{"id":6346,"date":"2017-01-23T15:50:29","date_gmt":"2017-01-23T23:50:29","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-184\/"},"modified":"2017-01-23T15:50:29","modified_gmt":"2017-01-23T23:50:29","slug":"news-184","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-184\/","title":{"rendered":"No slowdown in Cerber ransomware activity as 2016 draws to a close"},"content":{"rendered":"<p>As everybody else winds down for the holidays, the cybercriminals behind <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=Win32\/Cerber\">Cerber<\/a> are busy ramping up their operations.<\/p>\n<p>Following our discovery of a spam campaign that takes advantage of <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/12\/13\/been-shopping-lately-fake-credit-card-email-can-spook-you-into-downloading-cerber-ransomware\/\">holiday shopping<\/a>, we found two new campaigns that continue distributing the latest variants of\u00a0Cerber <a target=\"_blank\" href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/tag\/ransomware\/\">ransomware<\/a>. These campaigns are the latest in a series of persistent cybercriminal efforts that keep Cerber constantly active.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"668\" height=\"382\" class=\"alignnone size-full wp-image-10105\" alt=\"cerber-machine-encounters\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-machine-encounters.png\" \/><\/p>\n<p><em>Figure 1. Cerber activity trending\u00a0in the past three months<\/em><\/p>\n<p>First, we detected a fresh spam campaign that delivers document files in password-protected .zip archives. The emails use simple subject lines like \u201cHowdy\u201d or \u201cHello\u201d, while the email body seem to keep the holiday shopping theme with messages like \u201cyour order should be delivered today\u201d and \u201cStatement is attached\u201d. The password to the archive, which is usually \u201c6666\u201d in this campaign, is in the email body.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"801\" height=\"535\" class=\"alignnone size-full wp-image-10115\" alt=\"cerber-email-1\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-email-1.png\" \/><\/p>\n<p><em>Figure 2. Sample spam email from recent Donoff campaign that distributes a new version of Cerber<\/em><\/p>\n<p>When\u00a0extracted, the document files run malicious macro code\u00a0detected by Windows Defender as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=TrojanDownloader:O97M\/Donoff\">TrojanDownloader:O97M\/Donoff<\/a>. Donoff is a Trojan downloader that installs malware; in this campaign, it downloads and executes Cerber.<\/p>\n<p>Our tracking of Donoff activity shows a spike corresponding to the email campaign.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"668\" height=\"406\" class=\"alignnone wp-image-10086\" alt=\"cerber-donoff-activity\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-donoff-activity.png\" \/><\/p>\n<p><em>Figure 3. Donoff activity for the past 30 days<\/em><\/p>\n<p>The second campaign that we discovered distributing Cerber ransomware\u00a0uses the RIG exploit kit, which Windows Defender detects as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Exploit:HTML\/Meadgive.W\">Exploit:HTML\/Meadgive<\/a>. When a user accesses a compromised page or an attacker-controlled website hosting the exploit kit, vulnerabilities like <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8651\">CVE-2015-8651<\/a> are exploited, and Cerber is downloaded and executed on the computer.<\/p>\n<p>Telemetry from Windows Defender shows that this latest exploit kit attack that leads to Cerber largely affects Asia and Europe.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"616\" height=\"265\" class=\"alignnone size-full wp-image-10125\" alt=\"cerber-rig-exploit-distribution\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-rig-exploit-distribution.png\" \/><\/p>\n<p><em>Figure 4. Geographic distribution of victims of recent RIG exploit kit distributing Cerber<\/em><\/p>\n<p>The two\u00a0campaigns deliver variants of the new version of Cerber ransomware. These new iterations of the malware sport\u00a0updated configuration and behavior, demonstrating that the cybercriminals behind them are not slowing down in evolving the malware.<\/p>\n<p>Below are the notable updates seen in the latest version of Cerber:<\/p>\n<ol>\n<li>As with the <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/12\/13\/been-shopping-lately-fake-credit-card-email-can-spook-you-into-downloading-cerber-ransomware\/\">holiday-themed campaign<\/a> from a few weeks ago, these new Cerber variants arrive with a wallpaper that is noticeably modified from previous versions\u2019 green palette to red:<br \/> <img loading=\"lazy\" decoding=\"async\" width=\"769\" height=\"536\" class=\"alignnone size-full wp-image-10096\" alt=\"cerber-christmas-wallpaper\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-christmas-wallpaper.png\" \/><br \/> <em>Figure 5. New Cerber wallpaper, which changed its color palette <\/em><\/li>\n<li>Another level of obfuscation is used: UPX on the top of the Nullsoft installer and custom encryption used by older versions.<\/li>\n<li>The configuration, which contains the most important data that determine the behavior of the ransomware, are encrypted using RC4 just like older versions, but using Crypto APIs instead of custom implementation.<\/li>\n<li>Threat version information, which has been useful in tracking the evolution of Cerber, is nowhere to be found in the configuration.<\/li>\n<li>More than 50 new file name extensions are added as targets for encryption; on the other hand, several file name extensions, including .exe., .cmd, and .msi, are exempted from the encryption routine; this latter behavior has been observed in other prominent ransomware families, but we\u2019re seeing it for the first time with Cerber.<\/li>\n<li>Folders that are prioritized during encryption include new ones, like <em>microsoftonenote<\/em>, <em>microsoftoutlook<\/em>, and <em>microsoftexcel<\/em>, among others; however, folders that are exempted from the encryption routine now include &#8220;$windows.~ws&#8221;, &#8220;intel&#8221;, and &#8220;windows10upgrade&#8221;, among others<\/li>\n<li>Shadow copies are no longer deleted.<\/li>\n<li>Payment site provided is now\u00a0a single Tor proxy site, compared to three proxy sites in older versions.<\/li>\n<li>The cybercriminals added two new sets of IP ranges where command-and-control (C&amp;C) servers\u00a0reside.<\/li>\n<\/ol>\n<p>For cybercriminals, releasing a new version of malware not only increases likelihood of evading antivirus detection; it\u2019s also a way of increasing the complexity of malware. Cerber\u2019s long list of updated behavior indicates that the cybercriminals are highly motivated to continue improving the malware and the campaigns that deliver it.<\/p>\n<p>It is important to note that one of the most critical updates in this latest version of Cerber is the new folders it prioritizes during encryption. The added folders, which include <em>microsoftonenote<\/em>, <em>microsoftoutlook<\/em>, and <em>microsoftexcel<\/em> among others, is further indication that the malware is designed to look for critical Microsoft\u00a0Office files to encrypt in enterprise environments.<\/p>\n<h2>Stopping Cerber infection in Windows 10<\/h2>\n<p>Windows 10 has security technologies that can detect this new batch of updated Cerber ransomwre. Keep your computers up-to-date in order to get the benefits from the latest features and proactive mitigation built into the latest versions of Windows.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/17464\/windows-defender-help-protect-computer?ocid=-2147269815\">Windows Defender<\/a> detects the new version of Cerber ransomware as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Cerber\">Win32\/Cerber<\/a>. It also detects files related to the two campaigns that deliver the ransomware: the malicious attachments used in the spam campaign as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/entry.aspx?Name=TrojanDownloader%3AO97M%2FDonoff\">TrojanDownloader:O97M\/Donoff<\/a>, and the RIG exploit kit as <a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Exploit:HTML\/Meadgive.W\">Exploit:HTML\/Meadgive<\/a>.<\/p>\n<p><a href=\"https:\/\/blogs.windows.com\/msedgedev\/2015\/12\/16\/smartscreen-drive-by-improvements\/\">Microsoft Edge<\/a> can help prevent exploit kits from running and executing ransomware on computers. <a href=\"https:\/\/blogs.windows.com\/msedgedev\/2015\/12\/16\/smartscreen-drive-by-improvements\/\">SmartScreen Filter<\/a> uses URL reputation to block access to malicious sites, such as those hosting exploit kits.<\/p>\n<p><a href=\"https:\/\/blogs.office.com\/2016\/01\/14\/leading-the-way-in-the-fight-against-dangerous-email-threats\/\">Office 365 Advanced Threat Protection<\/a> blocks malicious emails that spread malicious documents that could eventually install Cerber.<\/p>\n<p><a href=\"https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/keep-secure\/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies\">Device guard<\/a> protects systems from malicious applications like ransomware\u00a0by maintaining a custom catalog of known good applications and stopping kernel-level malware with virtualization-based security.<\/p>\n<p>IT administrators can use <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/03\/22\/new-feature-in-office-2016-can-block-macros-and-help-prevent-infection\/\">Group Policy in Office 2016<\/a> to block known malicious macros, such as the documents in password-protected email attachments used in this campaign, from running. They can also use <a href=\"http:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/5211.how-to-configure-applocker-group-policy-to-prevent-software-from-running.aspx\">AppLocker group policy<\/a>\u00a0to prevent dubious software from running.<\/p>\n<p>IT administrators can also use <a href=\"https:\/\/www.microsoft.com\/en-us\/WindowsForBusiness\/windows-atp\">Windows Defender Advanced Threat Protection<\/a> to get alerts when suspicious activities are observed in the network, allowing them detect, investigate, and respond to ransomware infection and other advanced attacks on enterprise networks.<\/p>\n<h2>An in-depth look at the spam campaign<\/h2>\n<p>Beyond providing protection, Microsoft Malware Protection Center (MMPC)\u00a0monitors and analyzes\u00a0Cerber and related campaigns in-depth\u00a0in order\u00a0to discern trends and gain deeper understanding of cybercriminal activity. This is how we were able to trace the evolution of Cerber and see the signs that it\u2019s not letting up.<\/p>\n<p>Cerber has historically heavily used email as a primary infection vector. It is no different in this campaign.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"804\" height=\"563\" class=\"alignnone size-full wp-image-10145\" alt=\"cerber-email-2\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-email-2.png\" \/><\/p>\n<p><em>Figure 6. Another sample spam email from recent Donoff campaign that distributes a new version of Cerber<\/em><\/p>\n<p>The attachment is usually a password-protected .zip archive that contains a macro malware in the form of a Microsoft Word document. When opened, the archive prompts for a password, which is indicated in the email body. This is a change from past campaigns, which password-protected the document, rather than the .zip file itself.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"305\" height=\"264\" class=\"alignnone size-full wp-image-10155\" alt=\"cerber-zip-password\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-zip-password.png\" \/><\/p>\n<p><em>Figure 7. Attachment is a password-protected .zip archive<\/em><\/p>\n<p>When extracted and executed, the document attempts to run its malicious macro code. Thus, Microsoft Office warns users\u00a0about manually enabling macro, empowering users to block infection at this point. The document lures users to enable macro by faking a Microsoft Word message.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"950\" height=\"610\" class=\"alignnone size-full wp-image-10175\" alt=\"cerber-macro\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-macro.png\" \/><\/p>\n<p><em>Figure 8. Malicious document lures users into enabling macro<\/em><\/p>\n<p>The macro code contains obfuscated downloading routines, as seen below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"738\" height=\"493\" class=\"alignnone size-full wp-image-10126\" alt=\"cerber-macro-code\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-macro-code.png\" \/><\/p>\n<p><em>Figure 9. Malware code showing obfuscated download link<\/em><\/p>\n<p>The macro code executes the following PowerShell command to attempt to download and execute Cerber in the <em>%AppData%<\/em> folder:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"28\" class=\"alignnone size-full wp-image-10106\" alt=\"cerber-macro-powershell\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-macro-powershell.png\" \/><\/p>\n<p><em>Figure 10. Malware code showing PowerShell command<\/em><\/p>\n<h2>An in-depth look at the new Cerber version<\/h2>\n<p>The latest version of Cerber\u00a0protects the configuration data embedded in the malware binary using RC4. However, while older versions use custom codes to implement RC4, this new version uses Crypto APIs. The RC4 key is still embedded in the malware binary.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"727\" height=\"325\" class=\"alignnone size-full wp-image-10116\" alt=\"cerber-malware-code-1\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-malware-code-1.png\" \/><\/p>\n<p><em>Figure 11. Code to pass RC4key and encrypted config data to the decryptor<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"859\" height=\"559\" class=\"alignnone size-full wp-image-10165\" alt=\"cerber-malware-code-2\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-malware-code-2.png\" \/><\/p>\n<p><em>Figure 12. RC4 decryption using crypto APIs<\/em><\/p>\n<p>Cerber adds more than 50 file name extensions to its file encryption routine, bringing the total number of target file types to 493:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"69\">.123<\/td>\n<td width=\"69\">.1cd<\/td>\n<td width=\"69\">.3dm<\/td>\n<td width=\"69\">.3ds<\/td>\n<td width=\"69\">.3fr<\/td>\n<td width=\"69\">.3g2<\/td>\n<td width=\"69\">.3gp<\/td>\n<td width=\"69\">.3pr<\/td>\n<td width=\"69\">.602<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.7z<\/td>\n<td width=\"69\">.7zip<\/td>\n<td width=\"69\">.aac<\/td>\n<td width=\"69\">.ab4<\/td>\n<td width=\"69\">.abd<\/td>\n<td width=\"69\">.acc<\/td>\n<td width=\"69\">.accdb<\/td>\n<td width=\"69\">.accde<\/td>\n<td width=\"69\">.accdr<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.accdt<\/td>\n<td width=\"69\">.ach<\/td>\n<td width=\"69\">.acr<\/td>\n<td width=\"69\">.act<\/td>\n<td width=\"69\">.adb<\/td>\n<td width=\"69\">.adp<\/td>\n<td width=\"69\">.ads<\/td>\n<td width=\"69\">.aes<\/td>\n<td width=\"69\">.agdl<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.ai<\/td>\n<td width=\"69\">.aiff<\/td>\n<td width=\"69\">.ait<\/td>\n<td width=\"69\">.al<\/td>\n<td width=\"69\">.aoi<\/td>\n<td width=\"69\">.apj<\/td>\n<td width=\"69\">.apk<\/td>\n<td width=\"69\">.arc<\/td>\n<td width=\"69\">.arw<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.ascx<\/td>\n<td width=\"69\">.asf<\/td>\n<td width=\"69\">.asm<\/td>\n<td width=\"69\">.asp<\/td>\n<td width=\"69\">.aspx<\/td>\n<td width=\"69\">.asset<\/td>\n<td width=\"69\">.asx<\/td>\n<td width=\"69\">.atb<\/td>\n<td width=\"69\">.avi<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.awg<\/td>\n<td width=\"69\">.back<\/td>\n<td width=\"69\">.backup<\/td>\n<td width=\"69\">.backupdb<\/td>\n<td width=\"69\">.bak<\/td>\n<td width=\"69\">.bank<\/td>\n<td width=\"69\">.bat<\/td>\n<td width=\"69\">.bay<\/td>\n<td width=\"69\">.bdb<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.bgt<\/td>\n<td width=\"69\">.bik<\/td>\n<td width=\"69\">.bin<\/td>\n<td width=\"69\">.bkp<\/td>\n<td width=\"69\">.blend<\/td>\n<td width=\"69\">.bmp<\/td>\n<td width=\"69\">.bpw<\/td>\n<td width=\"69\">.brd<\/td>\n<td width=\"69\">.bsa<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.bz2<\/td>\n<td width=\"69\">.c<\/td>\n<td width=\"69\">.cash<\/td>\n<td width=\"69\">.cdb<\/td>\n<td width=\"69\">.cdf<\/td>\n<td width=\"69\">.cdr<\/td>\n<td width=\"69\">.cdr3<\/td>\n<td width=\"69\">.cdr4<\/td>\n<td width=\"69\">.cdr5<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.cdr6<\/td>\n<td width=\"69\">.cdrw<\/td>\n<td width=\"69\">.cdx<\/td>\n<td width=\"69\">.ce1<\/td>\n<td width=\"69\">.ce2<\/td>\n<td width=\"69\">.cer<\/td>\n<td width=\"69\">.cfg<\/td>\n<td width=\"69\">.cfn<\/td>\n<td width=\"69\">.cgm<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.cib<\/td>\n<td width=\"69\">.class<\/td>\n<td width=\"69\">.cls<\/td>\n<td width=\"69\">.cmd<\/td>\n<td width=\"69\">.cmt<\/td>\n<td width=\"69\">.config<\/td>\n<td width=\"69\">.contact<\/td>\n<td width=\"69\">.cpi<\/td>\n<td width=\"69\">.cpp<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.cr2<\/td>\n<td width=\"69\">.craw<\/td>\n<td width=\"69\">.crt<\/td>\n<td width=\"69\">.crw<\/td>\n<td width=\"69\">.cry<\/td>\n<td width=\"69\">.cs<\/td>\n<td width=\"69\">.csh<\/td>\n<td width=\"69\">.csl<\/td>\n<td width=\"69\">.csr<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.css<\/td>\n<td width=\"69\">.csv<\/td>\n<td width=\"69\">.d3dbsp<\/td>\n<td width=\"69\">.dac<\/td>\n<td width=\"69\">.das<\/td>\n<td width=\"69\">.dat<\/td>\n<td width=\"69\">.db<\/td>\n<td width=\"69\">.db3<\/td>\n<td width=\"69\">.db_journal<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.dbf<\/td>\n<td width=\"69\">.dbx<\/td>\n<td width=\"69\">.dc2<\/td>\n<td width=\"69\">.dch<\/td>\n<td width=\"69\">.dcr<\/td>\n<td width=\"69\">.dcs<\/td>\n<td width=\"69\">.ddd<\/td>\n<td width=\"69\">.ddoc<\/td>\n<td width=\"69\">.ddrw<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.dds<\/td>\n<td width=\"69\">.def<\/td>\n<td width=\"69\">.der<\/td>\n<td width=\"69\">.des<\/td>\n<td width=\"69\">.design<\/td>\n<td width=\"69\">.dgc<\/td>\n<td width=\"69\">.dgn<\/td>\n<td width=\"69\">.dif<\/td>\n<td width=\"69\">.dip<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.dit<\/td>\n<td width=\"69\">.djv<\/td>\n<td width=\"69\">.djvu<\/td>\n<td width=\"69\">.dng<\/td>\n<td width=\"69\">.doc<\/td>\n<td width=\"69\">.docb<\/td>\n<td width=\"69\">.docm<\/td>\n<td width=\"69\">.docx<\/td>\n<td width=\"69\">.dot<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.dotm<\/td>\n<td width=\"69\">.dotx<\/td>\n<td width=\"69\">.drf<\/td>\n<td width=\"69\">.drw<\/td>\n<td width=\"69\">.dtd<\/td>\n<td width=\"69\">.dwg<\/td>\n<td width=\"69\">.dxb<\/td>\n<td width=\"69\">.dxf<\/td>\n<td width=\"69\">.dxg<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.edb<\/td>\n<td width=\"69\">.eml<\/td>\n<td width=\"69\">.eps<\/td>\n<td width=\"69\">.erbsql<\/td>\n<td width=\"69\">.erf<\/td>\n<td width=\"69\">.exf<\/td>\n<td width=\"69\">.fdb<\/td>\n<td width=\"69\">.ffd<\/td>\n<td width=\"69\">.fff<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.fh<\/td>\n<td width=\"69\">.fhd<\/td>\n<td width=\"69\">.fla<\/td>\n<td width=\"69\">.flac<\/td>\n<td width=\"69\">.flb<\/td>\n<td width=\"69\">.flf<\/td>\n<td width=\"69\">.flv<\/td>\n<td width=\"69\">.forge<\/td>\n<td width=\"69\">.fpx<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.frm<\/td>\n<td width=\"69\">.fxg<\/td>\n<td width=\"69\">.gbr<\/td>\n<td width=\"69\">.gho<\/td>\n<td width=\"69\">.gif<\/td>\n<td width=\"69\">.gpg<\/td>\n<td width=\"69\">.gray<\/td>\n<td width=\"69\">.grey<\/td>\n<td width=\"69\">.groups<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.gry<\/td>\n<td width=\"69\">.gz<\/td>\n<td width=\"69\">.h<\/td>\n<td width=\"69\">.hbk<\/td>\n<td width=\"69\">.hdd<\/td>\n<td width=\"69\">.hpp<\/td>\n<td width=\"69\">.html<\/td>\n<td width=\"69\">.hwp<\/td>\n<td width=\"69\">.ibank<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.ibd<\/td>\n<td width=\"69\">.ibz<\/td>\n<td width=\"69\">.idx<\/td>\n<td width=\"69\">.iif<\/td>\n<td width=\"69\">.iiq<\/td>\n<td width=\"69\">.incpas<\/td>\n<td width=\"69\">.indd<\/td>\n<td width=\"69\">.info<\/td>\n<td width=\"69\">.info_<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.iwi<\/td>\n<td width=\"69\">.jar<\/td>\n<td width=\"69\">.java<\/td>\n<td width=\"69\">.jnt<\/td>\n<td width=\"69\">.jpe<\/td>\n<td width=\"69\">.jpeg<\/td>\n<td width=\"69\">.jpg<\/td>\n<td width=\"69\">.js<\/td>\n<td width=\"69\">.json<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.k2p<\/td>\n<td width=\"69\">.kc2<\/td>\n<td width=\"69\">.kdbx<\/td>\n<td width=\"69\">.kdc<\/td>\n<td width=\"69\">.key<\/td>\n<td width=\"69\">.kpdx<\/td>\n<td width=\"69\">.kwm<\/td>\n<td width=\"69\">.laccdb<\/td>\n<td width=\"69\">.lay<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.lay6<\/td>\n<td width=\"69\">.lbf<\/td>\n<td width=\"69\">.lck<\/td>\n<td width=\"69\">.ldf<\/td>\n<td width=\"69\">.lit<\/td>\n<td width=\"69\">.litemod<\/td>\n<td width=\"69\">.litesql<\/td>\n<td width=\"69\">.lock<\/td>\n<td width=\"69\">.ltx<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.lua<\/td>\n<td width=\"69\">.m<\/td>\n<td width=\"69\">.m2ts<\/td>\n<td width=\"69\">.m3u<\/td>\n<td width=\"69\">.m4a<\/td>\n<td width=\"69\">.m4p<\/td>\n<td width=\"69\">.m4u<\/td>\n<td width=\"69\">.m4v<\/td>\n<td width=\"69\">.ma<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.mab<\/td>\n<td width=\"69\">.mapimail<\/td>\n<td width=\"69\">.max<\/td>\n<td width=\"69\">.mbx<\/td>\n<td width=\"69\">.md<\/td>\n<td width=\"69\">.mdb<\/td>\n<td width=\"69\">.mdc<\/td>\n<td width=\"69\">.mdf<\/td>\n<td width=\"69\">.mef<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.mfw<\/td>\n<td width=\"69\">.mid<\/td>\n<td width=\"69\">.mkv<\/td>\n<td width=\"69\">.mlb<\/td>\n<td width=\"69\">.mml<\/td>\n<td width=\"69\">.mmw<\/td>\n<td width=\"69\">.mny<\/td>\n<td width=\"69\">.money<\/td>\n<td width=\"69\">.moneywell<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.mos<\/td>\n<td width=\"69\">.mov<\/td>\n<td width=\"69\">.mp3<\/td>\n<td width=\"69\">.mp4<\/td>\n<td width=\"69\">.mpeg<\/td>\n<td width=\"69\">.mpg<\/td>\n<td width=\"69\">.mrw<\/td>\n<td width=\"69\">.ms11<\/td>\n<td width=\"69\">.msf<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.msg<\/td>\n<td width=\"69\">.mts<\/td>\n<td width=\"69\">.myd<\/td>\n<td width=\"69\">.myi<\/td>\n<td width=\"69\">.nd<\/td>\n<td width=\"69\">.ndd<\/td>\n<td width=\"69\">.ndf<\/td>\n<td width=\"69\">.nef<\/td>\n<td width=\"69\">.nk2<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.nop<\/td>\n<td width=\"69\">.nrw<\/td>\n<td width=\"69\">.ns2<\/td>\n<td width=\"69\">.ns3<\/td>\n<td width=\"69\">.ns4<\/td>\n<td width=\"69\">.nsd<\/td>\n<td width=\"69\">.nsf<\/td>\n<td width=\"69\">.nsg<\/td>\n<td width=\"69\">.nsh<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.nvram<\/td>\n<td width=\"69\">.nwb<\/td>\n<td width=\"69\">.nx2<\/td>\n<td width=\"69\">.nxl<\/td>\n<td width=\"69\">.nyf<\/td>\n<td width=\"69\">.oab<\/td>\n<td width=\"69\">.obj<\/td>\n<td width=\"69\">.odb<\/td>\n<td width=\"69\">.odc<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.odf<\/td>\n<td width=\"69\">.odg<\/td>\n<td width=\"69\">.odm<\/td>\n<td width=\"69\">.odp<\/td>\n<td width=\"69\">.ods<\/td>\n<td width=\"69\">.odt<\/td>\n<td width=\"69\">.ogg<\/td>\n<td width=\"69\">.oil<\/td>\n<td width=\"69\">.omg<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.one<\/td>\n<td width=\"69\">.onenotec2<\/td>\n<td width=\"69\">.orf<\/td>\n<td width=\"69\">.ost<\/td>\n<td width=\"69\">.otg<\/td>\n<td width=\"69\">.oth<\/td>\n<td width=\"69\">.otp<\/td>\n<td width=\"69\">.ots<\/td>\n<td width=\"69\">.ott<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.p12<\/td>\n<td width=\"69\">.p7b<\/td>\n<td width=\"69\">.p7c<\/td>\n<td width=\"69\">.pab<\/td>\n<td width=\"69\">.pages<\/td>\n<td width=\"69\">.paq<\/td>\n<td width=\"69\">.pas<\/td>\n<td width=\"69\">.pat<\/td>\n<td width=\"69\">.pbf<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.pcd<\/td>\n<td width=\"69\">.pct<\/td>\n<td width=\"69\">.pdb<\/td>\n<td width=\"69\">.pdd<\/td>\n<td width=\"69\">.pdf<\/td>\n<td width=\"69\">.pef<\/td>\n<td width=\"69\">.pem<\/td>\n<td width=\"69\">.pfx<\/td>\n<td width=\"69\">.php<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.pif<\/td>\n<td width=\"69\">.pl<\/td>\n<td width=\"69\">.plc<\/td>\n<td width=\"69\">.plus_muhd<\/td>\n<td width=\"69\">.pm!<\/td>\n<td width=\"69\">.pm<\/td>\n<td width=\"69\">.pmi<\/td>\n<td width=\"69\">.pmj<\/td>\n<td width=\"69\">.pml<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.pmm<\/td>\n<td width=\"69\">.pmo<\/td>\n<td width=\"69\">.pmr<\/td>\n<td width=\"69\">.pnc<\/td>\n<td width=\"69\">.pnd<\/td>\n<td width=\"69\">.png<\/td>\n<td width=\"69\">.pnx<\/td>\n<td width=\"69\">.pot<\/td>\n<td width=\"69\">.potm<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.potx<\/td>\n<td width=\"69\">.ppam<\/td>\n<td width=\"69\">.pps<\/td>\n<td width=\"69\">.ppsm<\/td>\n<td width=\"69\">.ppsx<\/td>\n<td width=\"69\">.ppt<\/td>\n<td width=\"69\">.pptm<\/td>\n<td width=\"69\">.pptx<\/td>\n<td width=\"69\">.prf<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.private<\/td>\n<td width=\"69\">.ps<\/td>\n<td width=\"69\">.psafe3<\/td>\n<td width=\"69\">.psd<\/td>\n<td width=\"69\">.pspimage<\/td>\n<td width=\"69\">.pst<\/td>\n<td width=\"69\">.ptx<\/td>\n<td width=\"69\">.pub<\/td>\n<td width=\"69\">.pwm<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.py<\/td>\n<td width=\"69\">.qba<\/td>\n<td width=\"69\">.qbb<\/td>\n<td width=\"69\">.qbm<\/td>\n<td width=\"69\">.qbr<\/td>\n<td width=\"69\">.qbw<\/td>\n<td width=\"69\">.qbx<\/td>\n<td width=\"69\">.qby<\/td>\n<td width=\"69\">.qcow<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.qcow2<\/td>\n<td width=\"69\">.qed<\/td>\n<td width=\"69\">.qtb<\/td>\n<td width=\"69\">.r3d<\/td>\n<td width=\"69\">.raf<\/td>\n<td width=\"69\">.rar<\/td>\n<td width=\"69\">.rat<\/td>\n<td width=\"69\">.raw<\/td>\n<td width=\"69\">.rb<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.rdb<\/td>\n<td width=\"69\">.re4<\/td>\n<td width=\"69\">.rm<\/td>\n<td width=\"69\">.rtf<\/td>\n<td width=\"69\">.rvt<\/td>\n<td width=\"69\">.rw2<\/td>\n<td width=\"69\">.rwl<\/td>\n<td width=\"69\">.rwz<\/td>\n<td width=\"69\">.s3db<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.safe<\/td>\n<td width=\"69\">.sas7bdat<\/td>\n<td width=\"69\">.sav<\/td>\n<td width=\"69\">.save<\/td>\n<td width=\"69\">.say<\/td>\n<td width=\"69\">.sch<\/td>\n<td width=\"69\">.sd0<\/td>\n<td width=\"69\">.sda<\/td>\n<td width=\"69\">.sdb<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.sdf<\/td>\n<td width=\"69\">.secret<\/td>\n<td width=\"69\">.sh<\/td>\n<td width=\"69\">.sldm<\/td>\n<td width=\"69\">.sldx<\/td>\n<td width=\"69\">.slk<\/td>\n<td width=\"69\">.slm<\/td>\n<td width=\"69\">.sql<\/td>\n<td width=\"69\">.sqlite<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.sqlite-shm<\/td>\n<td width=\"69\">.sqlite-wal<\/td>\n<td width=\"69\">.sqlite3<\/td>\n<td width=\"69\">.sqlitedb<\/td>\n<td width=\"69\">.sr2<\/td>\n<td width=\"69\">.srb<\/td>\n<td width=\"69\">.srf<\/td>\n<td width=\"69\">.srs<\/td>\n<td width=\"69\">.srt<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.srw<\/td>\n<td width=\"69\">.st4<\/td>\n<td width=\"69\">.st5<\/td>\n<td width=\"69\">.st6<\/td>\n<td width=\"69\">.st7<\/td>\n<td width=\"69\">.st8<\/td>\n<td width=\"69\">.stc<\/td>\n<td width=\"69\">.std<\/td>\n<td width=\"69\">.sti<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.stl<\/td>\n<td width=\"69\">.stm<\/td>\n<td width=\"69\">.stw<\/td>\n<td width=\"69\">.stx<\/td>\n<td width=\"69\">.svg<\/td>\n<td width=\"69\">.swf<\/td>\n<td width=\"69\">.sxc<\/td>\n<td width=\"69\">.sxd<\/td>\n<td width=\"69\">.sxg<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.sxi<\/td>\n<td width=\"69\">.sxm<\/td>\n<td width=\"69\">.sxw<\/td>\n<td width=\"69\">.tar<\/td>\n<td width=\"69\">.tax<\/td>\n<td width=\"69\">.tbb<\/td>\n<td width=\"69\">.tbk<\/td>\n<td width=\"69\">.tbn<\/td>\n<td width=\"69\">.tex<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.tga<\/td>\n<td width=\"69\">.tgz<\/td>\n<td width=\"69\">.thm<\/td>\n<td width=\"69\">.tif<\/td>\n<td width=\"69\">.tiff<\/td>\n<td width=\"69\">.tlg<\/td>\n<td width=\"69\">.tlx<\/td>\n<td width=\"69\">.txt<\/td>\n<td width=\"69\">.uop<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.uot<\/td>\n<td width=\"69\">.upk<\/td>\n<td width=\"69\">.usr<\/td>\n<td width=\"69\">.vb<\/td>\n<td width=\"69\">.vbox<\/td>\n<td width=\"69\">.vbs<\/td>\n<td width=\"69\">.vdi<\/td>\n<td width=\"69\">.vhd<\/td>\n<td width=\"69\">.vhdx<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.vmdk<\/td>\n<td width=\"69\">.vmsd<\/td>\n<td width=\"69\">.vmx<\/td>\n<td width=\"69\">.vmxf<\/td>\n<td width=\"69\">.vob<\/td>\n<td width=\"69\">.vpd<\/td>\n<td width=\"69\">.vsd<\/td>\n<td width=\"69\">.wab<\/td>\n<td width=\"69\">.wad<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.wallet<\/td>\n<td width=\"69\">.war<\/td>\n<td width=\"69\">.wav<\/td>\n<td width=\"69\">.wb2<\/td>\n<td width=\"69\">.wk1<\/td>\n<td width=\"69\">.wks<\/td>\n<td width=\"69\">.wma<\/td>\n<td width=\"69\">.wmf<\/td>\n<td width=\"69\">.wmv<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.wpd<\/td>\n<td width=\"69\">.wps<\/td>\n<td width=\"69\">.x11<\/td>\n<td width=\"69\">.x3f<\/td>\n<td width=\"69\">.xis<\/td>\n<td width=\"69\">.xla<\/td>\n<td width=\"69\">.xlam<\/td>\n<td width=\"69\">.xlc<\/td>\n<td width=\"69\">.xlk<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.xlm<\/td>\n<td width=\"69\">.xlr<\/td>\n<td width=\"69\">.xls<\/td>\n<td width=\"69\">.xlsb<\/td>\n<td width=\"69\">.xlsm<\/td>\n<td width=\"69\">.xlsx<\/td>\n<td width=\"69\">.xlt<\/td>\n<td width=\"69\">.xltm<\/td>\n<td width=\"69\">.xltx<\/td>\n<\/tr>\n<tr>\n<td width=\"69\">.xlw<\/td>\n<td width=\"69\">.xml<\/td>\n<td width=\"69\">.xps<\/td>\n<td width=\"69\">.xxx<\/td>\n<td width=\"69\">.ycbcra<\/td>\n<td width=\"69\">.yuv<\/td>\n<td width=\"69\">.zip<\/td>\n<td width=\"69\"><\/td>\n<td width=\"69\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>However, new to this version is a list of file name extensions exempted from encryption:<\/p>\n<ul>\n<li>.bat<\/li>\n<li>.cmd<\/li>\n<li>.com<\/li>\n<li>.cpl<\/li>\n<li>.dll<\/li>\n<li>.exe<\/li>\n<li>.hta<\/li>\n<li>.msc<\/li>\n<li>.msi<\/li>\n<li>.msp<\/li>\n<li>.pif<\/li>\n<li>.scf<\/li>\n<li>.scr<\/li>\n<li>.sys<\/li>\n<\/ul>\n<p>It adds new folders to a list that it prioritizes when searching for files to encrypt, indicating this new version is particularly going after Microsoft Office documents:<\/p>\n<ul>\n<li>bitcoin (new)<\/li>\n<li>excel<\/li>\n<li>microsoft sql server<\/li>\n<li>microsoftexcel (new)<\/li>\n<li>microsoftmicrosoft sql server<\/li>\n<li>microsoftoffice (new)<\/li>\n<li>microsoftonenote (new)<\/li>\n<li>microsoftoutlook (new)<\/li>\n<li>microsoftpowerpoint (new)<\/li>\n<li>microsoftword (new)<\/li>\n<li>office (new)<\/li>\n<li>onenote<\/li>\n<li>outlook<\/li>\n<li>powerpoint<\/li>\n<li>steam<\/li>\n<li>the bat!<\/li>\n<li>thunderbird<\/li>\n<li>word (new)<\/li>\n<\/ul>\n<p>But it adds a few more folders to its list of exemptions:<\/p>\n<ul>\n<li>$getcurrent (new)<\/li>\n<li>$recycle.bin (new)<\/li>\n<li>$windows.~bt<\/li>\n<li>$windows.~ws (new)<\/li>\n<li>boot<\/li>\n<li>documents and settingsall users<\/li>\n<li>documents and settingsdefault user<\/li>\n<li>documents and settingslocalservice<\/li>\n<li>documents and settingsnetworkservice<\/li>\n<li>intel (new)<\/li>\n<li>msocache (new)<\/li>\n<li>perflogs (new)<\/li>\n<li>program files (x86)<\/li>\n<li>program files<\/li>\n<li>programdata<\/li>\n<li>recovery (new)<\/li>\n<li>recycled (new)<\/li>\n<li>recycler (new)<\/li>\n<li>system volume information (new)<\/li>\n<li>temp (new)<\/li>\n<li>usersall users<\/li>\n<li>windows.old<\/li>\n<li>windows10upgrade (new)<\/li>\n<li>windows<\/li>\n<li>winnt (new)<\/li>\n<li>appdatalocal<\/li>\n<li>appdatalocallow<\/li>\n<li>appdataroaming (made more generic)<\/li>\n<li>local settings<\/li>\n<li>publicmusicsample music<\/li>\n<li>publicpicturessample pictures<\/li>\n<li>publicvideossample videos<\/li>\n<li>tor browser<\/li>\n<\/ul>\n<p>It drops the ransom note, which contains\u00a0instruction for decryption, as <em>_README_{RAND}_.hta<\/em>; for example, <em>_README_2Rg927_.hta.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1135\" height=\"839\" class=\"alignnone size-full wp-image-10185\" alt=\"cerber-instructions\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/12\/cerber-instructions1.png\" \/><\/p>\n<p><em>Figure 13. Ransom note<\/em><\/p>\n<p>As of this writing,\u00a0Cerber uses\u00a0two new sets of IP ranges where C&amp;C server could reside:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"312\">\n<ul>\n<li>17.1.32.0\/27 (new)<\/li>\n<li>78.15.15.0\/27 (new)<\/li>\n<li>194.165.16.0\/22<\/li>\n<\/ul>\n<\/td>\n<td width=\"312\">\n<ul>\n<li>37.15.20.0\/27 (new)<\/li>\n<li>77.1.12.0\/27 (new)<\/li>\n<li>91.239.24.0\/23 (new)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Indicators of compromise<\/h2>\n<p>The following files were used for this analysis:<\/p>\n<p>Malicious .zip attachment:<\/p>\n<ul>\n<li>7be5e805c5bcb57fcfc3a9ab37292603d73086c4<\/li>\n<\/ul>\n<p>Extracted document with macro code:<\/p>\n<ul>\n<li>6a9e8990add357af0621dcd04600e5fcc9ebac23<\/li>\n<\/ul>\n<p>Cerber variants downloaded by macro malware from <em>hxxps:\/\/ hl3gj7zkxjvo6cra.onion.to\/svchost.exe<\/em>:<\/p>\n<ul>\n<li>4f02e747bc68262c2cf24dffaf792d51a57b02bd<\/li>\n<li>60c4c6e3f6d196278c0fd111aec0faafb003c4a0<\/li>\n<li>99f49b70685803e019734c457b1c77e9c7de5531<\/li>\n<li>55f72229d0552daf28744c97c88585b585fa159b<\/li>\n<li>8994e43317df691ad9796c95700a827ca613bdca<\/li>\n<li>7b318f8a59dc2a6ecd261ffd9b6ab27287a811d6<\/li>\n<li>e049242200300dbce7aaf80c2235b94d0cea582a<\/li>\n<li>ab0e408c2fc40996c8b9c3ab6e3aa1f88d22b656<\/li>\n<li>9d5ae07111c8c89d4fa92160c00f669f8eb15ddd<\/li>\n<li>c46a426459c170c886e9f49b0c07cd3f1cc61ff2<\/li>\n<li>3fc3b16b915a17cb1c2c8e853c3f0a0c11c3715b<\/li>\n<li>3352c25b4dc695a344d4ca34c3efdc1e95a7b0ce<\/li>\n<li>5a7116673ab853505e2861240bf3a3d6cfccfc27<\/li>\n<li>5c09449b2413c41cf8f1ec64698d9bc4571ed744<\/li>\n<li>350ee3cee88cb1bb11cddc5c7e55eccadd3dc8fe<\/li>\n<li>67c948556bc2fabfcdc4e4dbcf2bf14cdbe73d51<\/li>\n<li>f39b72e853ed743b8a9a2946d79f4fa1c91bfd5e<\/li>\n<\/ul>\n<p>Cerber variants installed by RIG (aka Meadgive) exploit kit:<\/p>\n<ul>\n<li>9952b68f6d7965f9775946ba6d78638efa00d5e4<\/li>\n<li>75dcf470ef61b63f76865df9c1ed8edcf1c3f6d9<\/li>\n<\/ul>\n<p><em>\u00a0<\/em><\/p>\n<p><em>Rodel Finones and Francis Tan Seng<\/em><\/p>\n<p><em>MMPC<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2016\/12\/21\/no-slowdown-in-cerber-ransomware-activity-as-2016-draws-to-a-close\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As everybody else winds down for the holidays, the cybercriminals behind Cerber are busy ramping up their operations. Following our discovery of a spam campaign that takes advantage of holiday shopping, we found two new campaigns that continue distributing the latest variants of\u00a0Cerber ransomware. These campaigns are the latest in a series of persistent cybercriminal&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10760,10905,10879,10987,11033,10515,10806,11034,3765,10518,10761,10762,10865],"class_list":["post-6346","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-antimalware-research-for-it-pros-and-enthusiasts","tag-cerber","tag-donoff","tag-exploits","tag-holiday-shopping","tag-macro","tag-macro-based-malware","tag-meadgive","tag-ransomware","tag-spam","tag-windows-10","tag-windows-defender","tag-windows-defender-atp"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6346"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6346\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6346"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}