{"id":87490,"date":"2019-01-29T11:39:49","date_gmt":"2019-01-29T06:09:49","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=87490"},"modified":"2023-09-25T15:44:55","modified_gmt":"2023-09-25T10:14:55","slug":"anatova","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/anatova\/","title":{"rendered":"Anatova, A modular ransomware"},"content":{"rendered":"<p>While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick Heal Security Labs has observed the first ransomware of 2019 &#8212; Anatova.<\/p>\n<p>During our analysis, we found that Anatova is not just ransomware but a modular one. By modular ransomware we mean, though the main activity of this ransomware will be encrypting the data, it can also be used to infect user\u2019s PC in many ways as it has that provision as well.<\/p>\n<p>Anatova has a different algorithm and execution techniques. That tells us, Anatova Malware authors are skilled and might have already set plans to infect more in future using modular techniques.<\/p>\n<p>As this malware is coded with high intelligence and found to be destructive, we decided to come up with a detailed analysis report and its prevention techniques.<\/p>\n<p><strong>Quick Heal Security Lab Analysis<\/strong><\/p>\n<p>Unlike other ransomware, Anatova encrypts the files but doesn\u2019t add any extension to the encrypted files. It encrypts all the files except from the folders which are present at the important location of the system such as \u2018windows\u2019, \u2018program files\u2019, \u2018program files(x86)\u2019,\u2019boot\u2019 etc.<\/p>\n<p>Further, while traversing directories to encrypt files, it skips few files of windows and those are desktop.ini, boot init, pagefile.sys etc. It also skips few of the extensions i.e. .exe, .cmd, ini &amp; .dll etc.<\/p>\n<p>Smartly, this ransomware encrypts files whose size is =&lt;1MB, and if the size is more than 1 MB then it will only encrypt the data of 1 MB from that file, we suspect that it does it to take lesser time for encryption and to avoid the detection from the security software.<\/p>\n<p>After encryption, Anatova demands ransom payment in <a href=\"https:\/\/blogs.quickheal.com\/cryptocurrency-miner-hits-iot-devices-mostly-affects-brazil-russia\/\">cryptocurrency<\/a> of 10 DASH which calculates to somewhere around $700 USD.<\/p>\n<p>Anatova lures users into downloading the ransomware with its game like icon. The hashes we analyzed were 64bit applications build in January 2019 and requires administrative privileges as shown in the below snippet.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87491\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/1-1.png\" alt=\"\" width=\"659\" height=\"154\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/1-1.png 659w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/1-1-300x70.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/1-1-650x152.png 650w\" sizes=\"(max-width: 659px) 100vw, 659px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 1: Require<em> Administrative Privileges<\/em><\/p>\n<p>Though the samples had different sizes, the main payload had 307 KB size which included resources (a game like icons). Researchers also found an uncommon behavior during analysis which is, malware already had created set of arrays which holds mostly used functions of windows library in encrypted format, as and when required, it uses decryption loop that allocates runtime memory to decrypt the encrypted strings, gain the function name, get the address of decrypted string using \u201cGetProcAddress\u201d function and release the memory once the process is completed, initially, it decrypts kernel32.dll library and its functions.<\/p>\n<p>This behavior pattern wasn\u2019t observed in any other ransomware.<\/p>\n<p>The decryption loop has been explained in the following snippet<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87494\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/2_a.jpg\" alt=\"\" width=\"586\" height=\"238\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/2_a.jpg 586w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/2_a-300x122.jpg 300w\" sizes=\"(max-width: 586px) 100vw, 586px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 2: Decryption loop<\/p>\n<p>Once the ransomware enters the system, it uses anti-analysis technique for this it\u2019ll firstly gain system information, gets user name using \u2018<strong>GetUserName<\/strong>\u2019 API, it compares the username with the stored blacklisted usernames, for which it decrypts the blacklisted usernames using decryption loop as mentioned earlier. If it finds the matching usernames, ransomware will move for cleanup and exit the process without performing any activity. Hard-coded user names are as follows: &#8211;<\/p>\n<table class=\" aligncenter\" width=\"268\">\n<tbody>\n<tr>\n<td width=\"120\">LaVirulera<\/td>\n<td width=\"148\"><\/td>\n<\/tr>\n<tr>\n<td width=\"120\">tester<\/td>\n<td width=\"148\">Tester<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">analyst<\/td>\n<td width=\"148\">Analyst<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">lab<\/td>\n<td width=\"148\">Lab<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">malware<\/td>\n<td width=\"148\">Malware<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Hardcoded part is shown below in snippet<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87497\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/3-2.png\" alt=\"\" width=\"468\" height=\"258\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/3-2.png 468w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/3-2-300x165.png 300w\" sizes=\"(max-width: 468px) 100vw, 468px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 3: <em>Hardcoded User Names<\/em><\/p>\n<p>The thing to note is, upon entering into user\u2019s PC, it generates constant mutex which tells that the system is already infected with Anatova or not. Ransomware has a code to verify constant mutex using \u201cGetLastError\u201d function, which returns error code \u20180xB7\u2019 indicating \u2018Error_Already_Exits\u2019 which means that same mutex has already created before and the process should be terminated as shown in the below snippet.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87498\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/4-1.png\" alt=\"\" width=\"785\" height=\"221\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/4-1.png 785w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/4-1-300x84.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/4-1-768x216.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/4-1-650x183.png 650w\" sizes=\"(max-width: 785px) 100vw, 785px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 4: <em>\u00a0Mutex check.<\/em><\/p>\n<p>Anatova uses \u201c<strong>GetSystemDefaultUILangauge<\/strong>\u201d api to gain the system\u2019s default language which is set at the time of first installation of Operating System, depending on the default language it decides whether to perform the activity or not as it has skipped few countries where it\u2019ll not do any harm. The snippet below shows the code part<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87499\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/5-2.png\" alt=\"\" width=\"902\" height=\"338\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/5-2.png 902w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/5-2-300x112.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/5-2-768x288.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/5-2-650x244.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/5-2-789x296.png 789w\" sizes=\"(max-width: 902px) 100vw, 902px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 5:<em> Gets Default Language.<\/em><\/p>\n<p>Moreover, it has a check to verify 38 processes and if found, ransomware terminates them to encrypt the files associated with them.<\/p>\n<p>The processes are as shown below<\/p>\n<p>&nbsp;<\/p>\n<table width=\"709\">\n<tbody>\n<tr>\n<td width=\"195\">msftesql.exe<\/td>\n<td width=\"196\">agntsvc.exeisqlplussvc.exe<\/td>\n<td width=\"159\">ocomm.exe<\/td>\n<td width=\"160\">onenote.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"195\">sqlagent.exe<\/td>\n<td width=\"196\">xfssvccon.exe<\/td>\n<td width=\"159\">mysqld.exe<\/td>\n<td width=\"160\">outlook.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"195\">sqlbrowser.exe<\/td>\n<td width=\"196\">mydesktopservice.exe<\/td>\n<td width=\"159\">mysqld-nt.exe<\/td>\n<td width=\"160\">powerpnt.exxe<\/td>\n<\/tr>\n<tr>\n<td width=\"195\">sqlwriter.exe<\/td>\n<td width=\"196\">ocautoupds.exe<\/td>\n<td width=\"159\">mysqld-opt.exe<\/td>\n<td width=\"160\">steam.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"195\">sqlservr.exe<\/td>\n<td width=\"196\">agntsvc.exeagntsvc.exe<\/td>\n<td width=\"159\">dbeng50.exe<\/td>\n<td width=\"160\">thebat.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"195\">ocssd.exe<\/td>\n<td width=\"196\">agntsvc.exeencsvc.exe<\/td>\n<td width=\"159\">sqbcoreservice.exe<\/td>\n<td width=\"160\">thebat64.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"195\">oracle.exe<\/td>\n<td width=\"196\">firefoxconfig.exe<\/td>\n<td width=\"159\">excel.exe<\/td>\n<td width=\"160\">thunderbird.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"195\">dbsnmp.exe<\/td>\n<td width=\"196\">tbirdconfig.exe<\/td>\n<td width=\"159\">infopath.exe<\/td>\n<td width=\"160\">visio.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"195\">synctime.exe<\/td>\n<td width=\"196\">mydesktopqos.exe<\/td>\n<td width=\"159\">msaccess.exe<\/td>\n<td width=\"160\"><\/td>\n<\/tr>\n<tr>\n<td width=\"195\">winword.exe<\/td>\n<td width=\"196\">wordpad.exe<\/td>\n<td width=\"159\">mspub.exe<\/td>\n<td width=\"160\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>How Encryption takes place?<\/strong><\/p>\n<p>After all, checks are satisfied, Anatova finally does the encryption activity using a combination of RSA and Salsa 20 Algorithm. To save the hassle and not to encrypt the same file again, it adds a marker of the encrypted content of 4 bytes at the end of the file (Refer fig.no 7 &amp; 8). While traversing each file for encryption it first checks the 4 bytes at the end of the file so the same file doesn\u2019t get encrypted again and in turn saves time.<\/p>\n<p>Anatova has used cryptencrypt\u00a0API to encrypt the files as shown below<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87516\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/cryptencrypt-1.png\" alt=\"\" width=\"669\" height=\"280\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/cryptencrypt-1.png 669w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/cryptencrypt-1-300x126.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/cryptencrypt-1-650x272.png 650w\" sizes=\"(max-width: 669px) 100vw, 669px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 6: API used for encryption.<\/p>\n<p>Code part for the same is shown in below snippet: &#8211;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87502\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/6.png\" alt=\"\" width=\"339\" height=\"137\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/6.png 339w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/6-300x121.png 300w\" sizes=\"(max-width: 339px) 100vw, 339px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 7: Encryption for marker<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87503\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/7-1.png\" alt=\"\" width=\"627\" height=\"463\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/7-1.png 627w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/7-1-300x222.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/7-1-528x390.png 528w\" sizes=\"(max-width: 627px) 100vw, 627px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 8:<em> Highlighted Encrypted String and hex address<\/em><\/p>\n<p>Anatova not only encrypts system drives but also checks remote location to encrypt. It checks for all instances, DRIVE_FIXED to check the local drives and DRIVE_REMOTE to verify remote(network) location.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87504\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/8-2.png\" alt=\"\" width=\"331\" height=\"201\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/8-2.png 331w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/8-2-300x182.png 300w\" sizes=\"(max-width: 331px) 100vw, 331px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 9: <em>Check Drive Type<\/em><\/p>\n<p>In the end, Anatova deletes windows shadow copies using the vssadmin program as shown in below snippet<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87510\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/vss-1.png\" alt=\"\" width=\"838\" height=\"285\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/vss-1.png 838w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/vss-1-300x102.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/vss-1-768x261.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/vss-1-650x221.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/vss-1-789x268.png 789w\" sizes=\"(max-width: 838px) 100vw, 838px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 10: <i>VSSAdmin command<\/i><\/p>\n<p>After encryption and deleting the shadow copies, ransomware deletes itself as shown below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87519\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/self-delete.png\" alt=\"\" width=\"837\" height=\"180\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/self-delete.png 837w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/self-delete-300x65.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/self-delete-768x165.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/self-delete-650x140.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/self-delete-789x170.png 789w\" sizes=\"(max-width: 837px) 100vw, 837px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 11: Self-deletion<i><\/i><\/p>\n<p>After encryption, it drops ransom note mentioning the email-ids and ransom to pay.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87505\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/9-1.jpg\" alt=\"\" width=\"1106\" height=\"526\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/9-1.jpg 1106w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/9-1-300x143.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/9-1-768x365.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/9-1-650x309.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/9-1-789x375.jpg 789w\" sizes=\"(max-width: 1106px) 100vw, 1106px\" \/><\/p>\n<p style=\"text-align: center;\">Fig.12: Ransom note<\/p>\n<p><strong>Good news, Quick Heal users are safe.<\/strong><\/p>\n<p>Quick Heal successfully blocks Anatova ransomware with the following protection layers:<\/p>\n<ul>\n<li>Virus Protection<\/li>\n<li>Behavior-based Detection<\/li>\n<li>Anti-Ransomware<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87506\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/10-1.jpg\" alt=\"\" width=\"327\" height=\"176\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/10-1.jpg 327w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/10-1-300x161.jpg 300w\" sizes=\"(max-width: 327px) 100vw, 327px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 13:<em> Quick Heal Virus Protection<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87507\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/11.png\" alt=\"\" width=\"459\" height=\"265\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/11.png 459w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/11-300x173.png 300w\" sizes=\"(max-width: 459px) 100vw, 459px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 14: <em>Anti-ransomware Protection<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-87508\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2019\/01\/12-2.png\" alt=\"\" width=\"418\" height=\"266\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/12-2.png 418w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2019\/01\/12-2-300x191.png 300w\" sizes=\"(max-width: 418px) 100vw, 418px\" \/><\/p>\n<p style=\"text-align: center;\">Fig 15: <em>Behavior detection Protection<\/em><\/p>\n<p><strong>How to stay safe from ransomware attacks:<\/strong><\/p>\n<ul>\n<li>Always take a backup of your important data in external drives like HDD and pen drives. Consider using a reliable Cloud service to store the data.<\/li>\n<li>Do not install any freeware or cracked versions of any software.<\/li>\n<li>Do not open any advertisement pages shown on websites without knowing that they are genuine.<\/li>\n<li>Disable macros while using MS Office.<\/li>\n<li>Update your antivirus to protect your system from unknown threats.<\/li>\n<li>Do not click on links or download attachments in emails from unexpected, unknown or unwanted sources.<\/li>\n<\/ul>\n<p><strong>Indicators of compromise:<\/strong><\/p>\n<p><strong>\u00a0<\/strong><strong>SHA\u2019s: &#8211;<\/strong><\/p>\n<ul>\n<li>170fb7438316f7335f34fa1a431afc1676a786f1ad9dee63d78c3f5efd3a0ac0<\/li>\n<li>75371ff38823885b47aa21d2883792a5470e9bf1f3d2dc93f512725f35491820<\/li>\n<li>97fb79ca6fc5d24384bf5ae3d01bf5e77f1d2c0716968681e79c097a7d95fb93<\/li>\n<li>ab8a76b64448b943dc96a3e993b6e6b37af27c93738d27ffd1f4c9f96a1b7e69<\/li>\n<li>bd422f912affcf6d0830c13834251634c8b55b5a161c1084deae1f9b5d6830ce<\/li>\n<\/ul>\n<p><strong>Ransomnote.txt as shown in fig. 12<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Subject Matter Experts:<\/strong><\/p>\n<p>Poonam Dongare , Nagesh Lathkar | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While everyone was engaged in new year celebrations, malware authors were busy creating new ransomware for 2019. Quick Heal Security Labs has observed the first ransomware of 2019 &#8212; Anatova. During our analysis, we found that Anatova is not just ransomware but a modular one. By modular ransomware we mean, though the main activity of [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":87511,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,133,24,303,910,5],"tags":[163,22,50,47],"class_list":["post-87490","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email","category-hacker","category-malware","category-phishing","category-ransomware","category-security","tag-cyber-crime","tag-email-malware","tag-ransomware","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87490"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=87490"}],"version-history":[{"count":15,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87490\/revisions"}],"predecessor-version":[{"id":92085,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87490\/revisions\/92085"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/87511"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=87490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=87490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=87490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}