{"id":15785,"date":"2019-07-15T08:10:06","date_gmt":"2019-07-15T16:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/07\/15\/news-9532\/"},"modified":"2019-07-15T08:10:06","modified_gmt":"2019-07-15T16:10:06","slug":"news-9532","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/15\/news-9532\/","title":{"rendered":"Meet Extenbro, a new DNS-changer Trojan protecting adware"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Mon, 15 Jul 2019 14:54:00 +0000<\/strong><\/p>\n<p>Recently, we uncovered a new DNS-changer called Extenbro that comes with an adware bundler. These DNS-changers block access to security-related sites, so the adware victims can\u2019t download and install security software to get rid of the pests. <\/p>\n<p>From our viewpoint, this might be like sending in an elephant to save the mosquito, but the threat actors behind this attack have been known to use aggressive tactics in the past. What do they care if they open up your machine to all kinds of threats by disallowing you access to security sites and blocking any existing security software from getting updates? They just want to serve you adware.<\/p>\n<p>Unfortunately, we have seen this kind of behavior <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2015\/11\/vonteera-adware-uses-certificates-to-disable-anti-malware\/\" target=\"_blank\">before<\/a>. But since this one uses a few fancy tricks, we\u2019ll give you a quick overview of what it does and how you can get rid of it. For those just looking for a quick fix, there is a <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/forums.malwarebytes.com\/topic\/249242-removal-instructions-for-extenbro\/\" target=\"_blank\">removal guide on our forums<\/a>. <\/p>\n<h3>Infection vector<\/h3>\n<p>We have noticed the Extenbro Trojan is delivered on systems by a <a rel=\"noreferrer noopener\" aria-label=\"bundler (opens in a new tab)\" href=\"http:\/\/www.blog.malwarebytes.com\/glossary\/bundleware\" target=\"_blank\">bundler<\/a> that is detected by Malwarebytes as <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/trojan-istartsurf\/\" target=\"_blank\">Trojan.IStartSurf<\/a>.<\/p>\n<h3>DNS-changer<\/h3>\n<p> First and foremost, the Trojan changes the DNS settings of the infected system so it won\u2019t be able to reach any security vendors\u2019 sites.  <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"39480\" data-permalink=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/07\/extenbro-a-new-dns-changer-trojan-protecting-adware\/attachment\/warning6-17\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning6.png\" data-orig-size=\"414,494\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"warning6\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning6-251x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning6.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning6.png\" alt=\"Advanced DNS\" class=\"wp-image-39480\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning6.png 414w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning6-251x300.png 251w\" sizes=\"(max-width: 414px) 100vw, 414px\" \/><\/figure>\n<\/div>\n<p>New for this one is that you have to access the Advanced DNS tab to find out that it has added four DNS servers rather than the usual two. Where people might be inclined to change the two that are visible, use the <strong>Advanced<\/strong> button and look at the DNS tab: It would cause them to leave the additional two behind.<\/p>\n<h3>Task Scheduler<\/h3>\n<p>Should you manage to correct the offending DNS servers and reboot the system before taking further measures, you will find that the DNS settings re-appear after a reboot. This is because of a randomly-named Scheduled Task that looks similar to this:<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"39481\" data-permalink=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/07\/extenbro-a-new-dns-changer-trojan-protecting-adware\/attachment\/warning3-38\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning3.png\" data-orig-size=\"791,200\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"warning3\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning3-300x76.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning3-600x152.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning3-600x152.png\" alt=\"Scheduled Task\" class=\"wp-image-39481\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning3-600x152.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning3-300x76.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning3.png 791w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p>The location of the folder and the switches for the command seem to be fixed, but the folder name and file name are random.<\/p>\n<h3>Root certificate<\/h3>\n<p>The Trojan also adds a certificate to the set of Windows <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/08\/explained-security-certificates\/\" target=\"_blank\">Root certificates<\/a>.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"39482\" data-permalink=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/07\/extenbro-a-new-dns-changer-trojan-protecting-adware\/attachment\/warning5-29\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning5.png\" data-orig-size=\"800,118\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"warning5\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning5-300x44.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning5-600x89.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning5-600x89.png\" alt=\"new certificate\" class=\"wp-image-39482\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning5-600x89.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning5-300x44.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/warning5.png 800w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<p>Using the method outlined in the blog post <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/08\/learning-powershell-some-basic-commands\/\" target=\"_blank\">Learning PowerShell: some basic commands<\/a>, I established that the certificate has no \u201cFriendly Name\u201d and is supposedly registered to abose[at]reddit[dot]com.<\/p>\n<h3>Disables IPV6<\/h3>\n<p>By changing the registry value DisabledComponents under the key HKEY_LOCAL_MACHINESYSTEMCurrentControlSetservicesTCPIP6Parameters and setting the value to \u201cFF\u201d, the Trojan <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/tweaks.com\/windows\/40099\/how-to-properly-disable-ipv6\/\" target=\"_blank\">disables IPV6<\/a> to force the system to use the new DNS servers.<\/p>\n<h3>User.js<\/h3>\n<p>The malware also makes a change in the Firefox user.js file and sets the security.enterprise_roots.enabled setting to true, which <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/support.umbrella.com\/hc\/en-us\/articles\/115000669728-Configuring-Firefox-to-use-the-Windows-Certificate-Store\" target=\"_blank\">Configures Firefox to use the Windows Certificate Store<\/a> where the newly-added root certificate was added. <\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"39483\" data-permalink=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/07\/extenbro-a-new-dns-changer-trojan-protecting-adware\/attachment\/userjs\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/userjs.png\" data-orig-size=\"487,132\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"userjs\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/userjs-300x81.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/userjs.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/userjs.png\" alt=\"enterprise_roots\" class=\"wp-image-39483\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/userjs.png 487w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/userjs-300x81.png 300w\" sizes=\"(max-width: 487px) 100vw, 487px\" \/><\/figure>\n<h3>Removal instructions<\/h3>\n<p>Some of the changes that this malware makes could already be in place, if they are the user&#8217;s preferred settings. So feel free to skip the steps that you are not comfortable with.<\/p>\n<p>What really needs to be done so you can download a removal tool or update you existing security software is to restore the DNS servers to what they were\u2014or, if you don\u2019t know the previous settings, to something safe. Most ISPs have the preferred DNS servers listed in their installation instructions or on their website. That is the first place to look. If you can\u2019t find them there, you can use the DNS servers provided by OpenDNS. You can find instructions for many Operating Systems on <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/support.opendns.com\/hc\/en-us\/sections\/206253647\" target=\"_blank\">their site<\/a>. <\/p>\n<p>An extra step needs to be taken when you are in this screen:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"39484\" data-permalink=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/07\/extenbro-a-new-dns-changer-trojan-protecting-adware\/attachment\/main-70\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/main.png\" data-orig-size=\"414,461\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"main\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/main-269x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/main.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/main.png\" alt=\"General DNS settings\" class=\"wp-image-39484\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/main.png 414w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/main-269x300.png 269w\" sizes=\"(max-width: 414px) 100vw, 414px\" \/><\/figure>\n<\/div>\n<p><em>Make sure to click on <\/em><strong><em>Advanced\u2026<\/em><\/strong><em>and select the<\/em><strong><em> DNS <\/em><\/strong><em>tab to find the extra two DNS servers that we mentioned earlier. Remove those before you change the two shown on the screen to your preferred ones.<\/em><\/p>\n<p>Now, you should be able to visit security sites again. Follow the remaining instructions below:<\/p>\n<ul>\n<li>To get to your security sites, you may need a restart of the browser. Do NOT reboot your system or the DNS servers might be changed for the worse again by the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2015\/03\/scheduled-tasks\/\" target=\"_blank\">Scheduled Task<\/a> that belongs to the Trojan. If your existing solution does not pick up on the malware, download &nbsp;<strong><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.malwarebytes.com\/mwb-download\/\" target=\"_blank\">Malwarebytes<\/a><\/strong>&nbsp;to your desktop.<\/li>\n<li>Double-click&nbsp;<strong>mb3-setup-consumer-{version}.exe<\/strong>&nbsp;and follow the prompts to install the program.<\/li>\n<li>Then click&nbsp;<strong>Finish<\/strong>.<\/li>\n<li>Once the program has fully updated, select&nbsp;<strong>Scan Now<\/strong>&nbsp;on the&nbsp;<strong>Dashboard<\/strong>. Or select the&nbsp;<strong>Threat Scan<\/strong>&nbsp;from the&nbsp;<strong>Scan<\/strong>&nbsp;menu.<\/li>\n<li>If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.<\/li>\n<li>When the scan is complete, make sure that <strong>All Threats<\/strong>&nbsp;are selected, and click&nbsp;<strong>Remove Selected<\/strong>.<\/li>\n<li>Restart your computer when prompted to do so.<\/li>\n<li>This procedure should take care of the Scheduled Task and the Root certificate.<\/li>\n<li>If you want to undo the change that makes FireFox adhere to the Windows certificates, you can open Firefox and type <strong>about:config <\/strong>in the address bar. Then read and accept the \u201crisk\u201d and search for <strong>security.enterprise_roots.enabled<\/strong>. The default settings is <strong>false. <\/strong>You can change the setting by selecting the line and right clicking it to get a menu. Clicking <strong>Toggle <\/strong>changes the value back and forth between <strong>True<\/strong> and <strong>False<\/strong>. Close the <strong>about:config<\/strong> tab when you are done.<\/li>\n<\/ul>\n<p>Should you need further help, feel free to reach out to us on the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/forums.malwarebytes.com\/forum\/7-windows-malware-removal-help-support\/\" target=\"_blank\">forums<\/a> or by contacting our <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/support.malwarebytes.com\/\" target=\"_blank\">support<\/a> department.<\/p>\n<h3>IOCs<\/h3>\n<p>DNS servers:<\/p>\n<p>45.86.180.227<\/p>\n<p>185.162.93.213<\/p>\n<p>116.203.6.218<\/p>\n<p>185.130.104.222<\/p>\n<p>Installer: <\/p>\n<p>SHA256 b2a28e9abb04a5926d53850623b1f3c6738169b27847e90c55119f2836c17006<\/p>\n<p>Root certificate: <\/p>\n<p>36509B8F624CE280E0C797F42F4A8F552A280313<\/p>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/07\/extenbro-a-new-dns-changer-trojan-protecting-adware\/\">Meet Extenbro, a new DNS-changer Trojan protecting adware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/07\/extenbro-a-new-dns-changer-trojan-protecting-adware\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Mon, 15 Jul 2019 14:54:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/trojans\/2019\/07\/extenbro-a-new-dns-changer-trojan-protecting-adware\/' title='Meet Extenbro, a new DNS-changer Trojan protecting adware'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2015\/11\/photodune-1258611-secret-m.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We found a new Trojan that uses aggressive techniques, including blocking access to security sites, to deliver an adware bundler. Read up on what Extenbro can do and how to get this pest off your system.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/trojans\/\" rel=\"category tag\">Trojans<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware\/\" rel=\"tag\">adware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bundler\/\" rel=\"tag\">bundler<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bundleware\/\" rel=\"tag\">bundleware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dns\/\" rel=\"tag\">dns<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dns-servers\/\" rel=\"tag\">DNS servers<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dns-changer\/\" rel=\"tag\">DNS-changer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/extenbro\/\" rel=\"tag\">Extenbro<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware-removal\/\" rel=\"tag\">malware removal<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/root-certificate\/\" rel=\"tag\">Root certificate<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scheduled-tasks\/\" rel=\"tag\">scheduled tasks<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan\/\" rel=\"tag\">trojan<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojans\/\" rel=\"tag\">Trojans<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/trojans\/2019\/07\/extenbro-a-new-dns-changer-trojan-protecting-adware\/' title='Meet Extenbro, a new DNS-changer Trojan protecting adware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/07\/extenbro-a-new-dns-changer-trojan-protecting-adware\/\">Meet Extenbro, a new DNS-changer Trojan protecting adware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10468,22289,22290,11882,22291,22292,22293,22294,22295,12385,10833,12269],"class_list":["post-15785","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adware","tag-bundler","tag-bundleware","tag-dns","tag-dns-servers","tag-dns-changer","tag-extenbro","tag-malware-removal","tag-root-certificate","tag-scheduled-tasks","tag-trojan","tag-trojans"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15785"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15785\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15785"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}