{"id":62809,"date":"2018-08-29T13:50:42","date_gmt":"2018-08-29T20:50:42","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=62809"},"modified":"2018-08-29T13:50:42","modified_gmt":"2018-08-29T20:50:42","slug":"a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/","title":{"rendered":"A Honeypot Guide: Why Researchers Use Honeypots for Malware Analysis"},"content":{"rendered":"<p class=\"p3\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/what-are-honeypots\/\" rel=\"attachment wp-att-82246\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-82246\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/what-are-honeypots.jpg\" alt=\"What are Honeypots\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/what-are-honeypots.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/what-are-honeypots-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/what-are-honeypots-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p class=\"p3\"><span class=\"s1\">You may have heard the term &#8220;honeypot&#8221; thrown about in the security community from time to time. While it may spark your imagination, you may be wondering what is a honeypot and what role does it\u00a0play in the security industry? Certainly malware hunters\u00a0aren&#8217;t referring to Winnie the Pooh helping himself to jars and jars of honey, right? So,\u00a0what exactly do security researchers mean what talking about honeypots? <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">A honeypot, in the Internet security world, is a real or simulated system designed to attract attacks on itself. Essentially they are virtual or physical machines that\u00a0are open to the real world whilst flaunting their intended vulnerabilities. Honeypots became popular amidst the wide spreading of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/\" target=\"_blank\">worms<\/a> in the late 1990s and early 2000s. The main purposes of these traps were to capture and analyze attacks in order to improve defenses from malicious intrusions.<\/span><\/p>\n<p class=\"p3\">Below is a simple, yet practical guide that covers the basic\u00a0types of honeypots, as well as how and why they help researchers analyze malware. Without further do, let&#8217;s get to it!<\/p>\n<h3 class=\"p3\">What Are the Different Types of Honeypots<\/h3>\n<p class=\"p3\"><span class=\"s1\"><b><\/b>There are two main categories of honeypots: high-interaction and low-interaction.\u00a0<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><em>High-interaction<\/em>\u00a0honeypots are real physical machines with perhaps some software to aid analysis and configuration. The attacker has a large amount of freedom for nefarious actions within a high-interaction honeypot \u2014 hence the name. Usually the system will have vulnerabilities, which make it easy for attackers to gain access. While these can collect a large amount of forensic data for an analyst, they are expensive in their maintenance and are complex to deploy.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><em>Low-interaction<\/em>\u00a0honeypots\u00a0emulate\u00a0systems with vulnerabilities. For instance,\u00a0<a href=\"https:\/\/www.honeynet.org\/project\/Dionaea\" target=\"_blank\">Dionaea<\/a> (named after the Venus flytrap) is a low-interaction honeypot, which emulates Windows protocol (SMTP, FTP, etc.) vulnerabilities that are targeted by malware. Low-interaction honeypots are relatively easy to deploy and use little resources due to the fact that these can quickly be deployed within a virtual machine. <\/span><\/p>\n<p class=\"p3\">The problem with this approach is that an attacker has a greater chance of being aware that they are within a honeypot and can use it against the host. An attacker can \u2018fingerprint\u2019 a honeypot based on known characteristics of publicly available honeypots\u00a0like\u00a0the aforementioned Dionaea and <span class=\"s1\"><a href=\"https:\/\/www.cse.wustl.edu\/~jain\/cse571-09\/ftp\/honey\/#sec3.1\" target=\"_blank\">Honeyd<\/a>.<\/span><\/p>\n<h3 class=\"p3\">How Honeypots Help Malware Researchers<\/h3>\n<p class=\"p3\"><span class=\"s1\">As previously stated, these systems can be used for malware analysts to collect current \u2018<a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-does-in-the-wild-mean-when-talking-about-malware\/\" target=\"_blank\">in-the-wild<\/a>\u2019 malware, an insight into hackers\u2019 attack patterns or as a decoy. Another common use for honeypots is within a large corporate network. A company can deploy a collection of honeypots, or a\u00a0<em>honeynet<\/em>, within their network to mitigate attacks toward their corporate servers and instead direct them at the Honeynet.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Though the development of new honeypots seemed to slow down after the mid 2000s, the applications and use of them have not ceased. As technology advances and data becomes more and more valuable, so will the sophistication and types of attacks on said technology.<\/span><\/p>\n<h3 class=\"p3\">What\u00a0is Deception Technology?<\/h3>\n<p class=\"p3\"><span class=\"s1\">A somewhat new\u00a0advancement on\u00a0the use of\u00a0honeypots is\u00a0<em>Deception Technology<\/em>. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Deception technology is the current approach to stopping advanced attacks. Deception technology aims to deceive attackers much like honeypots. The difference is that this technology is maintained by a company, which deploys a large system of decoy servers and\/or machines within your network and provides all of the capabilities of analysis and insight for you. This seems to be the current trend in network security; such that, more sophisticated defense mechanisms are needed in today&#8217;s world as cybercriminals use\u00a0more advanced\u00a0approaches to attacking network infrastructures.\u00a0<\/span><\/p>\n<p class=\"p3\"><strong>Further reading:<\/strong><\/p>\n<ul>\n<li class=\"p3\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-is-malware-researched\/\" target=\"_blank\">How is Malware Researched?<\/a><\/li>\n<li class=\"p3\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-malware-is-researched-part-2\/\" target=\"_blank\">How is Malware Researched\u00a0\u2014 Part 2<\/a><\/li>\n<li class=\"p3\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/viruses-worms-and-spyware-yikes-a-look-at-malware-terminology\/\" target=\"_blank\">Viruses, Worms and Spyware\u2014Yikes! A Look at Malware Terminology<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Ever wondered what is a honeypot? This simple, yet practical guide covers the basic types of honeypots, as well as how and why they help researchers analyze malware.<\/p>\n","protected":false},"author":76,"featured_media":82258,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[4303,489,4300,491,4297,1921],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Ever wondered what is a honeypot? This simple, yet practical guide covers the basic types of honeypots, as well as how and why they help researchers analyze malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Honeypot Guide: Why Researchers Use Honeypots for Malware Analysis - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Ever wondered what is a honeypot? This simple, yet practical guide covers the basic types of honeypots, as well as how and why they help researchers analyze malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-29T20:50:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Honeypots-Malware-Analysis.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zach Martin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Honeypots-Malware-Analysis.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Honeypots-Malware-Analysis.jpg\",\"width\":400,\"height\":260,\"caption\":\"Honeypots Malware Analysis\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/\",\"name\":\"A Honeypot Guide: Why Researchers Use Honeypots for Malware Analysis - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#primaryimage\"},\"datePublished\":\"2018-08-29T20:50:42+00:00\",\"dateModified\":\"2018-08-29T20:50:42+00:00\",\"description\":\"Ever wondered what is a honeypot? This simple, yet practical guide covers the basic types of honeypots, as well as how and why they help researchers analyze malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Honeypot Guide: Why Researchers Use Honeypots for Malware Analysis\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0da2cb20901ad3262f6d92276233a2d1\"},\"headline\":\"A Honeypot Guide: Why Researchers Use Honeypots for Malware Analysis\",\"datePublished\":\"2018-08-29T20:50:42+00:00\",\"dateModified\":\"2018-08-29T20:50:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#webpage\"},\"wordCount\":618,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Honeypots-Malware-Analysis.jpg\",\"keywords\":[\"Deception Technology\",\"Goat Machine\",\"Honeynet\",\"Honeypot\",\"Honeypots\",\"Network Security\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0da2cb20901ad3262f6d92276233a2d1\",\"name\":\"Zach Martin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/044a6d8cd68605ef60d5a996508816b8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/044a6d8cd68605ef60d5a996508816b8?s=96&d=mm&r=g\",\"caption\":\"Zach Martin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/zach-martin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Ever wondered what is a honeypot? This simple, yet practical guide covers the basic types of honeypots, as well as how and why they help researchers analyze malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/","og_locale":"en_US","og_type":"article","og_title":"A Honeypot Guide: Why Researchers Use Honeypots for Malware Analysis - The Mac Security Blog","og_description":"Ever wondered what is a honeypot? This simple, yet practical guide covers the basic types of honeypots, as well as how and why they help researchers analyze malware.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-08-29T20:50:42+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Honeypots-Malware-Analysis.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Zach Martin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Honeypots-Malware-Analysis.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Honeypots-Malware-Analysis.jpg","width":400,"height":260,"caption":"Honeypots Malware Analysis"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/","name":"A Honeypot Guide: Why Researchers Use Honeypots for Malware Analysis - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#primaryimage"},"datePublished":"2018-08-29T20:50:42+00:00","dateModified":"2018-08-29T20:50:42+00:00","description":"Ever wondered what is a honeypot? This simple, yet practical guide covers the basic types of honeypots, as well as how and why they help researchers analyze malware.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"A Honeypot Guide: Why Researchers Use Honeypots for Malware Analysis"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0da2cb20901ad3262f6d92276233a2d1"},"headline":"A Honeypot Guide: Why Researchers Use Honeypots for Malware Analysis","datePublished":"2018-08-29T20:50:42+00:00","dateModified":"2018-08-29T20:50:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#webpage"},"wordCount":618,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Honeypots-Malware-Analysis.jpg","keywords":["Deception Technology","Goat Machine","Honeynet","Honeypot","Honeypots","Network Security"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/a-honeypot-guide-why-researchers-use-honeypots-for-malware-analysis\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0da2cb20901ad3262f6d92276233a2d1","name":"Zach Martin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/044a6d8cd68605ef60d5a996508816b8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/044a6d8cd68605ef60d5a996508816b8?s=96&d=mm&r=g","caption":"Zach Martin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/zach-martin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/Honeypots-Malware-Analysis.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-gl3","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/62809"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/76"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=62809"}],"version-history":[{"count":65,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/62809\/revisions"}],"predecessor-version":[{"id":82369,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/62809\/revisions\/82369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/82258"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=62809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=62809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=62809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}