{"id":13956,"date":"2019-08-27T17:12:12","date_gmt":"2019-08-27T13:12:12","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/email-account-stealing\/13956\/"},"modified":"2019-11-15T15:22:00","modified_gmt":"2019-11-15T11:22:00","slug":"email-account-stealing","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/email-account-stealing\/13956\/","title":{"rendered":"How phishers steal e-mail accounts"},"content":{"rendered":"<p>Good old e-mail isn\u2019t the sexiest offering in the digital world, but amid a whole bunch of newer apps and services \u2014 the instant messengers, the social networks \u2014 it\u2019s standing its ground as an essential tool for modern-day life. Most of us still have to use e-mail, at the very least to be able to register new accounts for all those services, apps, and social networks out there.<\/p>\n<p>That need is exactly why e-mail logins are a coveted prize for attackers. In this post we\u2019ll explain how some crooks use phishing to get hold of them.<\/p>\n<h2>Phishing letters\u00a0\u2014 the most common e-mail hacking tactics<\/h2>\n<p>The vast majority of scam letters made to steal e-mail login names and passwords look like messages originating from the services we use for e-mail. When targeting home users, phishers mimic popular webmail services. And when attempting to hack corporate accounts, they pretend to be your work e-mail service\u00a0\u2014 in this case the sender is simply the mail server.<\/p>\n<p>Popular mail services are imitated much more often. Scammers try to make such letters as convincing as possible. The deception toolkit is the standard one: a sender\u2019s address that looks much like the real one, logos, headers and footers, links to official resources, a plausible layout, etc.<\/p>\n<div id=\"attachment_28128\" style=\"width: 677px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171243\/email-account-stealing-scr-1-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28128\" class=\"size-full wp-image-13959\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171243\/email-account-stealing-scr-1-EN.png\" alt=\"Example of a phishing letter warning of impending account deletion\" width=\"667\" height=\"838\"><\/a><p id=\"caption-attachment-28128\" class=\"wp-caption-text\">Phishing letter frightening user with account deletion<\/p><\/div>\n<p>As for the corporate accounts, scammers often send phishing letters disguised as messages from corporate server or public e-mail services to shared addresses (including those used by administrators), but sometimes such letters reach the mailboxes of individual employees whose addresses have somehow ended up in spam databases.<\/p>\n<p>Companies that want to be taken seriously, large ones in particular, maintain e-mail servers of their own. The logins and passwords for such accounts are also appealing to attackers. Their messages are often betrayed by less-than-perfect appearance\u00a0\u2014 sender addresses from free webmail services, spelling errors, etc.\u00a0\u2014 but even such letters may be taken by inexperienced employees for the real thing.<\/p>\n<div id=\"attachment_28129\" style=\"width: 1249px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171305\/email-account-stealing-scr-2-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28129\" class=\"size-full wp-image-13961\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171305\/email-account-stealing-scr-2-EN.png\" alt=\"Example of a phishing letter warning of exceeded storage quota\" width=\"1239\" height=\"741\"><\/a><p id=\"caption-attachment-28129\" class=\"wp-caption-text\">In this letter an exceeded quota alert is imitated by phishers<\/p><\/div>\n<p>In case of targeted attacks on a specific organization, the scammers usually collect as much information about it as they can in advance to make their letters as convincing as possible. For a touch of credibility and uniqueness, they may build the victims\u2019 e-mail addresses into phishing hyperlinks, so that when the fake page is visited the address is already there, and only the mailbox password remains to be entered.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n<h3>Phishing letter variants<\/h3>\n<h4>Simple text with request for information<\/h4>\n<p>Scammers simply contact users on behalf of mail services on various pretexts and request users send them e-mail addresses, passwords and other information. Users are usually urged to reply to an e-mail address that is different from that of the sender.<\/p>\n<p>This phishing letter type was popular enough until scammers mastered more effective personal information theft methods.<\/p>\n<div id=\"attachment_28130\" style=\"width: 1560px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171322\/email-account-stealing-scr-3-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28130\" class=\"size-full wp-image-13963\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171322\/email-account-stealing-scr-3-EN.png\" alt=\"Example of a phishing letter with a request for the user's account password\" width=\"1550\" height=\"459\"><\/a><p id=\"caption-attachment-28130\" class=\"wp-caption-text\">Phishing letter with a text request for account information, including password. Never send anything in response to such requests<\/p><\/div>\n<h4>Letter with a link to a phishing website<\/h4>\n<p>Phishing messages with links are currently the most common type. Scammers may use infinite numbers of pregenerated links, shuffle them from letter to letter in the same mail blast, create phishing pages that appear very much like legitimate ones, and automate collection and processing of stolen data.<\/p>\n<p>But those links clearly betray a scam, leading to domains totally unrelated to the purported organizations, or using misspelled domain names styled to look like the legitimate ones. That\u2019s why intruders try to conceal the addresses their links lead to. They do so by using clickable, hyperlinked text or images. Such text links may include phrases like \u201cUpdate your mailbox.\u201d In other cases, the text part of the link will feature the real mail service address, while the actual link will direct user to a phishing website. Many users won\u2019t see the difference unless they check the links before clicking.<\/p>\n<div id=\"attachment_28131\" style=\"width: 824px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171356\/email-account-stealing-scr-4-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28131\" class=\"size-full wp-image-13965\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171356\/email-account-stealing-scr-4-EN.png\" alt=\"Example of a phishing letter with a phishing link\" width=\"814\" height=\"628\"><\/a><p id=\"caption-attachment-28131\" class=\"wp-caption-text\">Most phishing letters contain links to phishing pages\u00a0\u2014 avoid using those links<\/p><\/div>\n<h4>Phishing attachments<\/h4>\n<p>Phishing letters may also contain attachments\u00a0\u2014 typically HTML, PDF, or DOC files.<\/p>\n<p>Attachments in DOC and PDF formats often contain both the body of the phishing message and the scam link. Attackers opt for this tactic when looking to make the actual text of the letter itself as short and as much like legitimate correspondence as possible to bypass spam filters.<\/p>\n<div id=\"attachment_28132\" style=\"width: 1576px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171418\/email-account-stealing-scr-5-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28132\" class=\"size-full wp-image-13967\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171418\/email-account-stealing-scr-5-EN.png\" alt=\"Example of a phishing letter with a PDF attachment\" width=\"1566\" height=\"544\"><\/a><p id=\"caption-attachment-28132\" class=\"wp-caption-text\">Some phishing letters come with PDF or DOC attachments with links to phishing sites inside the attached file<\/p><\/div>\n<p>HTML files are used <em>instead of<\/em> links\u00a0\u2014 the HTML attachment is in fact a ready-made phishing page. From the scammers\u2019 point of view, the advantage is that the attached HTML file is fully functional\u00a0\u2014 no need to post it to the Internet\u00a0\u2014 and has all the elements they need for the scam.<\/p>\n<div id=\"attachment_28133\" style=\"width: 1545px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171447\/email-account-stealing-scr-6-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28133\" class=\"size-full wp-image-13969\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171447\/email-account-stealing-scr-6-EN.png\" alt=\"Example of a phishing letter with an HTML attachment\" width=\"1535\" height=\"710\"><\/a><p id=\"caption-attachment-28133\" class=\"wp-caption-text\">The login\/password entry form is contained in the phishing letter itself. Never enter anything into something like this<\/p><\/div>\n<h3>Topics of phishing letters<\/h3>\n<h4>Account problems<\/h4>\n<p>As regards the text of the letters, most of them begin by suggesting there is a problem with the victim\u2019s e-mail account: storage limit reached, letter delivery problem, unauthorized login, spamming accusations, alerts of other violations, and so forth.<\/p>\n<p>The letter normally tells the user how to deal with the problem\u00a0\u2014 mostly by confirming or updating account data by following a link or opening an attachment. To frighten the recipient, it says if they don\u2019t follow the instructions, the account will be blocked or deleted.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n<p>In almost every case, the letter sets a time frame for response, somewhere from several hours to several weeks. Usually, it\u2019s 24\u00a0hours\u00a0\u2014 both credible and not long enough to let the victim relax and forget about the letter.<\/p>\n<div id=\"attachment_28134\" style=\"width: 1569px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171511\/email-account-stealing-scr-7-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28134\" class=\"size-full wp-image-13971\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171511\/email-account-stealing-scr-7-EN.png\" alt=\"Example of a phishing letter with limited time for response\" width=\"1559\" height=\"418\"><\/a><p id=\"caption-attachment-28134\" class=\"wp-caption-text\">\u201cYour account will be deleted within 24 hours due to spamming.\u201d Threats and time limits are typical phishing tricks<\/p><\/div>\n<h4>Imitation of business correspondence<\/h4>\n<p>Sometimes, atypical phishing letters target e-mail accounts. The text of such messages may make no reference at all to e-mail or account data. The letter may look quite like real business correspondence.<\/p>\n<p>We should mention that the volume of fake business letters used for phishing has grown in the past few years. Messages of this type are usually used to deliver harmful attachments, but some of them also phish for personal data. A regular user may have a hard time detecting a phishing letter\u00a0\u2014 cybercrime counts on that.<\/p>\n<div id=\"attachment_28135\" style=\"width: 625px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171525\/email-account-stealing-scr-9-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28135\" class=\"size-full wp-image-13973\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171525\/email-account-stealing-scr-9-EN.png\" alt=\"Example of a phishing letter that looks like business correspondence\" width=\"615\" height=\"571\"><\/a><p id=\"caption-attachment-28135\" class=\"wp-caption-text\">When hunting for corporate accounts, using fake business correspondence is a common tactic<\/p><\/div>\n<p>Some users will never suspect the fraud and will follow the link to log in and view a nonexistent document.<\/p>\n<div id=\"attachment_28136\" style=\"width: 1280px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171546\/email-account-stealing-scr-10-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28136\" class=\"size-full wp-image-13975\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171546\/email-account-stealing-scr-10-EN.png\" alt=\"Example of a phishing website prompting the visitor to sign in to view a document\" width=\"1270\" height=\"647\"><\/a><p id=\"caption-attachment-28136\" class=\"wp-caption-text\">Phishing website prompts user to sign in to view a document referenced in the phishing letter<\/p><\/div>\n<h3>Phishing page variants<\/h3>\n<p>Now that we are done with the format and content of letters, let us see what phishing webpages may look like and speak about the elements to pay attention to so you can detect fraud.<\/p>\n<p>The first thing deserving close attention is the link address. The address can betray a scam right away. Typical signs of fraud include:<\/p>\n<ul>\n<li>domains unrelated to the sending organizations,<\/li>\n<li>organization or Web service names in the address path instead of in the domain, for example, <a href=\"http:\/\/www.example.com\/outlook\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">www.example.com\/outlook\/<\/a>,<\/li>\n<li>spelling errors,<\/li>\n<li>strings of random symbols in the link address,<\/li>\n<li>symbols from other languages that look similar to the basic Latin alphabet \u2014 \u00e7 instead of c, \u00e1 instead of a and so forth.<\/li>\n<\/ul>\n<p>Just as with letters, phishers try to make fake webpages as much like the real ones as they can. But details always get left out\u00a0\u2014 although unfortunately, not all users are able to see them.<\/p>\n<p>That part is easy to understand; few people recall the <em>exact<\/em> appearance of the official homepage of their online services. So, to create a convincing phishing page it is often enough to use key characteristic elements: color scheme, logo, etc.<\/p>\n<div id=\"attachment_28137\" style=\"width: 894px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171600\/email-account-stealing-scr-11-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28137\" class=\"size-full wp-image-13977\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171600\/email-account-stealing-scr-11-EN.png\" alt=\"Example of a webmail sign-in page on a phishing website\" width=\"884\" height=\"486\"><\/a><p id=\"caption-attachment-28137\" class=\"wp-caption-text\">Fake webmail sign-in page<\/p><\/div>\n<p>For phishing pages designed to steal free webmail logins and passwords it is typical to feature links to several webmail services on the same page.<\/p>\n<p>As soon as any of them is clicked, a window pops up that looks like sign-in page for the relevant service. In this way, scammers can collect data for several kinds of account using just one page, rather than creating separate pages for each.<\/p>\n<div id=\"attachment_28138\" style=\"width: 1547px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171624\/email-account-stealing-scr-12-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28138\" class=\"size-full wp-image-13979\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171624\/email-account-stealing-scr-12-EN.png\" alt=\"Example of a universal phishing website with a choice of accounts to sign in to\" width=\"1537\" height=\"673\"><\/a><p id=\"caption-attachment-28138\" class=\"wp-caption-text\">This phishing website fakes logging in using different webmail accounts<\/p><\/div>\n<p>Phishers can reach even more potential victims by, instead of pretending to represent a specific mail service, using letters (on any general subject, for example, the aforementioned business correspondence option) that link to a phishing page with a choice of the most popular webmail services for users to pick the ones they need.<\/p>\n<div id=\"attachment_28139\" style=\"width: 320px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171635\/email-account-stealing-scr-13-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28139\" class=\"size-full wp-image-13981\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171635\/email-account-stealing-scr-13-EN.png\" alt=\"Example of a webmail sign-in page on a phishing website\" width=\"310\" height=\"507\"><\/a><p id=\"caption-attachment-28139\" class=\"wp-caption-text\">Another example of a fake webmail sign-in page<\/p><\/div>\n<p>The time-limit trick we mentioned when discussing phishing letters is sometimes used on phishing pages, too. As soon as a user opens the scam page, it begins a visible countdown of the time remaining for the credulous user to enter their data.<\/p>\n<div id=\"attachment_28140\" style=\"width: 845px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171654\/email-account-stealing-scr-14-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-28140\" class=\"size-full wp-image-13983\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2019\/08\/27171654\/email-account-stealing-scr-14-EN.png\" alt=\"Example of a phishing page featuring a time limit\" width=\"835\" height=\"629\"><\/a><p id=\"caption-attachment-28140\" class=\"wp-caption-text\">Some phishing pages, too, urge the user to make haste<\/p><\/div>\n<p>When a victim submits data through a phishing page, the results vary. Some websites turn inaccessible or return error messages. Others say the user entered incorrect data and ask them to try again.<\/p>\n<p>Probably the most dangerous scenario of all is gaining momentum of late. As soon as the data is submitted, the phishing page redirects the user to the real sign-in page of the webmail service in question. The user figures there was a glitch, enters the login\/password pair again, successfully this time, and forgets anything weird ever happened.<\/p>\n<h3>Detecting phishing letters<\/h3>\n<ul>\n<li>If the sender\u2019s address domain does not belong to the alleged sender\u2019s organization \u2014 and particularly if the mailbox is registered with one of the free webmail services\u00a0\u2014 the letter is a scam. Official mail always comes from official addresses.<\/li>\n<li>If the letter features links to click, unrelated domains, spelling errors, special symbols, and so forth, you are looking at a fraud.<\/li>\n<li>If the letter says there are unexpected problems with your account and demands you follow a link and log in before time runs out,\u00a0that letter comes from scammers.<\/li>\n<\/ul>\n<p>It is useful but not strictly necessary to remember all these things and pore over every letter you receive. Instead, use a <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">robust antivirus product<\/a> to help manage phishing and other online threats for you.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n","protected":false},"excerpt":{"rendered":"<p>To this day, e-mail is one of the most important Internet services, which makes it a highly attractive target for theft.<\/p>\n","protected":false},"author":2481,"featured_media":13957,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[1474,1815,187,76,240,2162],"class_list":{"0":"post-13956","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-accounts","10":"tag-e-mail","11":"tag-passwords","12":"tag-phishing","13":"tag-spam","14":"tag-stealing"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/email-account-stealing\/13956\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/email-account-stealing\/16564\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/email-account-stealing\/6475\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/email-account-stealing\/18503\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/email-account-stealing\/16601\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/email-account-stealing\/15247\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/email-account-stealing\/19155\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/email-account-stealing\/17885\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/email-account-stealing\/23433\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/email-account-stealing\/6378\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/email-account-stealing\/28029\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/email-account-stealing\/12185\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/email-account-stealing\/12329\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/email-account-stealing\/11140\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/email-account-stealing\/20102\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/email-account-stealing\/23995\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/email-account-stealing\/24191\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/email-account-stealing\/18930\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/email-account-stealing\/23290\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/email-account-stealing\/23201\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13956","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2481"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13956"}],"version-history":[{"count":15,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13956\/revisions"}],"predecessor-version":[{"id":14365,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13956\/revisions\/14365"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13957"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13956"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13956"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}