{"id":6067,"date":"2012-09-21T11:28:55","date_gmt":"2012-09-21T18:28:55","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=6067"},"modified":"2016-02-12T10:32:04","modified_gmt":"2016-02-12T18:32:04","slug":"new-imuler-variant-found-steer-clear-of-your-dirty-pics","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/","title":{"rendered":"New Imuler Variant Found&#8211;Steer Clear of &#8220;Your Dirty Pics&#8221;"},"content":{"rendered":"<p><strong>Update &#8211; September 23, 2012<\/strong><\/p>\n<p>This Trojan is being targeted at Tibetan activists. It has been reported as being received in a threatening email with the following text:<\/p>\n<p><em>Subject:<\/em><br \/>\n&#8220;F*** you <em>[recipient name]<\/em>! I got your dirty naked photos.&#8221;<\/p>\n<p><em>Body:<\/em><br \/>\n&#8220;F*** you A******! You are a stupid jerk!\u00a0 I got your dirty naked photos.<br \/>\nYou&#8217;d better take care of yourself and get out of my way.<br \/>\nUnderstand??<br \/>\nF*** off!!!!!!!!!!!&#8221;<\/p>\n<p>____<\/p>\n<p>Intego has discovered a new version of the Imuler Trojan horse, which was <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-pdf-trojan-horse-surfaces-threat-is-low\/\">first discovered in September 2011<\/a>. Right now the risk is considered to be low \u2013 a sample of this malware was found on the VirusTotal website in a ZIP archive named \u201cyour dirty pics.zip.\u201d Inside the ZIP file is an application with an icon making it look like an image. If the file is run, it installs a backdoor without the need for an admin password.<\/p>\n<p>Below is a screenshot of the contents of the ZIP, which were housed in a file called &#8220;Your Dirt&#8221; (we took the liberty of covering the naughty bits):<\/p>\n<p align=\"center\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-6982\" title=\"imulercensored\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/09\/imulercensored.jpg\" width=\"328\" height=\"203\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/09\/imulercensored.jpg 328w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/09\/imulercensored-150x92.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/09\/imulercensored-300x185.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/09\/imulercensored-100x61.jpg 100w\" sizes=\"(max-width: 328px) 100vw, 328px\" \/><\/p>\n<p>The malware quickly deletes itself, replacing the original application with a real JPEG image corresponding to the one that was an application. The image is then displayed in the user\u2019s default image viewer. There is no visible trace of the application after this point, but it does remain active as a backdoor on the system.<\/p>\n<p>The Trojan creates the following malicious files on an affected system:<\/p>\n<ul>\n<li>\/tmp\/.mdworker<\/li>\n<li>\/tmp\/updtdata<\/li>\n<li>\/tmp\/launch-IORF98<\/li>\n<li>~\/Library\/LaunchAgents\/ScheduledSync.plist<\/li>\n<li>~\/Library\/LaunchAgents\/ScheduledSync<\/li>\n<\/ul>\n<p>Once active, the Imuler calls home to www.ouchmen.com to await further instructions. The Trojan survives reboot until the malicious files are removed.<\/p>\n<p>The Imuler Trojan has two main methods of stealing information:<\/p>\n<ol>\n<li>It searches the system for user data<\/li>\n<li>It can also take screenshots.<\/li>\n<\/ol>\n<p>Both are uploaded to the controller\u2019s server. It creates a unique identifier for the specific Mac to be able to link the Mac and the data it collects. The backdoor also allows new files to be downloaded onto an affected system. That functionality is active at the time of writing.<\/p>\n<p>Scaring or tantalizing users into viewing illicit pictures has always been a popular social-engineering tactic; many people cannot see past the possibility of viewing someone\u2019s private pictures, and in cases like this they\u2019ll pay the price. One of the oldest pieces of malware protection advice is not to view files that you were not expecting, and it still holds true in this instance. Whether it appears to come from your most trustworthy friend or a total stranger, if someone\u2019s unexpectedly sending you dirty pictures, you should probably go ahead and delete it. Afterwards, ask that friend if they meant to send dirty pics. If the photos are something you really, urgently need to see (you naughty minx you), your friend can probably re-send them.<\/p>\n<p>You can gain a small measure of additional protection against attacks like this if you <a href=\"http:\/\/www.fileinfo.com\/help\/mac_show_extensions\">configure Finder to show all file-extensions<\/a>.<\/p>\n<p align=\"center\"><img loading=\"lazy\" class=\"aligncenter\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/03\/finder-prefs-show-extensions.png\" width=\"435\" height=\"347\" \/><\/p>\n<p><a href=\"https:\/\/www.intego.com\/virusbarrier\">Intego VirusBarrier<\/a> users with up-to-date virus definitions are protected from this threat, which is detected as <strong>Trojan:OSX\/Imuler.D<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update &#8211; September 23, 2012 This Trojan is being targeted at Tibetan activists. It has been reported as being received in a threatening email with the following text: Subject: &#8220;F*** you [recipient name]! I got your dirty naked photos.&#8221; Body: &#8220;F*** you A******! You are a stupid jerk!\u00a0 I got your dirty naked photos. You&#8217;d [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8763,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[693,86,691,695],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Update - September 23, 2012 This Trojan is being targeted at Tibetan activists. It has been reported as being received in a threatening email with the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Imuler Variant Found-Steer Clear of &quot;Your Dirty Pics&quot; - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Update - September 23, 2012 This Trojan is being targeted at Tibetan activists. It has been reported as being received in a threatening email with the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-21T18:28:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:32:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Malware Alert from Intego\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/\",\"name\":\"New Imuler Variant Found-Steer Clear of \\\"Your Dirty Pics\\\" - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#primaryimage\"},\"datePublished\":\"2012-09-21T18:28:55+00:00\",\"dateModified\":\"2016-02-12T18:32:04+00:00\",\"description\":\"Update - September 23, 2012 This Trojan is being targeted at Tibetan activists. It has been reported as being received in a threatening email with the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Imuler Variant Found&#8211;Steer Clear of &#8220;Your Dirty Pics&#8221;\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"New Imuler Variant Found&#8211;Steer Clear of &#8220;Your Dirty Pics&#8221;\",\"datePublished\":\"2012-09-21T18:28:55+00:00\",\"dateModified\":\"2016-02-12T18:32:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#webpage\"},\"wordCount\":527,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"keywords\":[\"Imuler\",\"Malware\",\"Trojan:OSX\/Imuler.D\",\"Your Dirty Pics\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Update - September 23, 2012 This Trojan is being targeted at Tibetan activists. It has been reported as being received in a threatening email with the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/","og_locale":"en_US","og_type":"article","og_title":"New Imuler Variant Found-Steer Clear of \"Your Dirty Pics\" - The Mac Security Blog","og_description":"Update - September 23, 2012 This Trojan is being targeted at Tibetan activists. It has been reported as being received in a threatening email with the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-09-21T18:28:55+00:00","article_modified_time":"2016-02-12T18:32:04+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","width":"400","height":"260","caption":"Malware Alert from Intego"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/","name":"New Imuler Variant Found-Steer Clear of \"Your Dirty Pics\" - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#primaryimage"},"datePublished":"2012-09-21T18:28:55+00:00","dateModified":"2016-02-12T18:32:04+00:00","description":"Update - September 23, 2012 This Trojan is being targeted at Tibetan activists. It has been reported as being received in a threatening email with the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New Imuler Variant Found&#8211;Steer Clear of &#8220;Your Dirty Pics&#8221;"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"New Imuler Variant Found&#8211;Steer Clear of &#8220;Your Dirty Pics&#8221;","datePublished":"2012-09-21T18:28:55+00:00","dateModified":"2016-02-12T18:32:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#webpage"},"wordCount":527,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","keywords":["Imuler","Malware","Trojan:OSX\/Imuler.D","Your Dirty Pics"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1zR","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/6067"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=6067"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/6067\/revisions"}],"predecessor-version":[{"id":50224,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/6067\/revisions\/50224"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8763"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=6067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=6067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=6067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}