	{"id":5267,"date":"2012-07-25T21:14:12","date_gmt":"2012-07-26T04:14:12","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=5267"},"modified":"2016-02-12T10:29:30","modified_gmt":"2016-02-12T18:29:30","slug":"more-on-osxcrisis-advanced-spy-tool","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/","title":{"rendered":"More on OSX\/Crisis \u2014Advanced Spy Tool"},"content":{"rendered":"<p><strong><\/strong>Yesterday we discussed <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-apple-mac-trojan-called-osxcrisis-discovered-by-intego-virus-team\/\">new malware for OS X called OSX\/Crisis<\/a>, which is a brand new Trojan that installs a backdoor on infected machines. Here we\u2019ll discuss some new details that have been uncovered, including some files that are a possible installer for the files found yesterday.<\/p>\n<p>It appears one possible installation mechanism for the OSX\/Crisis malware has been found. It arrives as a Java applet with one of a couple possible names and relies on social engineering to get people to activate the installer. If it\u2019s run, the applet will check to see whether it\u2019s being run on Windows or OS X. If it is being run on OS X, it will continue the infection chain we detailed yesterday (basically it entails installing silently to open a backdoor that\u2019s hidden by a rootkit, then phoning home for commands) .<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/winmac\/\" rel=\"attachment wp-att-5269\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-5269\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/WinMac.png\" alt=\"\" width=\"620\" height=\"215\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/WinMac.png 620w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/WinMac-150x52.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/WinMac-300x104.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/WinMac-100x34.png 100w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/><\/a><\/p>\n<p>This Java applet technique has been a popular one for multi-platform infection, as Java will work on all common operating systems. Java has not, however, been installed by default on OS X from 10.7 on. This means it is unlikely that a Java applet is the only method of installation.<\/p>\n<p>So far these are the two different filenames we\u2019ve seen for installing OSX\/Crisis:<\/p>\n<ul>\n<li>adobe.jar<\/li>\n<li>AdobeFlashPlayer.jar<\/li>\n<\/ul>\n<p>These filenames definitely seem to be pointing towards a focus on gaining the user\u2019s trust. Below is an image of the alert the user sees when the Java Applet runs, requesting user permission to install:<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/untrust\/\" rel=\"attachment wp-att-5270\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-5270\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/Untrust.png\" alt=\"\" width=\"620\" height=\"232\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/Untrust.png 620w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/Untrust-150x56.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/Untrust-300x112.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/Untrust-100x37.png 100w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/><\/a><\/p>\n<p>Once the backdoor is installed, it patches several applications to spy on an infected user\u2019s activities when they use those programs:<\/p>\n<ul>\n<li>Adium<\/li>\n<li>Skype<\/li>\n<li>Microsoft Messenger<\/li>\n<li>Firefox<\/li>\n<\/ul>\n<p>It also patches the Activity Monitor to hide itself from the user, so that they will be less likely to try to remove the malware.<\/p>\n<p>This malware allows the person operating it to do some rather impressive functions:<\/p>\n<ul>\n<li>Spying on Skype audio traffic and recording all conversations and phone calls<\/li>\n<li>Spying on Safari or Firefox browsers to record URLs and screenshots<\/li>\n<li>Recording IM messages in both MS Messenger and Adium<\/li>\n<li>Sending file contents to the control server<\/li>\n<\/ul>\n<p>Upon further inspection of this threat, it appears there may be another strange detail about this malware that is worth noting: There are sections of code that point to this being part of a <a href=\"http:\/\/www.smh.com.au\/business\/world-business\/the-one-ring-to-rule-them-all-20111121-1nqx1.html\">commercial malware package<\/a> that is sold mostly in the US and Europe.<\/p>\n<p>The company that created the malware package is called Remote Control System DaVinci, which is apparently a play on the owner\u2019s name and possibly a reference to the movie <a href=\"http:\/\/en.wikipedia.org\/wiki\/Hackers_%28film%29\">Hackers<\/a>. They gear their product towards government surveillance, though they have also apparently sold it to several banks and at least one other commercial company. Due to the cost (\u20ac200,000), this product is unlikely to be used by your average script kiddy in his parents\u2019 basement.<\/p>\n<p>From a technical perspective, this is a very advanced and fully functional threat. Due to the apparent cost of this malware package, it\u2019s unlikely that this will be more than a targeted attack. But if you are the intended target, it\u2019s very important that you have good security measures. Most vendors now have protection for the known components, but it\u2019s unlikely that this is the last version of this malware (or its installation packages) that we will see.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yesterday we discussed new malware for OS X called OSX\/Crisis, which is a brand new Trojan that installs a backdoor on infected machines. Here we\u2019ll discuss some new details that have been uncovered, including some files that are a possible installer for the files found yesterday.<\/p>\n","protected":false},"author":6,"featured_media":8763,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[86,703,2761],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Yesterday we discussed new malware for OS X called OSX\/Crisis, which is a brand new Trojan that installs a backdoor on infected machines. Here we\u2019ll discuss some new details that have been uncovered, including some files that are a possible installer for the files found yesterday.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"More on OSX\/Crisis \u2014Advanced Spy Tool - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Yesterday we discussed new malware for OS X called OSX\/Crisis, which is a brand new Trojan that installs a backdoor on infected machines. Here we\u2019ll discuss some new details that have been uncovered, including some files that are a possible installer for the files found yesterday.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-07-26T04:14:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:29:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Malware Alert from Intego\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/\",\"name\":\"More on OSX\/Crisis \\u2014Advanced Spy Tool - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#primaryimage\"},\"datePublished\":\"2012-07-26T04:14:12+00:00\",\"dateModified\":\"2016-02-12T18:29:30+00:00\",\"description\":\"Yesterday we discussed new malware for OS X called OSX\/Crisis, which is a brand new Trojan that installs a backdoor on infected machines. Here we\\u2019ll discuss some new details that have been uncovered, including some files that are a possible installer for the files found yesterday.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"More on OSX\/Crisis \\u2014Advanced Spy Tool\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"More on OSX\/Crisis \\u2014Advanced Spy Tool\",\"datePublished\":\"2012-07-26T04:14:12+00:00\",\"dateModified\":\"2016-02-12T18:29:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#webpage\"},\"wordCount\":561,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"keywords\":[\"Malware\",\"OSX\/Crisis\",\"Spy Tool\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Yesterday we discussed new malware for OS X called OSX\/Crisis, which is a brand new Trojan that installs a backdoor on infected machines. Here we\u2019ll discuss some new details that have been uncovered, including some files that are a possible installer for the files found yesterday.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/","og_locale":"en_US","og_type":"article","og_title":"More on OSX\/Crisis \u2014Advanced Spy Tool - The Mac Security Blog","og_description":"Yesterday we discussed new malware for OS X called OSX\/Crisis, which is a brand new Trojan that installs a backdoor on infected machines. Here we\u2019ll discuss some new details that have been uncovered, including some files that are a possible installer for the files found yesterday.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-07-26T04:14:12+00:00","article_modified_time":"2016-02-12T18:29:30+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","width":"400","height":"260","caption":"Malware Alert from Intego"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/","name":"More on OSX\/Crisis \u2014Advanced Spy Tool - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#primaryimage"},"datePublished":"2012-07-26T04:14:12+00:00","dateModified":"2016-02-12T18:29:30+00:00","description":"Yesterday we discussed new malware for OS X called OSX\/Crisis, which is a brand new Trojan that installs a backdoor on infected machines. Here we\u2019ll discuss some new details that have been uncovered, including some files that are a possible installer for the files found yesterday.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"More on OSX\/Crisis \u2014Advanced Spy Tool"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"More on OSX\/Crisis \u2014Advanced Spy Tool","datePublished":"2012-07-26T04:14:12+00:00","dateModified":"2016-02-12T18:29:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#webpage"},"wordCount":561,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","keywords":["Malware","OSX\/Crisis","Spy Tool"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/more-on-osxcrisis-advanced-spy-tool\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1mX","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5267"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=5267"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5267\/revisions"}],"predecessor-version":[{"id":5275,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5267\/revisions\/5275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8763"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=5267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=5267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=5267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}