{"id":11046,"date":"2018-01-09T10:10:43","date_gmt":"2018-01-09T18:10:43","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/09\/news-4817\/"},"modified":"2018-01-09T10:10:43","modified_gmt":"2018-01-09T18:10:43","slug":"news-4817","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/09\/news-4817\/","title":{"rendered":"RIG exploit kit campaign gets deep into crypto craze"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 09 Jan 2018 17:11:16 +0000<\/strong><\/p>\n<p>There isn&#8217;t a day that goes by without a headline about yet another massive spike in <a href=\"https:\/\/www.coindesk.com\/price\/\" target=\"_blank\" rel=\"noopener\">Bitcoin valuation<\/a>, or a story about someone <a href=\"https:\/\/www.engadget.com\/2017\/12\/12\/bitcoin-mania-mortage-house-investors\/\" target=\"_blank\" rel=\"noopener\">mortgaging their house<\/a> to purchase the hardware required to become a serious cryptocurrency miner.<\/p>\n<p>If many folks are thinking about joining the &#8216;crypto craze&#8217; movement, they may be surprised to learn that they already have. We&#8217;ve documented in-browser miners before on this blog, or what we call <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/a-look-into-the-global-drive-by-cryptocurrency-mining-phenomenon\/\" target=\"_blank\" rel=\"noopener\">drive-by cryptomining<\/a>, but drive-by download attacks such as those via the RIG exploit kit want a piece of the action, too. While the latter is <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/web-attack\/93\/cybercriminals-unleash-bitcoinmining-malware\" target=\"_blank\" rel=\"noopener\">not a new trend<\/a>, we have noticed an increase in malware payloads from EKs that are coin miners, and we think this is going to be something to follow for 2018.<\/p>\n<h3>Overview<\/h3>\n<p>Today, we take a look at a prolific campaign that is focused on the distribution of coin miners via drive-by download attacks. We started to notice larger-than-usual payloads from the RIG exploit kit around November 2017, a trend that has continued more recently via a campaign dubbed <a href=\"http:\/\/www.nao-sec.org\/2017\/12\/survey-of-ngay-campaign.html\" target=\"_blank\" rel=\"noopener\">Ngay<\/a>.<\/p>\n<p>What happened is that the initial dropper contained additional binaries that contributed to its oversized nature as depicted below.\u00a0Droppers from this campaign have contained one or more coin miners consistently, for at least Monero and lesser known but still popular other currencies such as <a href=\"https:\/\/twitter.com\/nao_sec\/status\/950690187272634369\" target=\"_blank\" rel=\"noopener\">Bytecoin<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Ngay_payloads.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21057 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Ngay_payloads.png\" alt=\"\" width=\"896\" height=\"802\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Ngay_payloads.png 896w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Ngay_payloads-300x269.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Ngay_payloads-600x537.png 600w\" sizes=\"auto, (max-width: 896px) 100vw, 896px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>One payload leads to two different coin miners.<\/em><\/p>\n<p>For the same attack, these two processes will mine for the well-known Monero and Electroneum cryptocurrencies. When both executables are running, the CPU usage on the victim&#8217;s computer is maxed at 100 percent.<\/p>\n<h3>Distribution<\/h3>\n<p>The <a href=\"http:\/\/www.nao-sec.org\/2017\/12\/survey-of-ngay-campaign.html\" target=\"_blank\" rel=\"noopener\">Ngay campaign<\/a>, identified as such by <a href=\"https:\/\/twitter.com\/nao_sec\" target=\"_blank\" rel=\"noopener\">Nao_Sec<\/a>, is one of several malvertising chains that relies on the RIG exploit kit to distribute its payloads. Recently, we observed a more complex redirection chain involving <em>bestadbid<\/em> and various XML feeds upstream, eventually trickling down to the more familiar redirect to RIG.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/traffic_view.png\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21042 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/traffic_view.png\" alt=\"\" width=\"757\" height=\"374\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/traffic_view.png 757w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/traffic_view-300x148.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/traffic_view-600x296.png 600w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Infection flow showing redirection to RIG EK, followed by coin miner payloads<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/iframe_RIG.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21043 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/iframe_RIG.png\" alt=\"\" width=\"792\" height=\"603\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/iframe_RIG.png 792w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/iframe_RIG-300x228.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/iframe_RIG-600x457.png 600w\" sizes=\"auto, (max-width: 792px) 100vw, 792px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>iframe to RIG EK is inserted in Ngay&#8217;s template page<\/em><\/p>\n<p>The dropped binary from RIG EK contains two other artifacts that each lead to a different coin miner and are launched in a rather unusual procedure. In the following sections, we will study their deployment mechanism.<\/p>\n<h3>Monero miner<\/h3>\n<p>Monero is one of the most well-known digital currencies that, contrary to Bitcoin, does not require special hardware and provides additional privacy benefits. Threat actors have jumped on it in via large-scale drive-by mining attacks, with the help of coin miner-purposed malware.<\/p>\n<p>Here the Monero miner is downloaded after a convoluted process that also aims at registering it permanently as a running service. The extracted binary from the RIG EK payload (<em>3yanvarya.exe<\/em>) is an installer that drops several .NET modules:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/dotnetmodules.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21046 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/dotnetmodules.png\" alt=\"\" width=\"791\" height=\"382\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/dotnetmodules.png 791w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/dotnetmodules-300x145.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/dotnetmodules-600x290.png 600w\" sizes=\"auto, (max-width: 791px) 100vw, 791px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>.NET modules extracted from one of the two artifacts contained in RIG EK&#8217;s payload<\/em><\/p>\n<p><em>starter.exe<\/em> uses an exploit (Invoke-MS16-032) copied from this <a href=\"https:\/\/github.com\/FuzzySecurity\/PowerShell-Suite\/blob\/master\/Invoke-MS16-032.ps1\" target=\"_blank\" rel=\"noopener\">GitHub repository<\/a> (It even re-uses the original license!)\u00a0to elevate privileges:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21045 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/in_starter.png\" alt=\"\" width=\"1029\" height=\"501\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/in_starter.png 1029w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/in_starter-300x146.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/in_starter-600x292.png 600w\" sizes=\"auto, (max-width: 1029px) 100vw, 1029px\" \/><\/p>\n<p style=\"text-align: center\"><em>Code snippet showing PowerShell code designed to elevate privileges<\/em><\/p>\n<p><em>foxcon.exe<\/em>\u00a0contains two sub-modules inside: Hydra and Hand, which purport to protect and manage services:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/foxcon.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21047 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/foxcon.png\" alt=\"\" width=\"756\" height=\"482\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/foxcon.png 756w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/foxcon-300x191.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/foxcon-600x383.png 600w\" sizes=\"auto, (max-width: 756px) 100vw, 756px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Hydra and Hand: two modules in charge of miner services<\/em><\/p>\n<p><em>services.exe<\/em>\u00a0is a service to download and manage the miner:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/services_exe.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21048 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/services_exe.png\" alt=\"\" width=\"683\" height=\"351\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/services_exe.png 683w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/services_exe-300x154.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/services_exe-600x308.png 600w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Miner is downloaded from a remote IP address<\/em><\/p>\n<p>Finally, the Monero miner (<em>series64.exe<\/em>) is retrieved and can start the mining activity. The overall process can be summarized in the diagram below.<\/p>\n<p><em>&#8220;C:WindowsTEMPseries64.exe&#8221; -o 5.23.48.207:5555 -u x -p x -k -B &#8211;max-cpu-usage=30 &#8211;safe<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Monero_overall_flow.png\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-21049\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Monero_overall_flow.png\" alt=\"\" width=\"1178\" height=\"922\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Monero_overall_flow.png 1178w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Monero_overall_flow-300x235.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Monero_overall_flow-600x470.png 600w\" sizes=\"auto, (max-width: 1178px) 100vw, 1178px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Overview of the Monero miner deployment<\/em><\/p>\n<h3>Electroneum miner<\/h3>\n<p><a href=\"https:\/\/electroneum.com\/\" target=\"_blank\" rel=\"noopener\">Electroneum,<\/a> the &#8220;mobile friendly&#8221; digital currency, has only been recently introduced but became <a href=\"http:\/\/electroneum.com\/2017\/12\/15\/launch-stats\/\" target=\"_blank\" rel=\"noopener\">popular<\/a> almost immediately.\u00a0The Android app allows anyone to mine and manage their wallet, but miners running desktop platforms can also participate.<\/p>\n<p>Malware authors are abusing it via a malicious coin miner binary that is dropped from\u00a0<em>dp.exe<\/em> in yet another unusual redirection chain. Indeed, it involves the <em>Bit.ly<\/em> URL shortener to retrieve a fake PNG image containing instructions for the download and eventual launch of the miner itself.<\/p>\n<p><em>&#8220;C:Users[username]AppDataRoamingbvhostbvhost.exe&#8221; -o etn-eu2.nanopool.org:13333 -u etnkKc&#8230;<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Electroneum_overall_flow_.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-21051 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Electroneum_overall_flow_.png\" alt=\"\" width=\"1449\" height=\"984\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Electroneum_overall_flow_.png 1449w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Electroneum_overall_flow_-300x204.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/Electroneum_overall_flow_-600x407.png 600w\" sizes=\"auto, (max-width: 1449px) 100vw, 1449px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Overview of the Electroneum miner deployment<\/em><\/p>\n<h3>Conclusion<\/h3>\n<p>As cryptocurrencies become more and more popular, we can only expect to see an increase in malicious coin miners, driven by the prospect of financial gains and increased anonymity. As the mining process has become cross-platform and achievable using regular computers, this has opened new possibilities for threat actors. Indeed, they can put hundreds of thousands of compromised machines to work mining for the latest and hottest digital currency around.<\/p>\n<p>For end users, the threat of a coin miner infection may seem less impactful than, say, a banking Trojan, but perhaps that is only true in the short term. Not only can existing malware download additional payloads over the course of time, but the illicit gains from cryptomining contribute to financing the criminal ecosystem, costing billions of dollars in losses.<\/p>\n<p>This particular RIG EK campaign is noteworthy for its focus on cryptominers and the way it unconventionally and at times inefficiently loads them. We will keep monitoring the drive-by download landscape to report on any change in payloads from other threat actors.<\/p>\n<p><em>Many thanks to <a href=\"https:\/\/twitter.com\/hasherezade\" target=\"_blank\" rel=\"noopener\">@hasherezade<\/a> for help studying the binaries.<\/em><\/p>\n<h3>Indicators of compromise<\/h3>\n<p>RIG EK dropper<\/p>\n<pre>FD4A117EDFEA1075132CF7D0A2AD5376B174AFD1C924D91E9B0D124320E3177D<\/pre>\n<p>Redirections to downloader script<\/p>\n<pre>5.101.179.249  *.lolkekss[.]us  bit[.]ly\/2lXCGUy<\/pre>\n<p>Downloader script for Electroneum miner (fake PNG)<\/p>\n<pre>lolkekss.usite[.]pro\/DF.png  195.216.243.130<\/pre>\n<p>Electroneum miner (<em>bvhost.exe<\/em>)<\/p>\n<pre>74.115.50.111  115776615-884492032168661957.preview.editmysite[.]com\/uploads\/1\/1\/5\/7\/115776615\/be  13CE8C6C8E9E4A06880A5F445A391E9E26BB23FCD0C6F4CC495AA5B80E626C0B<\/pre>\n<p>Monero miner (<em>series64.exe<\/em>)<\/p>\n<pre>188.225.46.219:3000\/files\/mh\/series64.exe  F651B1C5AE7B55B765994EB6630C45A0A7F1E43EBABD801CB8B3B26BDDB09D17<\/pre>\n<p>Additional miner loaders via RIG EK (SHA256, size in bytes, date found):<\/p>\n<pre>24ff04ef166cbc94d88afd0c7a3cba78dfe2f2d9e02a273a60fcc45ced5cb484,1732969,2017-12-29  d68c5095bd7b82e28acd4df5514a54db6d6d340ada860b64b932cb014fe1ecb3,1513983,2018-01-02  5c32e0d2a69fd77e85f2eecaabeb677b6f816de0d82bf7c29c9d124a818f424f,1732965,2018-01-02  2876ceb760c5b37e03ebb3cabbfb25a175e8c3556de89af9dd9941fda183bc79,1840725,2018-01-03  bba35503156eee0aa6ecef7aa76bbe3e6d26791585aac328f895278cd1c09cb2,2819600,2018-01-04<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/01\/rig-exploit-kit-campaign-gets-deep-into-crypto-craze\/\">RIG exploit kit campaign gets deep into crypto craze<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/01\/rig-exploit-kit-campaign-gets-deep-into-crypto-craze\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 09 Jan 2018 17:11:16 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/01\/rig-exploit-kit-campaign-gets-deep-into-crypto-craze\/' title='RIG exploit kit campaign gets deep into crypto craze'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/01\/banner-1.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We take a look at a prolific campaign that is focused on the distribution of coin miners via drive-by download attacks. We started to notice larger-than-usual payloads from the RIG exploit kit around November 2017, a trend that has continued more recently via a campaign dubbed Ngay.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bitcoin\/\" rel=\"tag\">bitcoin<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bytecoin\/\" rel=\"tag\">Bytecoin<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptocurrency\/\" rel=\"tag\">cryptocurrency<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptominers\/\" rel=\"tag\">cryptominers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptomining\/\" rel=\"tag\">cryptomining<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/drive-by-downloads\/\" rel=\"tag\">drive-by downloads<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/drive-by-mining\/\" rel=\"tag\">Drive-by mining<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/electroneum\/\" rel=\"tag\">Electroneum<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kits\/\" rel=\"tag\">exploit kits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/monero\/\" rel=\"tag\">monero<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ngay\/\" rel=\"tag\">Ngay<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rig-ek\/\" rel=\"tag\">RIG EK<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/01\/rig-exploit-kit-campaign-gets-deep-into-crypto-craze\/' title='RIG exploit kit campaign gets deep into crypto craze'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/01\/rig-exploit-kit-campaign-gets-deep-into-crypto-craze\/\">RIG exploit kit campaign gets deep into crypto craze<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10490,17107,11052,15826,15080,17108,16416,17109,10528,10531,3764,10538,17110,11792,10494],"class_list":["post-11046","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bitcoin","tag-bytecoin","tag-cryptocurrency","tag-cryptominers","tag-cryptomining","tag-drive-by-downloads","tag-drive-by-mining","tag-electroneum","tag-exploit-kits","tag-malvertising","tag-malware","tag-monero","tag-ngay","tag-rig-ek","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11046"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11046\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11046"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11046"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}