{"id":24898,"date":"2025-11-13T12:53:04","date_gmt":"2025-11-13T17:53:04","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=24898"},"modified":"2025-11-13T21:56:35","modified_gmt":"2025-11-13T17:56:35","slug":"ai-sidebar-spoofing-atlas-comet","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ai-sidebar-spoofing-atlas-comet\/24898\/","title":{"rendered":"AI sidebar spoofing: a new attack on AI browsers"},"content":{"rendered":"<p>Cybersecurity researchers have revealed a new attack method targeting AI browsers, which they refer to as <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/spoofed-ai-sidebars-can-trick-atlas-comet-users-into-dangerous-actions\/\" target=\"_blank\" rel=\"noopener nofollow\">AI sidebar spoofing<\/a>. This attack exploits users\u2019 growing habit of blindly trusting instructions they get from artificial intelligence. The researchers successfully implemented AI sidebar spoofing against two popular AI browsers: Comet by Perplexity and Atlas by OpenAI.<\/p>\n<p>Initially, the researchers used Comet for their experiments, but later confirmed that the attack was viable in the Atlas browser as well. This post uses Comet as an example when explaining the mechanics of AI sidebar spoofing, but we urge the reader to remember that everything stated below also applies to Atlas.\n<\/p>\n<h2>How do AI browsers work?<\/h2>\n<p>\nTo begin, let\u2019s wrap our heads around AI browsers. The idea of artificial intelligence replacing, or at least <a href=\"https:\/\/www.kaspersky.com\/blog\/ai-browser-security-privacy-risks\/54303\/\" target=\"_blank\" rel=\"noopener nofollow\">transforming<\/a> the familiar process of searching the internet began to generate buzz between 2023 and 2024. The same period saw the first-ever attempts to integrate AI into online searches.<\/p>\n<p>Initially, these were supplementary features within conventional browsers \u2014 such as <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/getting-started-with-copilot-in-microsoft-edge-ab0153dc-ad31-4de6-899a-802223821a9d\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft Edge Copilot<\/a> and <a href=\"https:\/\/brave.com\/leo\/\" target=\"_blank\" rel=\"noopener nofollow\">Brave Leo<\/a> \u2014 implemented as AI sidebars. They added built-in assistants to the browser interface for summarizing pages, answering questions, and navigating sites. By 2025, the evolution of this concept ushered in <a href=\"https:\/\/www.perplexity.ai\/hub\/blog\/introducing-comet\" target=\"_blank\" rel=\"noopener nofollow\">Comet<\/a> from Perplexity AI \u2014 the first browser designed for user-AI interaction from the ground up.<\/p>\n<p>This made artificial intelligence the centerpiece of Comet\u2019s user interface, rather than just an add-on. It unified search, analysis, and work automation into a seamless experience. Shortly thereafter, in October 2025, OpenAI introduced its own AI browser, <a href=\"https:\/\/openai.com\/index\/introducing-chatgpt-atlas\/\" target=\"_blank\" rel=\"noopener nofollow\">Atlas<\/a>, which was built around the same concept.<\/p>\n<p>Comet\u2019s primary interface element is the input bar in the center of the screen, through which the user interacts with the AI. It\u2019s the same with Atlas.<\/p>\n<div id=\"attachment_54779\" style=\"width: 2061px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192905\/ai-sidebar-spoofing-atlas-comet-1-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54779\" class=\"size-full wp-image-54779\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192905\/ai-sidebar-spoofing-atlas-comet-1-EN.png\" alt=\"The next-generation AI browsers: Comet and Atlas\" width=\"2051\" height=\"2136\"><\/a><p id=\"caption-attachment-54779\" class=\"wp-caption-text\">The home screens of Comet and Atlas demonstrate a similar concept: a minimalist interface with a central input bar and built-in AI that becomes the primary method of interacting with the web<\/p><\/div>\n<p>Besides, AI browsers allow users to engage with the artificial intelligence right on the web page. They do this through a built-in sidebar that analyzes content and handles queries \u2014 all without having the user leave the page. The user can ask the AI to summarize an article, explain a term, compare data, or generate a command while remaining on the current page.<\/p>\n<div id=\"attachment_54778\" style=\"width: 2537px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192918\/ai-sidebar-spoofing-atlas-comet-2-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54778\" class=\"size-full wp-image-54778\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192918\/ai-sidebar-spoofing-atlas-comet-2-EN.png\" alt=\"Interacting with AI directly on web pages\" width=\"2527\" height=\"2792\"><\/a><p id=\"caption-attachment-54778\" class=\"wp-caption-text\">The sidebars in both Comet and Atlas allow users to query the AI without navigating to separate tabs \u2014 you can analyze the current site, and ask questions and receive answers within the context of the page you\u2019re on<\/p><\/div>\n<p>This level of integration conditions users to take the answers and instructions provided by the built-in AI for granted. When an assistant is seamlessly built into the user interface and feels like a natural part of the system, most people rarely stop to double-check the actions it suggests.<\/p>\n<p>This trust is precisely what the attack demonstrated by the researchers exploits. A fake AI sidebar can issue false instructions \u2014 directing the user to execute malicious commands or visit phishing websites.\n<\/p>\n<h2>How did the researchers manage to execute the AI sidebar spoofing attack?<\/h2>\n<p>\nThe attack starts with the user installing a malicious extension. To do its evil deeds, it needs permissions to view and modify data on all visited sites, as well as access to the client-side data storage API.<\/p>\n<p>All of these are quite standard permissions; without the first one \u2014 no browser extension will work at all. Therefore, the chances that the user will get suspicious when a new extension requests these permissions are almost zero. You can read more about browser extensions and the permissions they request in our post <a href=\"https:\/\/www.kaspersky.com\/blog\/dangers-of-browser-extensions\/45448\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Browser extensions: more dangerous than you think<\/strong><\/a>.<\/p>\n<div id=\"attachment_54777\" style=\"width: 1410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192923\/ai-sidebar-spoofing-atlas-comet-3.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54777\" class=\"size-full wp-image-54777\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192923\/ai-sidebar-spoofing-atlas-comet-3.jpg\" alt=\"Comet's extension management page\" width=\"1400\" height=\"887\"><\/a><p id=\"caption-attachment-54777\" class=\"wp-caption-text\">A list of installed extensions in the Comet user interface. The disguised malicious extension, AI Marketing Tool, is visible among them. <a href=\"https:\/\/labs.sqrx.com\/ai-sidebar-spoofing-720e0c91d290\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Once installed, the extension injects JavaScript into the web page and creates a counterfeit sidebar that looks strikingly similar to the real thing. This shouldn\u2019t raise any red flags with the user: when the extension receives a query, it talks to the legitimate LLM and faithfully displays its response. The researchers used Google Gemini in their experiments, though OpenAI\u2019s ChatGPT likely would have worked just as well.<\/p>\n<div id=\"attachment_54776\" style=\"width: 1410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192927\/ai-sidebar-spoofing-atlas-comet-4.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54776\" class=\"size-full wp-image-54776\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192927\/ai-sidebar-spoofing-atlas-comet-4.jpg\" alt=\"AI sidebar UI spoofing\" width=\"1400\" height=\"793\"><\/a><p id=\"caption-attachment-54776\" class=\"wp-caption-text\">The screenshot shows an example of a fake sidebar that\u2019s visually very similar to the original Comet Assistant. <a href=\"https:\/\/labs.sqrx.com\/ai-sidebar-spoofing-720e0c91d290\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The fake sidebar can selectively manipulate responses to specific topics or key queries set in advance by the potential attacker. This means that in most cases, the extension will simply display legitimate AI responses, but in <em>certain situations<\/em> it will display malicious instructions, links, or commands instead.<\/p>\n<p>How realistic is the scenario where an unsuspecting user installs a malicious extension capable of the actions described above? Experience shows it is highly probable. On our blog, we\u2019ve repeatedly reported on dozens of malicious and suspicious extensions that successfully make it into the official Chrome Web Store. This continues to occur despite all the security checks conducted by the store and the vast resources at Google\u2019s disposal. Read more about how malicious extensions end up in official stores in our post <a href=\"https:\/\/www.kaspersky.com\/blog\/suspicious-chrome-extensions-with-6-million-installs\/53529\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>57 shady Chrome extensions clock up six million installs<\/strong><\/a>.\n<\/p>\n<h2>Consequences of AI sidebar spoofing<\/h2>\n<p>\nNow let\u2019s discuss what attackers can use a fake sidebar for. As noted by the researchers, the AI sidebar spoofing attack offers potential malicious actors ample opportunities to cause harm. To demonstrate this, the researchers described three possible attack scenarios and their consequences: crypto-wallet phishing, Google account theft, and device takeover. Let\u2019s examine each of them in detail.\n<\/p>\n<h3>Using a fake AI sidebar to steal Binance credentials<\/h3>\n<p>\nIn the first scenario, the user asks the AI in the sidebar how to sell their cryptocurrency on the Binance crypto exchange. The AI assistant provides a detailed answer that includes a link to the crypto exchange. But this link doesn\u2019t lead to the real Binance site \u2014 it takes you to a remarkably convincing fake. The link points to the attacker\u2019s phishing site, which uses the fake domain name <strong>binacee<\/strong>.<\/p>\n<div id=\"attachment_54775\" style=\"width: 1410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192931\/ai-sidebar-spoofing-atlas-comet-5.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54775\" class=\"size-full wp-image-54775\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192931\/ai-sidebar-spoofing-atlas-comet-5.jpg\" alt=\"Phishing page masquerading as Binance\" width=\"1400\" height=\"789\"><\/a><p id=\"caption-attachment-54775\" class=\"wp-caption-text\">The fake login form on the domain login{.}binacee{.}com is nearly indistinguishable from the original, and is designed to steal user credentials. <a href=\"https:\/\/labs.sqrx.com\/ai-sidebar-spoofing-720e0c91d290\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Next, the unsuspecting user enters their Binance credentials and the code for two-factor authentication, if needed. After this, the attackers gain full access to the victim\u2019s account and can siphon off all funds from their crypto wallets.\n<\/p>\n<h3>Using a fake AI sidebar to take over a Google account<\/h3>\n<p>\nThe next attack variation also begins with a phishing link \u2014 in this case, to a fake file-sharing service. If the user clicks the link, they\u2019re taken to a website where the landing page prompts them to sign in with their Google account right away.<\/p>\n<p>After the user clicks this option, they\u2019re redirected to the <em>legitimate<\/em> Google login page to enter their credentials there, but then the fake platform requests full access to the user\u2019s Google Drive and Gmail.<\/p>\n<div id=\"attachment_54774\" style=\"width: 1410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192936\/ai-sidebar-spoofing-atlas-comet-6.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54774\" class=\"size-full wp-image-54774\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192936\/ai-sidebar-spoofing-atlas-comet-6.jpg\" alt=\"Google account access request\" width=\"1400\" height=\"749\"><\/a><p id=\"caption-attachment-54774\" class=\"wp-caption-text\">The fake application share-sync-pro{.}vercel{.}app requests full access to the user\u2019s Gmail and Google Drive. This gives the attackers control over the account. <a href=\"https:\/\/labs.sqrx.com\/ai-sidebar-spoofing-720e0c91d290\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>If the user fails to scrutinize the page, and automatically clicks Allow, they grant attackers permissions for highly dangerous actions:\n<\/p>\n<ul>\n<li>Viewing their emails and settings.<\/li>\n<li>Reading, creating, and sending emails from their Gmail account.<\/li>\n<li>Viewing and downloading all the files they store in Google Drive.<\/li>\n<\/ul>\n<p>\nThis <a href=\"https:\/\/developers.google.com\/identity\/protocols\/oauth2\/\" target=\"_blank\" rel=\"noopener nofollow\">level of access<\/a> gives the cybercriminals the ability to steal the victim\u2019s files, use services and accounts linked to that email address, and impersonate the account owner to disseminate phishing messages.\n<\/p>\n<h3>Reverse shell initiated through a fake AI-generated utility installation guide<\/h3>\n<p>\nFinally, in the last scenario, the user asks the AI how to install a certain application; the Homebrew utility was used in the example, but it could be anything. The sidebar shows the user a perfectly reasonable, AI-generated guide. All steps in it look plausible and correct up until the final stage, where the utility installation command is replaced with a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/remote-shell\/\" target=\"_blank\" rel=\"noopener\">reverse shell<\/a>.<\/p>\n<div id=\"attachment_54773\" style=\"width: 1410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192939\/ai-sidebar-spoofing-atlas-comet-7.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-54773\" class=\"size-full wp-image-54773\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/11\/13192939\/ai-sidebar-spoofing-atlas-comet-7.jpg\" alt=\"The fake guide contains a reverse shell instead of an installation command\" width=\"1400\" height=\"866\"><\/a><p id=\"caption-attachment-54773\" class=\"wp-caption-text\">The guide for installing the utility as shown in the sidebar is almost entirely correct, but the last step contains a reverse shell command. <a href=\"https:\/\/labs.sqrx.com\/ai-sidebar-spoofing-720e0c91d290\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>If the user follows the AI\u2019s instructions by copying and pasting the malicious code into the terminal and then running it, their system will be compromised. The attackers will be able to download data from the device, monitor activity, or install malware and continue the attack. This scenario clearly demonstrates that a single replaced line of code in a trusted AI interface is capable of fully compromising a device.\n<\/p>\n<h2>How to avoid becoming a victim of fake AI-sidebars<\/h2>\n<p>\nThe AI sidebar spoofing attack scheme is currently only theoretical. However, in recent years attackers have been very quick to turn hypothetical threats into practical attacks. Thus, it\u2019s quite possible that some malware creator is already hard at work on a malicious extension using a fake AI-sidebar, or uploading one to an official extension store.<\/p>\n<p>Therefore, it\u2019s important to remember that even a familiar browser interface <a href=\"https:\/\/www.kaspersky.com\/blog\/phishing-with-progressive-web-apps\/51496\/\" target=\"_blank\" rel=\"noopener nofollow\">can be compromised<\/a>. And even if instructions look convincing and come from the in-browser AI assistant, you shouldn\u2019t blindly trust them. Here\u2019s some final tips to help you avoid falling victim to an attack involving fake AI:\n<\/p>\n<ul>\n<li>When using AI assistants, carefully check all commands and links before following the AI\u2019s recommendations.<\/li>\n<li>If the AI recommends executing any programming code, copy it and find out what it does by pasting it into a search engine in a <em>different<\/em>, non-AI browser.<\/li>\n<li>Don\u2019t install browser extensions \u2014 AI or otherwise \u2014 unless absolutely necessary. Regularly clean up and delete any extensions you no longer use.<\/li>\n<li>Before installing an extension, read the user reviews. Most malicious extensions rack up heaps of scathing reviews from duped users long before store moderators get around to removing them.<\/li>\n<li>Before entering credentials or other confidential information, always check that the website address doesn\u2019t look suspicious or contain typos. Pay attention to the top-level domain, too: it should be the official one.<\/li>\n<li>Use <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0to store passwords. If it doesn\u2019t recognize the site and doesn\u2019t automatically offer to fill in the login and password fields, this is a strong reason to ask yourself if you might be on a phishing page.<\/li>\n<li>Install a <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a> that will alert you to suspicious activity on your device and prevent you from visiting a phishing site.<\/li>\n<\/ul>\n<blockquote><p>What other threats await you in browsers \u00ad\u2014 AI-powered or regular:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ai-browser-security-privacy-risks\/54303\/\" target=\"_blank\" rel=\"noopener nofollow\">The pros and cons of AI-powered browsers<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/types-of-cookie-files-and-how-to-protect-them\/54243\/\" target=\"_blank\" rel=\"noopener nofollow\">Taking the biscuit: why hackers like cookies so much<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/visited-links-privacy-protection\/53380\/\" target=\"_blank\" rel=\"noopener nofollow\">Turning purple: how visited links threaten your privacy<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/best-private-browser-in-2025\/53200\/\" target=\"_blank\" rel=\"noopener nofollow\">Privacy under attack: nasty surprises in Chrome, Edge, and Firefox<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/dangerous-browser-extensions-2023\/50059\/\" target=\"_blank\" rel=\"noopener nofollow\">Dangerous browser extensions<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>How malicious extensions can spoof AI sidebars in the Comet and Atlas browsers, intercept user queries, and manipulate model responses.<\/p>\n","protected":false},"author":2726,"featured_media":24907,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[1481,1636,1151,2822,76,521],"class_list":{"0":"post-24898","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-ai","9":"tag-browsers","10":"tag-extensions","11":"tag-llm","12":"tag-phishing","13":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ai-sidebar-spoofing-atlas-comet\/24898\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ai-sidebar-spoofing-atlas-comet\/29827\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ai-sidebar-spoofing-atlas-comet\/13004\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ai-sidebar-spoofing-atlas-comet\/28763\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ai-sidebar-spoofing-atlas-comet\/30298\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ai-sidebar-spoofing-atlas-comet\/40876\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ai-sidebar-spoofing-atlas-comet\/14021\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ai-sidebar-spoofing-atlas-comet\/54769\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ai-sidebar-spoofing-atlas-comet\/23391\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ai-sidebar-spoofing-atlas-comet\/32918\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ai-sidebar-spoofing-atlas-comet\/29949\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ai\/","name":"AI"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24898"}],"version-history":[{"count":14,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24898\/revisions"}],"predecessor-version":[{"id":24920,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24898\/revisions\/24920"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24907"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}