{"id":89824,"date":"2021-05-07T21:09:58","date_gmt":"2021-05-07T15:39:58","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=89824"},"modified":"2023-08-08T17:50:49","modified_gmt":"2023-08-08T12:20:49","slug":"beware-hackers-target-users-with-fake-covid-19-vaccine-registration-app","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/beware-hackers-target-users-with-fake-covid-19-vaccine-registration-app\/","title":{"rendered":"Beware! Hackers target users with fake COVID-19 vaccine registration app"},"content":{"rendered":"<p>Have you received an SMS with a link that says, &#8220;Register for vaccine using COVID-19 app&#8221;?<\/p>\n<p>Well, beware! It\u2019s fake \u2013 and probably riddled with malware.<\/p>\n<p>The government of India started with the COVID-19 vaccination drive for everyone above 18, but consumers are facing problems in booking a slot due to a shortage in vaccines. In order to make the process user-friendly, several developers came up with notify-me websites that can tell you the availability of the slots, though you still need to use the official registration platform CoWIN API to complete the formalities.<\/p>\n<p>In the middle of such a crisis, hackers are taking advantage of the situation with malicious elements. A fake SMS is in circulation tricking unsuspecting users for vaccine registration via an app. The SMS primarily is a malicious link filled with <a href=\"https:\/\/blogs.quickheal.com\/alert-wormable-android-malware-is-spreading-through-social-media-applications\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android Worm<\/a> that reaches users via message app, asking to register with the \u2018Vaccine Registration\u2019 app. Once the user downloads the app, it requests permission to access all the contacts and messages. The worm then uses the contacts listed in the infected Android device to spread to other devices via text messages.<\/p>\n<h4><strong>How does the Trojan malware works?<\/strong><\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89825 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig1-650x243.jpg\" alt=\"\" width=\"650\" height=\"243\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig1-650x243.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig1-300x112.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig1-768x288.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig1-789x295.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig1.jpg 1362w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.1: Malicious web page<\/em><\/p>\n<p>The above webpage Fig. 1 shows how hackers misguide users to download an app for the vaccination registration for the 18+ age groups. But in reality, it downloads a malicious APK after clicking on the \u201cDownload Now\u201d button. The malicious APK is hosted on the GitHub account, and we got few similar apps with different app name in them. You can find the GitHub account link <a href=\"https:\/\/github.com\/mybestnews\/2\">here<\/a>. On monitoring this campaign, we got some other GitHub accounts, which also host similar APKs as shown in Fig.2 and Fig.3.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89826 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/fig2-650x292.jpg\" alt=\"\" width=\"650\" height=\"292\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/fig2-650x292.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/fig2-300x135.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/fig2-768x345.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/fig2-789x355.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/fig2.jpg 977w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig2: GitHub account projectpro1 with malicious APK<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89827 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig3-650x304.jpg\" alt=\"\" width=\"650\" height=\"304\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig3-650x304.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig3-300x140.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig3-768x359.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig3-789x369.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig3.jpg 987w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig3: GitHub account mybestnews with malicious APK<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>On the first launch, the application takes few suspicious permissions like access contact, send and view SMS, make a call, etc. Fig. 4 shows permissions which it asks for the Fake vaccine registration application.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89828 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/fig4-591x390.jpg\" alt=\"\" width=\"591\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/fig4-591x390.jpg 591w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/fig4-300x198.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/fig4-768x507.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/fig4-1536x1014.jpg 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/fig4-2048x1352.jpg 2048w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/fig4-789x521.jpg 789w\" sizes=\"(max-width: 591px) 100vw, 591px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 4 Fake vaccine registration app.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Technical analysis:<\/strong><\/p>\n<p>The malware App does some checks shown in Fig. 5 like, Emulator, ADB enabled or not, debugger check. It also collects information on all installed applications on the infected device.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89829 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig5-650x237.jpg\" alt=\"\" width=\"650\" height=\"237\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig5-650x237.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig5-300x109.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig5-768x280.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig5-789x287.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig5.jpg 956w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 5: ADB and Debugger check<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>First, it asks for the mobile number for the registration purpose. But on clicking the register now button, it only checks the length of the entered mobile number. If it is not greater than equal to 4 characters (as shown in Fig. 6) or if it is less than 4 characters, it displays a message \u201cPlease Enter your Correct Number!!\u201d<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89830 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig6-650x101.jpg\" alt=\"\" width=\"650\" height=\"101\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig6-650x101.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig6-300x47.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig6-768x120.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig6-789x123.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig6.jpg 930w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 6: Mobile number check<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Spreading through SMS:<\/strong><\/p>\n<p>The malware collects contact information from the infected device.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89831 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig7-466x390.jpeg\" alt=\"\" width=\"466\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig7-466x390.jpeg 466w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig7-300x251.jpeg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig7-768x643.jpeg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig7-789x661.jpeg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig7.jpeg 897w\" sizes=\"(max-width: 466px) 100vw, 466px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 7: Collecting contacts <\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Malware targets only Jio operators and spreads to contacts who are using Jio sim card. To identify the Jio user, the malware checks the first 4 characters of the mobile number with the list of number that Jio serves. Secondly, it queries a public web API of Jio and checks the response. Below fig. 8 shows the checking of Jio numbers.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89832 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig8-650x78.jpg\" alt=\"\" width=\"702\" height=\"126\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 8: Checking the first 4 characters of the number.<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-89833 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig9-328x390.jpg\" alt=\"\" width=\"399\" height=\"463\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 9: checking the response from Web API<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>The unidentified numbers are checked by querying a public web API of Jio as shown in Fig.9. In response, it checks for the string NOT_SUBSCRIBED_USER. And if the response contains a mobile number, then it is considered as a Jio number. After identifying the Jio number, it collects it in a separate list and starts sending SMS using the default sim operator as shown in Fig. 10.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89834 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig10-650x87.jpg\" alt=\"\" width=\"650\" height=\"87\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig10-650x87.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig10-300x40.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig10-768x103.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig10-1536x207.jpg 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig10-789x106.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig10.jpg 1605w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 10: Sending SMS<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Spreading through WhatsApp:<\/strong><\/p>\n<p>The malware does not automatically spread through WhatsApp. It gives a dialogue box of \u201cShare this APP on WhatsApp groups 10 Times to Start Registration&#8221; shows in Fig 11.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89835 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig11-351x390.jpg\" alt=\"\" width=\"351\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig11-351x390.jpg 351w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig11-270x300.jpg 270w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig11-768x853.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig11-789x877.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig11.jpg 1080w\" sizes=\"(max-width: 351px) 100vw, 351px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 11: Malware spreading through WhatsApp<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>On clicking the button \u201cShare on WhatsApp\u201d, the malware copies the message to the clipboard. The malware does not validate whether the message is shared on WhatsApp or not. It only counts the number of clicks on the \u201cShare on WhatsApp\u201d. Fig 12 and Fig. 13 shows the WhatsApp sharing code.<\/p>\n<p>The message shared on the WhatsApp groups:<\/p>\n<p><strong>Register for Vaccine Now*\\n*from age 18+*\\n\\n*No Fees will be taken.*\\n*It&#8217;s absolutely Free.*\\n\\n*Download VacciRegis android app*\\n*and Register for vaccine*\\n*in India*\\n\\n*Link:* <\/strong><strong>http[:]\/\/tiny.cc\/COVID-VACCINE<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89836 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig12-523x390.jpg\" alt=\"\" width=\"523\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig12-523x390.jpg 523w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig12-300x224.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig12.jpg 732w\" sizes=\"(max-width: 523px) 100vw, 523px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 12: Spreading through WhatsApp<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89837 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig13-650x261.jpg\" alt=\"\" width=\"650\" height=\"261\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig13-650x261.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig13-300x121.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig13-768x309.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig13.jpg 771w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 13:\u00a0 Completion of message sharing on WhatsApp<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>The main goal of the app is to generate revenue by displaying ads and spreading itself through the victim\u2019s contact list and through SMS. At Quick Heal, we have collected multiple variants of this malicious App and all are detected with the name \u201cAndroid.GoodNews.GEN41898\u201d. All these malicious applications are signed with the same digital certificate, which means the malware is written by a single malware author.<\/p>\n<p><strong>IOCs<\/strong><\/p>\n<table border=\"1\" width=\"648\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td width=\"243\">Package Name<\/td>\n<td width=\"371\">MD5<\/td>\n<\/tr>\n<tr>\n<td width=\"243\">com.halorozd.meditation<\/td>\n<td width=\"371\">e9eb39d8880a1a04acc538bb717dc337<\/td>\n<\/tr>\n<tr>\n<td width=\"243\">com.oncamra.sevendra<\/td>\n<td width=\"371\">36dfa9f4c7cf017b2dcae2b67230245a<\/td>\n<\/tr>\n<tr>\n<td width=\"243\">com.pappucantt.projectdance<\/td>\n<td width=\"371\">0c926ad8904f1e1d0bccda18f04722da<\/td>\n<\/tr>\n<tr>\n<td width=\"243\">com.oncamra.sevendra<\/td>\n<td width=\"371\">17e3294f7bfd7e5b1fdb50465471e1db<\/td>\n<\/tr>\n<tr>\n<td width=\"243\">com.projectchav.dudupiva<\/td>\n<td width=\"371\">f570647c6b761aeddf644d46dcb675d9<\/td>\n<\/tr>\n<tr>\n<td width=\"243\">com.parthhingu.meditation<\/td>\n<td width=\"371\">f504cfe44d9a6a0bfe6c5bf7c29c6a13<\/td>\n<\/tr>\n<tr>\n<td width=\"243\">com.readyfor.whosbaby<\/td>\n<td width=\"371\">5c04e41a3d2a00b3c9336788d9ce4835<\/td>\n<\/tr>\n<tr>\n<td width=\"243\">com.projectchav.dudupiva<\/td>\n<td width=\"371\">1335d286d70a93cfd888fb3a362ab54e<\/td>\n<\/tr>\n<tr>\n<td width=\"243\">com.projectchav.dudupiva<\/td>\n<td width=\"371\">8c217585671eec3d7979be4895c3c070<\/td>\n<\/tr>\n<tr>\n<td width=\"243\">com.rahul.bhuvolund<\/td>\n<td width=\"371\">1601470a832a633fe3027ef3518bdbfd<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h4><strong>How to stay safe from fake mobile apps<\/strong><\/h4>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Check an app\u2019s description before you download it from the Google play store.<\/li>\n<li>Check the app developer\u2019s name and their website. If the name sounds strange or odd, you have all the reasons to suspect it.<\/li>\n<li>Go through the reviews and ratings of the app. But, note that these can also be faked.<\/li>\n<li>Avoid downloading apps from third-party app stores.<\/li>\n<li>Always check your system and applications updated or not.<\/li>\n<li>Use a reliable mobile antivirus that can prevent fake and malicious apps from getting installed on your phone.<\/li>\n<li>Use a reliable mobile antivirus like <a href=\"https:\/\/www.quickheal.co.in\/quick-heal-mobile-security\" target=\"_blank\" rel=\"noopener noreferrer\">Quick Heal Mobile Security<\/a> for Android that can prevent fake and malicious apps from getting installed on your phone.<\/li>\n<li>Don\u2019t click on unknown links shared on social media platforms, even if shared by your trusted contacts.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Have you received an SMS with a link that says, &#8220;Register for vaccine using COVID-19 app&#8221;? Well, beware! It\u2019s fake \u2013 and probably riddled with malware. The government of India started with the COVID-19 vaccination drive for everyone above 18, but consumers are facing problems in booking a slot due to a shortage in vaccines. [&hellip;]<\/p>\n","protected":false},"author":60,"featured_media":89838,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1739,24],"tags":[1804],"class_list":["post-89824","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-malware","tag-vaccineregisteration-cybersecurity-covid19india-vaccinationcovid-fakenews-android-malware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89824"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/60"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89824"}],"version-history":[{"count":3,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89824\/revisions"}],"predecessor-version":[{"id":89841,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89824\/revisions\/89841"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/89838"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}