	{"id":54286,"date":"2016-07-06T15:54:52","date_gmt":"2016-07-06T22:54:52","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=54286"},"modified":"2016-10-07T12:23:21","modified_gmt":"2016-10-07T19:23:21","slug":"eleanor-is-dangerous-mac-malware-that-can-steal-data","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/","title":{"rendered":"New Dangerous Mac Malware Masquerades as File Converter App"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-54319\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/Image-600x300.png\" alt=\"Backdoor Eleanor Mac Malware\" width=\"600\" height=\"300\" \/><\/p>\n<p>File converters are like email services. Everyone has a favorite, sometimes we use more than one, and we\u2019re always looking for something better. But what if that file converter you just downloaded proves incapable of doing what it promises? Worse yet, what if it has more devious intentions? If you recently downloaded the EasyDoc Converter freeware, malicious attackers have tricked you into installing dangerous Mac malware.<\/p>\n<p>Security researchers have discovered a nasty surprise hidden as a fake file converter application, called EasyDoc Converter, available on a number of download sites, that offers\u00a0everything but what users expected.\u00a0The EasyDoc Converter.app purports to be\u00a0a drag-and-drop file converter, but in reality has no beneficial functionality \u2013 instead it simply downloads a malicious script.<\/p>\n<p>The malicious app was available on the popular download site MacUpdate, but it has since been discontinued due to today\u2019s malware news.<\/p>\n<div id=\"attachment_54301\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-54301\" loading=\"lazy\" class=\"wp-image-54301 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/EasyDoc-Converter-malware.png\" alt=\"EasyDoc Converter malware\" width=\"750\" height=\"190\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/EasyDoc-Converter-malware.png 750w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/EasyDoc-Converter-malware-150x38.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/EasyDoc-Converter-malware-300x76.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/EasyDoc-Converter-malware-657x166.png 657w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><p id=\"caption-attachment-54301\" class=\"wp-caption-text\">EasyDoc Converter is no longer available from MacUpdate.<\/p><\/div>\n<p>The new Mac malware, identified by\u00a0<a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a>\u00a0as\u00a0<strong>OSX\/Eleanor<\/strong>, is a serious\u00a0threat and, if installed, can enable attackers to take full control of the compromised machine.<\/p>\n<p>The scourge opens a backdoor on infected Macs and, according to <a href=\"https:\/\/labs.bitdefender.com\/wp-content\/uploads\/2016\/07\/Backdoor-MAC-Eleanor_final.pdf\" target=\"_blank\">researchers<\/a>, can steal data, execute remote code and access the webcam, among other things.<\/p>\n<blockquote><p>\u201c[It] silently installs a backdoor in the system that gives the attacker full access to the operating system, tofile explorer, shell execution, webcam image and video capture and more. [\u2026] The application looks like a file converter, where you can drop files, but it has no real functionality.\u201d<\/p><\/blockquote>\n<p>If downloaded, executing the script \u201cEasyDoc Converter.app\/Resources\/script\u201d launches the application and begins the installation process.<\/p>\n<p>The backdoor components are installed in the user\u2019s directory:<\/p>\n<p style=\"padding-left: 30px;\">~\/Library\/.dropbox<\/p>\n<p>The malware also installs three agents, which are launched at each startup, in the user\u2019s directory:<\/p>\n<ol>\n<li>The TOR hidden service (allows to access the backdoor web service).<\/li>\n<\/ol>\n<pre>~\/Library\/LaunchAgents\/com.getdropbox.dropbox.integritycheck.plist<\/pre>\n<ol start=\"2\">\n<li>The php web service (the backdoor control panel).<\/li>\n<\/ol>\n<pre>~\/Library\/LaunchAgents\/com.getdropbox.dropbox.usercontent.plist<\/pre>\n<ol start=\"3\">\n<li>The PasteBin agent (used to store the unique TOR address of the controlled machine into pastebin.com).<\/li>\n<\/ol>\n<pre>~\/Library\/LaunchAgents\/com.getdropbox.dropbox.timegrabber.plist<\/pre>\n<p>If you believe your machine is infected, you can verify the presence of the directory and files mentioned above.<\/p>\n<h3>How to protect yourself<\/h3>\n<p>The application does not include an Apple developer signature, and is therefore easy to prevent from installing on Macs. It&#8217;s a good idea to check your Mac&#8217;s security settings to ensure you\u00a0only allow apps downloaded from the Mac App Store and identified developers.<\/p>\n<p>To check these\u00a0settings, go to <strong>System Preferences<\/strong> &gt; <strong>Security &amp; Privacy<\/strong> &gt; <strong>General<\/strong>, and choose to allow\u00a0apps downloaded from &#8220;Mac App Store and identified developers.&#8221;\u00a0With this setting enabled,\u00a0you\u00a0can protect your Mac from OSX\/Eleanor and from future attacks should they appear similarly in other software downloads.<\/p>\n<p>Furthermore, <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego VirusBarrier<\/a>\u00a0with up-to-date malware definitions will detect and eradicate the fake file converter malware as <strong>OSX\/Eleanor<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>File converters are like email services. Everyone has a favorite, sometimes we use more than one, and we\u2019re always looking for something better. But what if that file converter you just downloaded proves incapable of doing what it promises? Worse yet, what if it has more devious intentions? If you recently downloaded the EasyDoc Converter [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":54382,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[30,2983,2980,86,2986],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"File converters are like email services. Everyone has a favorite, sometimes we use more than one, and we\u2019re always looking for something better. But what\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Dangerous Mac Malware Masquerades as File Converter App - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"File converters are like email services. Everyone has a favorite, sometimes we use more than one, and we\u2019re always looking for something better. But what\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-06T22:54:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-07T19:23:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/Image-400x260.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/Image-400x260.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/Image-400x260.png\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/\",\"name\":\"New Dangerous Mac Malware Masquerades as File Converter App - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#primaryimage\"},\"datePublished\":\"2016-07-06T22:54:52+00:00\",\"dateModified\":\"2016-10-07T19:23:21+00:00\",\"description\":\"File converters are like email services. Everyone has a favorite, sometimes we use more than one, and we\\u2019re always looking for something better. But what\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Dangerous Mac Malware Masquerades as File Converter App\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"New Dangerous Mac Malware Masquerades as File Converter App\",\"datePublished\":\"2016-07-06T22:54:52+00:00\",\"dateModified\":\"2016-10-07T19:23:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#webpage\"},\"wordCount\":491,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/Image-400x260.png\",\"keywords\":[\"Backdoor\",\"Backdoor.MAC.Eleanor\",\"EasyDoc Converter\",\"Malware\",\"OSX\/Eleanor\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"File converters are like email services. Everyone has a favorite, sometimes we use more than one, and we\u2019re always looking for something better. But what","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/","og_locale":"en_US","og_type":"article","og_title":"New Dangerous Mac Malware Masquerades as File Converter App - The Mac Security Blog","og_description":"File converters are like email services. Everyone has a favorite, sometimes we use more than one, and we\u2019re always looking for something better. But what","og_url":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-07-06T22:54:52+00:00","article_modified_time":"2016-10-07T19:23:21+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/Image-400x260.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/Image-400x260.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/Image-400x260.png","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/","name":"New Dangerous Mac Malware Masquerades as File Converter App - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#primaryimage"},"datePublished":"2016-07-06T22:54:52+00:00","dateModified":"2016-10-07T19:23:21+00:00","description":"File converters are like email services. Everyone has a favorite, sometimes we use more than one, and we\u2019re always looking for something better. But what","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New Dangerous Mac Malware Masquerades as File Converter App"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"New Dangerous Mac Malware Masquerades as File Converter App","datePublished":"2016-07-06T22:54:52+00:00","dateModified":"2016-10-07T19:23:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#webpage"},"wordCount":491,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/Image-400x260.png","keywords":["Backdoor","Backdoor.MAC.Eleanor","EasyDoc Converter","Malware","OSX\/Eleanor"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/07\/Image-400x260.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-e7A","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/54286"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=54286"}],"version-history":[{"count":26,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/54286\/revisions"}],"predecessor-version":[{"id":54391,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/54286\/revisions\/54391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/54382"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=54286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=54286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=54286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}