{"id":4384,"date":"2014-12-11T10:01:59","date_gmt":"2014-12-11T15:01:59","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4384"},"modified":"2020-02-26T18:59:23","modified_gmt":"2020-02-26T14:59:23","slug":"security_trends_2014","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/security_trends_2014\/4384\/","title":{"rendered":"From Ransomware to Anonymous Browsing: Ten 2014 Tech Trends"},"content":{"rendered":"<p>If December means predicting the new year in the security world, then it also means recapping the year that\u2019s about to end. And that\u2019s just what Kaspersky Lab\u2019s Global Research and Analysis Team has done with this list of <a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/68052\/kaspersky-security-bulletin-2014-malware-evolution\/\" target=\"_blank\" rel=\"noopener\">2014\u2019s ten emergent trends in the Internet security industry.<\/a><\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/u4TNc2gnVmc?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<h3>A Bevy of Advanced Persistent Threats<\/h3>\n<p><a href=\"https:\/\/apt.securelist.com\/\" target=\"_blank\" rel=\"noopener\">APT groups certainly didn\u2019t slow down in 2014<\/a>. Kaspersky Lab researchers published their own research on at least six distinct attack groups. There was the Spanish language \u201c<a href=\"https:\/\/www.kaspersky.com\/blog\/the-mask-unveiling-the-worlds-most-sophisticated-apt-campaign\/\" target=\"_blank\" rel=\"noopener nofollow\">Careto<\/a>\u201d campaign back in February, which had been active for some seven years prior. Careto (AKA the Mask) relied on an easily modifiable, cross-platform malware kit designed to steal sensitive information from government agencies, embassies, energy companies, research institutions, private equity firms and activists in 31 countries around the world.<\/p>\n<p>There was also the versatile Epic Turla campaign that emerged a month or so later in March, which targeted its victims with a series of zero day exploits on Adobe Acrobat, Windows XP and Microsoft server 2003, as well as a number of watering hole attacks targeting vulnerabilities in Java, Adobe Flash and Internet Explorer.<\/p>\n<p>In June another group made off with a half million Euros in a single week after targeting the clients of a large European bank as part of a campaign dubbed \u201cLuuuk.\u201d Kaspersky Lab wasn\u2019t able to obtain any malware samples in this attack, but they believe that it stole usernames, passwords and one-time passcodes, which were used to check victim account balances and perform transactions automatically.<\/p>\n<p>Later in June, a new version of the \u201cMiniDuke\u201d campaign, called \u201cCosmicDuke,\u201d emerged, targeting governments, diplomatic agencies, energy firms, military groups and telecom operators. Oddly, the campaign also targeted criminal groups involved in trafficking illegal substances such as steroids and growth hormones.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Kaspersky?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Kaspersky<\/a> launches a project that chronicles all of the <a href=\"https:\/\/twitter.com\/hashtag\/ATPs?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#ATPs<\/a> the company has investigated <a href=\"https:\/\/t.co\/9gj6AiRVoo\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/9gj6AiRVoo<\/a> <a href=\"http:\/\/t.co\/HHbRUDVC0o\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/HHbRUDVC0o<\/a><\/p>\n<p>\u2014 Kaspersky Business (@KasperskyLabB2B) <a href=\"https:\/\/twitter.com\/KasperskyLabB2B\/status\/543017272852635649?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 11, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Kaspersky Lab reported on the Crouching Yeti attack group in late July as it sought intellectual property and other sensitive information from targets in Syria, Turkey, Saudi Arabia, Lebanon, Palestine, the United Arab Emirates, Israel, Morocco, France and the United States, from IP blocks in Syria, Russia, Lebanon, the United States and Brazil.<\/p>\n<p>Another key campaign was <a href=\"https:\/\/www.kaspersky.com\/blog\/darkhotel-apt\/\" target=\"_blank\" rel=\"noopener nofollow\">DarkHotel<\/a>, reported on in November, in which attackers infected the networks of hotels in the Asia-Pacific region in order to install malware on the machines of corporate execs as they travelled around the world.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/AGTOC7OADOY?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<h3>Big Vulnerabilities and the Internet of Things<\/h3>\n<p>Kaspersky Lab researchers saw an unsettling convergence of bugs affecting nearly everyone online and the hyper-adoption of so-called \u201cInternet of Things\u201d devices that are closer to our lives than the traditional computer. Widespread bugs like <a href=\"https:\/\/www.kaspersky.com\/blog\/heartbleed-howto\/\" target=\"_blank\" rel=\"noopener nofollow\">Heartbleed<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/what_is_the_bash_vulnerability\/\" target=\"_blank\" rel=\"noopener nofollow\">Shellshock<\/a> (AKA Bashdoor) existed in an unknown number of systems for long periods of time. Their full impact is now, and will likely remain, unknown.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#KLReport: the modern home is shockingly vulnerable to hacking<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F8B7T&amp;text=%23KLReport%3A+the+modern+home+is+shockingly+vulnerable+to+hacking\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>While adoption rates of seemingly futuristic devices, like connected home appliances and IP-enabled thermostats, are still relatively low, modern homes are certainly loaded with connected devices like Smart TVs, routers, mobile devices, traditional computers and gaming systems. These devices contain vulnerabilities just like any operating system, software or application, and these vulnerabilities, like Heartbleed and Bash, could remain on a device for years without the user even being aware. Problematically, these devices are often more difficult to update than traditional computers and software platforms. As Kaspersky\u2019s David Jacoby realized earlier this year, <a href=\"https:\/\/www.kaspersky.com\/blog\/how-i-hacked-my-home\/\" target=\"_blank\" rel=\"noopener nofollow\">the modern home is shockingly vulnerable to hacking<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A fascinating story how <a href=\"https:\/\/twitter.com\/JacobyDavid?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@JacobyDavid<\/a> hacked his smart home <a href=\"https:\/\/t.co\/ckTyeMVLUp\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/ckTyeMVLUp<\/a> <a href=\"http:\/\/t.co\/q4LiqsBnA4\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/q4LiqsBnA4<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/515189019617918976?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 25, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Mobile Malware Still on the Rise<\/h3>\n<p>From 2004 through 2013, Kaspersky Lab analyzed some 200,000 mobile malware samples. This year alone, Kaspersky Lab has analyzed 295,539 samples. Most mobile threats are designed to pilfer banking credentials and, ultimately, steal money. However, in 2014, Kaspersky researchers note that mobile ransomware and fake antivirus malware emerged as well. Furthermore, Apple\u2019s iOS mobile operating system was targeted by the <a href=\"https:\/\/www.kaspersky.com\/blog\/wirelurker-ios-osx-malware\/\" target=\"_blank\" rel=\"noopener nofollow\">WireLurker<\/a> malware, which is \u2014 by all accounts \u2014 the first piece of malware capable of targeting iOS devices that aren\u2019t jailbroken.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/12\/05102815\/Mac_malware_correct-1024x1024.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6994\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/12\/05102815\/Mac_malware_correct-1024x1024.png\" alt=\"Mac_malware_correct\" width=\"600\" height=\"600\"><\/a><\/p>\n<h3>Speaking of Ransomware\u2026<\/h3>\n<p>Whether it was blocking access to user devices or encrypting all of the files on an infected machine, ransomware had a big year. There was <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptolocker-is-bad-news\/\" target=\"_blank\" rel=\"noopener nofollow\">CryptoLocker<\/a>, <a href=\"https:\/\/threatpost.com\/coinvault-ransomwares-free-file-decrypt-a-show-of-good-faith\/109371\" target=\"_blank\" rel=\"noopener nofollow\">CoinVault<\/a>, ZeroLocker and a number of other pieces of malware that attempted to make users pay money, typically bitcoin, in order to make their computers work again. <a href=\"https:\/\/threatpost.com\/ransomware-is-the-future-of-consumer-cybercrime\/109724\" target=\"_blank\" rel=\"noopener nofollow\">Some experts believe ransomware has a bright future<\/a>, but there are certainly ways to combat it:<\/p>\n<p>\u201cRansomware operations rely on their victims paying up,\u201d the Kaspersky research team explains. \u201cDon\u2019t do it! Instead, regularly back up your data. That way, if you ever fall victim to a ransomware program (or a hardware problem that stops you from accessing your files) you will not lose any of your data.\u201d<\/p>\n<h3>ATM Skimming<\/h3>\n<p>Mechanisms and malware designed to either steal money or sensitive consumer financial information from ATMs are not new by any means, but skimmers had a big year in 2014. One particularly sophisticated example was the \u201c<a href=\"https:\/\/www.kaspersky.com\/blog\/tyupkin-atm-malware\/\" target=\"_blank\" rel=\"noopener nofollow\">Tyupkin<\/a>\u201d malware. Criminals in Asia, Europe and Latin America first gained physical access to ATMs before loading Tyupkin onto them via CD. After this, the infected machines rebooted and fell under the control of the attackers. From there, the criminals behind the scheme sent mules along to enter unique codes into the ATMs and dispense cash, but only at certain times in order to prevent the scam from being recognized as such.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Can ATMs get <a href=\"https:\/\/twitter.com\/hashtag\/malware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#malware<\/a> infection &amp; give away cash? Yes, here is a real case: <a href=\"https:\/\/t.co\/xOzKZ0h3kz\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/xOzKZ0h3kz<\/a> <a href=\"http:\/\/t.co\/4hb8NrbhYE\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/4hb8NrbhYE<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/519472733780844544?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 7, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u201cThe upswing in ATM attacks over recent years is a natural evolution from the more well-established method of using physical skimmers to capture data from cards used in ATMs that have been tampered with. Unfortunately, many ATMs run operating systems with known security weaknesses. This makes physical security even more important; we would urge all banks to review the physical security of their ATMs.\u201d<\/p>\n<h3>Every Bug a Zero Day for XP<\/h3>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/xp-eos-8apr-3\/\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft no longer provides support for Windows XP<\/a>. This means that on Microsoft\u2019s monthly patch Tuesday bulletins, where the company releases fixes for security vulnerabilities, there are no longer any fixes for Windows XP bugs. In other words, every Windows XP vulnerability from April 8, 2014 until the end of time is a zero day. This wouldn\u2019t be such a big deal, however, Windows XP still commands nearly 14 percent of the desktop operating system marketshare. Beyond the consumer, devices like ATMs, critical infrastructure systems, medical devices and even the computers at many banks and doctors\u2019 offices are still running XP and handling highly sensitive data and operations at the same time. So, while XP may have lost support in 2014, it\u2019s likely to remain a popular target moving forward.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#KLReport: every single Windows XP vulnerability from April 8, 2014 until the end of the world is a #zeroday<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F8B7T&amp;text=%23KLReport%3A+every+single+Windows+XP+vulnerability+from+April+8%2C+2014+until+the+end+of+the+world+is+a+%23zeroday\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<h3>The Tor Network<\/h3>\n<p>The anonymous browsing service Tor really hit the mainstream in 2014. Researchers here note that <a href=\"https:\/\/www.kaspersky.com\/blog\/tor-video\/\" target=\"_blank\" rel=\"noopener nofollow\">Tor usage spiked this year<\/a>, in large part due to privacy concerns in the wake NSA whistleblower, Edward Snowden\u2019s government surveillance revelations. Unfortunately, the Tor network is also a hotbed for criminal activity. Servers can operate on Tor too and are known as \u201chidden services.\u201d These hidden services offer marketplaces for all sorts of illegal goods and services. In fact, if you can dream it, you can probably buy it browsing on Tor in an underground marketplace.<\/p>\n<h3>Morally Ambiguous Software<\/h3>\n<div class=\"pullquote\">Unfortunately, software isn\u2019t neatly divided between good and bad programs. There\u2019s always the risk that software developed for legitimate purposes might be misused by cybercriminals.<\/div>\n<p>\u201cUnfortunately, software isn\u2019t neatly divided between good and bad programs,\u201d Kaspersky\u2019s researchers wrote. \u201cThere\u2019s always the risk that software developed for legitimate purposes might be misused by cybercriminals. At the Kaspersky Security Analyst Summit 2014 in February we outlined how improper implementation of anti-theft technologies, residing in the firmware of commonly used laptops and some desktop computers, could become a powerful weapon in the hands of cybercriminals.\u201d<\/p>\n<p>Indeed, I wrote about <a href=\"https:\/\/threatpost.com\/millions-of-pcs-affected-by-mysterious-computrace-backdoor-2\/107700\" target=\"_blank\" rel=\"noopener nofollow\">the mysterious Computrace backdoor<\/a> at the Black Hat security conference this year, and it serves to demonstrate an interesting phenomenon: people with ill intentions can exploit the legitimate purposes of well-meaning software.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/12\/05102815\/Mac_malware_correct-1-1024x1024.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6995\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/12\/05102815\/Mac_malware_correct-1-1024x1024.png\" alt=\"Mac_malware_correct (1)\" width=\"600\" height=\"600\"><\/a><\/p>\n<p>However, there is another side of this coin: \u201c<a href=\"https:\/\/www.kaspersky.com\/blog\/legal-malware-counteraction\/\" target=\"_blank\" rel=\"noopener nofollow\">legal<\/a>\u201d software that performs ethically questionable behavior. One such example was the \u201cRemote Control System\u201d (RCS) developed by an Italian company called Hacking Team. RCS and platforms like it are technically legal, but despotic regimes use these tools to spy on dissidents and civil rights groups both within their borders and beyond.<\/p>\n<p>Kaspersky Lab\u2019s researchers stand by their policy to detect and remediate any malware attack, regardless of its origin or purpose.<\/p>\n<h3>Privacy vs. Security<\/h3>\n<p>We continue to struggle with the desire for privacy but the failure to maintain it in part because we don\u2019t want to be encumbered by the inconvenience of security. The <a href=\"https:\/\/www.kaspersky.com\/blog\/misunderstanding_the_cloud\/\" target=\"_blank\" rel=\"noopener nofollow\">iCloud celebrity photo-leak<\/a> from earlier this year is a great example: no photo would have been leaked had iCloud accounts been protected with strong, unique passwords. Furthermore, had Apple offered universal two-factor authentication, and had the victims of this breach deployed that protection, then there would not have been a celebrity photo leak to begin with. However, deploying a strong password or enabling two-factor authentication puts the security burden on an unreliable party: the consumer.<\/p>\n<p>http:\/\/instagram.com\/p\/vRJXxkP0Dm\/<\/p>\n<p>Botching security and then blaming the consumer is \u2018lame\u2019 and the tech companies that offer online services need to build security in. That\u2019s why Apple\u2019s and Google\u2019s announcements about default mobile device encryption and Twitter\u2019s new \u201cDigits\u201d authentication service, which sends one time passwords to users via text message, were promising steps in the right direction for security in 2014.<\/p>\n<h3>Law Enforcement Learning to Catch Cybercriminals<\/h3>\n<p>Last but certainly not least, 2014 offered promise for law enforcement agencies that, despite the bad surveillance-related press, are tasked with a thankless and incredibly difficult job. Kaspersky\u2019s GReAT researchers recounted the successes that international police forces saw this year.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Kaspersky Lab to provide its products, intelligence &amp; ongoing support to INTERPOL and its 190 members  <a href=\"http:\/\/t.co\/Y8fbL1eqzu\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/Y8fbL1eqzu<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/517071437601837057?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 30, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>A coalition of police forces from all around the world came together to takedown the \u201cGameOver Zeus\u201d botnet, which, to that point, was one of the largest crimewave kits on the market. Criminals used GameOver not only for its intended purpose as a credential stealing banking trojan, but also as a distribution platform for the infamous crypto locker malware.<\/p>\n<p>Kaspersky Lab also listed its contribution to a broader law enforcement-backed takedown of the \u201cShylock\u201d trojan, which deployed man-in-the-browser attacks to steal banking login credentials from online banking customers. More recently, \u201cOperation Onymous\u201d resulted in the takedown of dark markets running within the Tor network.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab experts analyze the security and privacy trends that emerged in 2014, including anonymous Tor browsing, ransomware, APT attacks and more.<\/p>\n","protected":false},"author":42,"featured_media":4385,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[477,628,36,218,543,43,433,97,531],"class_list":{"0":"post-4384","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-apt","9":"tag-internet-of-things","10":"tag-malware-2","11":"tag-mobile-security","12":"tag-news-2","13":"tag-privacy","14":"tag-ransomware","15":"tag-security-2","16":"tag-tor"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/security_trends_2014\/4384\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/security_trends_2014\/4448\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security_trends_2014\/4916\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security_trends_2014\/5198\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/security_trends_2014\/6393\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security_trends_2014\/6987\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/security_trends_2014\/5770\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/security_trends_2014\/6393\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security_trends_2014\/6987\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security_trends_2014\/6987\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4384"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4384\/revisions"}],"predecessor-version":[{"id":15959,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4384\/revisions\/15959"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4385"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}