{"id":21445,"date":"2023-03-09T05:20:57","date_gmt":"2023-03-09T13:20:57","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/03\/09\/news-15176\/"},"modified":"2023-03-09T05:20:57","modified_gmt":"2023-03-09T13:20:57","slug":"news-15176","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/03\/09\/news-15176\/","title":{"rendered":"A border-hopping PlugX USB worm takes its act on the road"},"content":{"rendered":"<p><strong>Credit to Author: Gabor Szappanos| Date: Thu, 09 Mar 2023 11:00:02 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>Our researchers are currently seeing localized outbreaks of a new variant of the PlugX USB worm \u2013 in locations nearly halfway around the world from each other. After first drawing attention to itself in Papua New Guinea in August 2022, the new variant appeared in January both in the Pacific Rim nation and 10,000 miles away in Ghana. Additional infections appeared in Mongolia, Zimbabwe, and Nigeria. The novel aspects of this variant are a new payload and callbacks to a C2 server previously thought to be only tenuously related to this worm.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/weird-distro-map.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90286\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/weird-distro-map.png\" alt=\"A world map showing infections in five countries, as named in text\" width=\"640\" height=\"363\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/weird-distro-map.png 1027w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/weird-distro-map.png?resize=300,170 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/weird-distro-map.png?resize=768,436 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/weird-distro-map.png?resize=1024,581 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 1: An unusual distribution of infections is the hallmark of a new PlugX variant that relies on DLL sideloading to propagate<\/em><\/p>\n<p><strong>Everything Old Is New Again<\/strong><\/p>\n<p>PlugX is fairly common backdoor malware (a RAT, remote access Trojan) of Chinese origin, one that relies on DLL sideloading to do its dirty work. We at Sophos have been writing about it for years, most recently <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/11\/03\/family-tree-dll-sideloading-cases-may-be-related\/\">in November<\/a>. Even the USB-aware version, which can both spread via USB and grab information from air-gapped networks via USB, has been on defenders\u2019 radar for several years. However, new variants have turned up regularly in recent months, sometimes in remarkably far-flung locations.<\/p>\n<p>Our first look at the new variant of the worm came from a CryptoGuard alert likely triggered by data exfiltration. (We\u2019ve put all IoCs for this incident on <a href=\"https:\/\/github.com\/sophoslabs\/IoCs.\">our GitHub instance<\/a>.) The infection comprises a clean executable (AvastSvc.exe) susceptible to DLL sideloading; multiple instances of a malicious DLL (wsc.dll) sideloaded into the clean loader; an encrypted .dat payload; and (in a directory called RECYCLER.BIN) a collection of stolen, encrypted files with names obfuscated in base64:<\/p>\n<pre>Mitigation\u00a0\u00a0 CryptoGuard V5  Path:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 C:ProgramDataAvastSvcpCPAvastSvc.exe (clean Avast app)  Hash:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 85ca20eeec3400c68a62639a01928a5dab824d2eadf589e5cbfe5a2bc41d9654<\/pre>\n<figure id=\"attachment_90289\" aria-describedby=\"caption-attachment-90289\" style=\"width: 640px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-02.png\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-90289\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-02.png\" alt=\"\" width=\"640\" height=\"199\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-02.png 780w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-02.png?resize=300,93 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-02.png?resize=768,239 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-90289\" class=\"wp-caption-text\"><em style=\"font-size: 1em\">Figure 2: Clean AvastSvc.exe executable<\/em><\/figcaption><\/figure>\n<p>In our detailed behavioral log for the incident, we noted the following:<\/p>\n<pre>Command line:\u00a0\u00a0\u00a0 RECYCLER.BIN1CEFHelper.exe 142 60  SHA1:\u00a0\u00a0 049813b955db1dd90952657ae2bd34250153563e  SHA256: 85ca20eeec3400c68a62639a01928a5dab824d2eadf589e5cbfe5a2bc41d9654<\/pre>\n<p>&#8220;CEFHelper\u201d is the name of an Adobe process, but that\u2019s not what this file is \u2013 as shown by comparing this SHA256 hash to the hash shown in our previous code snippet (just above Figure 2) for the subverted clean executable, they\u2019re the same file, renamed by the malware. When the file executes, the AvastSvc executable is once again visible:<\/p>\n<pre>\"commandLine\" : \"C:\\ProgramData\\AvastSvcpCP\\AvastSvc.exe 983\",   \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \"commandLine\" : \"C:\\Windows\\system32\\cmd.exe \/c D:\\RECYCLER.BIN\\143CE844B89AC3D0\\tmp.bat\",  \"commandLine\" : \"arp\u00a0 -a \",  \"commandLine\" : \"ipconfig\u00a0 \/all \",  \"commandLine\" : \"systeminfo\u00a0 \",  \"commandLine\" : \"tasklist\u00a0 \/v \",  \"commandLine\" : \"netstat\u00a0 -ano \",<\/pre>\n<p><strong>A Funky Five<\/strong><\/p>\n<p>We saw five file names associated with the infection at this stage. In order, these are the information that the worm collects, the batch file that actually collects the information, and three sideloading components:<\/p>\n<pre>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \"path\" : \"d:\\recycler.bin\\143ce844b89ac3d0\\c3lzlmluzm8\",   \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \"path\" : \"d:\\recycler.bin\\143ce844b89ac3d0\\tmp.bat\",   \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \"path\" : \"d:\\recycler.bin\\1\\avastauth.dat\"   \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \"path\" : \"d:\\recycler.bin\\1\\cefhelper.exe\",   \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \"path\" : \"d:\\recycler.bin\\1\\wsc.dll\",<\/pre>\n<p>We\u2019ll discuss those files at greater length momentarily. We saw three hashes \u2013 or, since the cefhelper.exe and avastsvc.exe file are the same file and have identical hashes, one could say we saw two hashes and one doppelg\u00e4nger:<\/p>\n<pre class=\"Codesample\">d:recycler.bin1cefhelper.exe : 85ca20eeec3400c68a62639a01928a5dab824d2eadf589e5cbfe5a2bc41d9654  c:programdataavastsvcpcpavastsvc.exe : 85ca20eeec3400c68a62639a01928a5dab824d2eadf589e5cbfe5a2bc41d9654  c:programdataavastsvcpcpwsc.dll : 352fb4985fdd150d251ff9e20ca14023eab4f2888e481cbd8370c4ed40cfbb9a<\/pre>\n<p><strong>Shady Mustang, Revealed Panda?<\/strong><\/p>\n<p>We then saw C2 activity reaching out to multiple variations on the IP address 45.142.166[.]112. This IP address was mentioned in in a 2019 Unit 42 <a href=\"https:\/\/unit42.paloaltonetworks.com\/thor-plugx-variant\/\">blog post<\/a> as \u201cother PlugX,\u201d not at that point tied directly to PKPLUG (aka Mustang Panda), the threat actor associated most closely with this malware. At the time, Unit 42\u2019s researchers described this finding as a RAT previously seen post-exploitation in an unrelated infection. Our analysis indicates that all methods seen in use during our investigation align with what is known about the PKPLUG \/ Mustang Panda actor, thus strengthening the link between this IP address and the threat actor.<\/p>\n<p>The compressed parent as seen on VirusTotal:<\/p>\n<pre class=\"Codesample\">e07d58a12ceb3fde8bb6644b467c0a111b8d8b079b33768e4f1f4170e875bc00: AvastSvcpCP(2).zip<\/pre>\n<p>The contents of that file when unzipped look familiar:<\/p>\n<pre class=\"Codesample\">432a07eb49473fa8c71d50ccaf2bc980b692d458ec4aaedd52d739cb377f3428 *AvastAuth.dat  85ca20eeec3400c68a62639a01928a5dab824d2eadf589e5cbfe5a2bc41d9654 *AvastSvc.exe  e8f55d0f327fd1d5f26428b890ef7fe878e135d494acda24ef01c695a2e9136d *wsc.dll<\/pre>\n<p>The payload is PlugX. This version of the payload is called 20190301h:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-02a.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90290\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-02a.png\" alt=\"Screen capture showing the 20190301h payload\" width=\"202\" height=\"146\" \/><\/a><\/p>\n<pre class=\"Codesample\">Config data:  Installation directory: AvastSvcpCP  Mutex name: cUUEdKgjnOOOrpkUEjHp  C2 server: 45.142.166[.]112<\/pre>\n<p>This PlugX malware has a long history and has been dissected in other industry writeups, such as <a href=\"https:\/\/www.avira.com\/en\/blog\/new-wave-of-plugx-targets-hong-kong\">Avira\u2019s<\/a> and <a href=\"https:\/\/www.ctfiot.com\/59605.html\">QiAnXin&#8217;s<\/a> analyses. In this coverage we\u2019ll mainly focus on the USB worm functionality.<\/p>\n<p>It uses mutex when copying files to available removable media, using these template strings:<\/p>\n<pre class=\"Codesample\">USB_NOTIFY_COP_%ws  USB_NOTIFY_INF_%ws<\/pre>\n<p>It then uses a couple of tricks to hide its malicious content from the casual observer. First, the infected removable media will seem to be empty. In Windows Explorer it would appear that the drive only contains another removable drive.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-03.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90291\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-03.png\" alt=\"A deceptive screen capture of the USB drive's top-level directory\" width=\"440\" height=\"184\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-03.png 440w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-03.png?resize=300,125 300w\" sizes=\"auto, (max-width: 440px) 100vw, 440px\" \/><\/a><\/p>\n<p><em>Figure 3: A suspiciously tidy view from inside Explorer<\/em><\/p>\n<p>In reality the displayed item is not actually a drive but a Windows shortcut file, using an icon resembling the one used for removable media. Should the victim click on this file, it runs the CEFHelper executable we noted above:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-04.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90292\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-04.png\" alt=\"Properties of the &quot;removable&quot; &quot;drive&quot; in the directory\" width=\"307\" height=\"298\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-04.png 307w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-04.png?resize=300,291 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-04.png?resize=32,32 32w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-04.png?resize=50,50 50w\" sizes=\"auto, (max-width: 307px) 100vw, 307px\" \/><\/a><\/p>\n<p><em>Figure 4: The \u201cremovable disk\u201d is revealed as the questionable CEFHelper executable<\/em><\/p>\n<p>The other files and directories have the hidden and system attributes set, so they will not be visible by default in the file listing. After specifically enabling the display of hidden and system files, we can see the rest of the content (and also see the \u201cRemovable Disk(1 TB) item correctly shown as a mere shortcut):<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-05.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90293\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-05.png\" alt=\"The directory with the hidden files displayed\" width=\"417\" height=\"159\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-05.png 417w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-05.png?resize=300,114 300w\" sizes=\"auto, (max-width: 417px) 100vw, 417px\" \/><\/a><\/p>\n<p><em>Figure 5: With display enabled for hidden and system files, the \u201ctidy\u201d view in Figure 4 changes<\/em><\/p>\n<p>The files copied by the backdoor are in the RECYCLER.BIN directory \u2013 for which the worm, in another obfuscation maneuver, drops a desktop.ini file that associates the directory with the actual Recycle function. (RECYCLER is the NTFS-era name for the thing that is $Recycle.bin on modern Windows systems; NTFS systems include Windows 2000, NT, and XP.) This causes Windows to treat the directory as if it really is a Windows Recycle Bin, and files deleted by the user will be displayed there \u2013 not even those from the USB drive, but from the user\u2019s actual hard drive.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-06.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90294\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-06.png\" alt=\"True contents of &quot;recycler.bin&quot; \" width=\"273\" height=\"229\" \/><\/a><\/p>\n<p><em>Figure 6: Contents of the system\u2019s actual trash, displayed in \u201crecycler.bin\u201d<\/em><\/p>\n<p>Again, specific commands in the Windows command prompt reveal the real content of the RECYCLER.BIN directory:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-07.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90295\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-07.png\" alt=\"A file listing for the Recycler Bin directory as seen via command line\" width=\"418\" height=\"169\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-07.png 418w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-07.png?resize=300,121 300w\" sizes=\"auto, (max-width: 418px) 100vw, 418px\" \/><\/a><\/p>\n<p><em>Figure 7: Once again, hidden files are revealed<\/em><\/p>\n<p>Alternatively, a less easily deceived file explorer, such as Total Commander, can be used to browse the content. Both methods show that the RECYCLER.BIN directory actually contains two subdirectories:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-08.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90296\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-08.png\" alt=\"The recycler.bin directory as seen in Total Commander\" width=\"438\" height=\"127\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-08.png 438w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-08.png?resize=300,87 300w\" sizes=\"auto, (max-width: 438px) 100vw, 438px\" \/><\/a><\/p>\n<p><em>Figure 8: The same directory viewed through Total Commander<\/em><\/p>\n<p>The directory named 1 contains the DLL sideloading components we\u2019ve previously seen:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-09.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90297\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-09.png\" alt=\"Contents of the recycler.bin\/1 subdirectory, with three files visible\" width=\"437\" height=\"134\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-09.png 437w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-09.png?resize=300,92 300w\" sizes=\"auto, (max-width: 437px) 100vw, 437px\" \/><\/a><\/p>\n<p><em>Figure 9: Delving into the directory called 1<\/em><\/p>\n<p>The other directory, which has a random name, contains the victim\u2019s exfiltrated files. The first image below is the intermediate state. Note the tmp.bat file present:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-10.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90298\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-10.png\" alt=\"The contents of the randomly named directory, including a very large encrypted file\" width=\"534\" height=\"151\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-10.png 534w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-10.png?resize=300,85 300w\" sizes=\"auto, (max-width: 534px) 100vw, 534px\" \/><\/a><\/p>\n<p><em>Figure 10: The other directory, where the victim\u2019s belongings are stashed<\/em><\/p>\n<p>The tmp.bat file collects the system info and saves it to the first seemingly randomly named file in the directory shown above (in the image, the file that\u2019s over 1GB in size). That file name is not truly random \u2013 it is the base64 encoded form of <em>sys.info.<\/em><\/p>\n<p>When the batch file has finished its collection, it removes itself. All that\u2019s left are the \u201cc3lzLmluZm8\u201d file with the system info and the collected files.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-11.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90299\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-11.png\" alt=\"The directory from the previous figure once the batch file has completed encryption\" width=\"449\" height=\"121\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-11.png 449w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-11.png?resize=300,81 300w\" sizes=\"auto, (max-width: 449px) 100vw, 449px\" \/><\/a><\/p>\n<p><em>Figure 11: The other directory once more, after the batch file has finished its dirty work and removed itself<\/em><\/p>\n<p>PlugX collects .doc, .docx, .xls, .xlsx, .ppt, .pptx and .pdf files (if the individual file size is not larger than 314572800 bytes), likely for exfiltration. It saves them in encrypted form to the RECYCLER.BIN as shown above. The filenames, including the path indicator, are converted to base64 form. For example, in the Figure 11 image, the two file names decode to:<\/p>\n<pre class=\"Codesample\">Documents_coolclient.docx  Documents_serverdll.docx<\/pre>\n<p>The content of each file is also, of course, encrypted:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-12.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-90300\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-12.png\" alt=\"A hex file you never want to encounter on your own machine\" width=\"554\" height=\"139\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-12.png 554w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/figure-12.png?resize=300,75 300w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><\/a><\/p>\n<p><em>Figure 12: The victim\u2019s belongings, encrypted<\/em><\/p>\n<p>As noted above, Sophos detected and blocked the attempted exfiltration. We\u2019ll add the IoCs discussed in this thread to our <a href=\"https:\/\/github.com\/sophoslabs\/IoCs\">Github repository<\/a>.<\/p>\n<p>As for the use of USB worms in 2023, they were certainly more common a decade or two ago, when a threat actor could compromise the Pentagon by <a href=\"https:\/\/www.washingtonpost.com\/national\/national-security\/cyber-intruder-sparks-response-debate\/2011\/12\/06\/gIQAxLuFgO_story.html\">dropping<\/a> a thumb drive or two in the right parking lot. However, as defenders alerted users to the potential attack vector, and other method of file storage and transmission became more popular, this technique was abandoned. Now APT groups are re-adding this method as an effective infection and exfiltration method. Once again an old technique resurfaces and makes new waves &#8212; this time causing far-flung local outbreaks.<\/p>\n<p>&nbsp;<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/03\/09\/border-hopping-plugx-usb-worm\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/03\/shutterstock_181422410.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gabor Szappanos| Date: Thu, 09 Mar 2023 11:00:02 +0000<\/strong><\/p>\n<p>Borne aloft by DLL sideloading, a far-flung infection touches ten time zones <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[27897,129,20692,27030,16771,28826],"class_list":["post-21445","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-dll-side-load","tag-featured","tag-plugx","tag-sophos-x-ops","tag-threat-research","tag-usb-worm"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21445"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21445\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21445"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}