealer Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego has discovered a new malware called DevilRobber.A. This malware, which has been found in several applications distributed via BitTorrent trackers,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/","og_locale":"en_US","og_type":"article","og_title":"New Malware DevilRobber Grabs Files and Bitcoins, Performs Bitcoin Mining, and More - The Mac Security Blog","og_description":"Intego has discovered a new malware called DevilRobber.A. This malware, which has been found in several applications distributed via BitTorrent trackers,","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/","og_site_name":"The Mac Security Blog","article_published_time":"2011-10-29T03:37:49+00:00","article_modified_time":"2024-04-18T10:26:21+00:00","og_image":[{"width":"128","height":"120","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/Warning.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/Warning.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/Warning.png","width":"128","height":"120"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/","name":"New Malware DevilRobber Grabs Files and Bitcoins, Performs Bitcoin Mining, and More - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#primaryimage"},"datePublished":"2011-10-29T03:37:49+00:00","dateModified":"2024-04-18T10:26:21+00:00","description":"Intego has discovered a new malware called DevilRobber.A. This malware, which has been found in several applications distributed via BitTorrent trackers,","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New Malware DevilRobber Grabs Files and Bitcoins, Performs Bitcoin Mining, and More"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"New Malware DevilRobber Grabs Files and Bitcoins, Performs Bitcoin Mining, and More","datePublished":"2011-10-29T03:37:49+00:00","dateModified":"2024-04-18T10:26:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#webpage"},"wordCount":481,"commentCount":13,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/Warning.png","keywords":["Bitcoins","Cryptominer","DevilRobber","Malware","Stealer Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-malware-devilrobber-grabs-files-and-bitcoins-performs-bitcoin-mining-and-more\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/10\/Warning.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-U0","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3472"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=3472"}],"version-history":[{"count":4,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3472\/revisions"}],"predecessor-version":[{"id":100254,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3472\/revisions\/100254"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/3429"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=3472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=3472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=3472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}