{"id":68012,"date":"2017-01-18T10:10:28","date_gmt":"2017-01-18T18:10:28","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=68012"},"modified":"2025-04-28T02:03:43","modified_gmt":"2025-04-28T09:03:43","slug":"troyanizacion-de-aplicaciones-legitimas-en-aumento","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/","title":{"rendered":"&#8220;Troyanizaci\u00f3n&#8221; de Aplicaciones Leg\u00edtimas en Aumento"},"content":{"rendered":"<p><em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">The recent McAfee Labs Threat Report: December 2016 illustrates how attackers are creating hard-to-detect malware by infecting legitimate code with Trojans, and leveraging that legitimacy to remain hidden as long as possible. The author, Craig Schmugar of McAfee Labs, also recommends policies and procedures to help you protect against these types of attacks. The following is an excerpt from Schmugar&#8217;s article on this important topic.<\/span><\/span><\/em><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">The concept of backdoor access has been coveted by malware authors, spies, and nation-states for decades. Tactics to achieve these goals range from persuading victims through social engineering techniques to hand over the keys to their devices and intercepting hardware in the supply chain, to inserting backdoors to gain remote access. However, the most common method is through the deployment of Trojan software.<\/span><\/span><\/p>\n<h2>Los ciberdelincuentes y sus ganancias<\/h2>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Most malicious applications today serve a single purpose: to generate profit for criminals by subjecting their victims to attacks. The tactical objectives of these crimes are generally to reach the target, establish a presence, and persist for an extended period of time. To achieve their goals, attackers lure victims through social engineering or intercept their everyday device use, most often through the exploitation of vulnerabilities. In either case, the goal is to keep the unfortunate individuals who come across malicious code unnoticed.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">The longer attacks remain undetected, the greater the reward. To this end, attackers are becoming increasingly sophisticated in generating durable and completely undetectable creations. The more authentic a piece of code appears, the more likely it will be overlooked. This is the primary driver of a growing trend of &#8220;Trojanizing&#8221; legitimate applications, which are injected with malicious code that does not replicate. The misuse of reputable applications provides attackers with several benefits. Payloads are hidden behind a recognizable brand, contributing to the impression of legitimacy and helping to ensure that certain users take the bait. This brand recognition continues after a system has been compromised, through recognizable directories, files, processes, and registry key names and attributes. These elements can provide cover during security scans and forensics, with recognizable properties that blend in with hundreds or even thousands of known programs.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Another benefit is built-in persistence, or a method of restarting previously terminated code. Malware persistence falls into one of two categories: self-persistence, which involves installing startup hooks to support restarts; and companion persistence, which leverages existing startup hooks to automatically load before, during, or after other desired applications. Every system change made by malicious code is an indicator of compromise. So the fewer the changes, the smaller the detection surface. Trojanizing legitimate applications provides free persistence; the software&#8217;s natural method of startup is all that&#8217;s needed to load malicious code. In fact, if the program is run manually periodically, then persistence is self-perpetuating by the victims themselves.<\/span><\/span><\/p>\n<p><em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">For more information, visit <\/span><\/span><\/em> <a href=\"https:\/\/www.mcafee.com\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">www.mcafee.com <\/span><\/span><\/a> <em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">for the <\/span><\/span><\/em> <a href=\"https:\/\/mcafee.box.com\/v\/QTRDIC16SP\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">full report <\/span><\/span><\/a><em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">.<\/span><\/span><\/em><\/p>\n<p><u>\u00a0<\/u><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The recent McAfee Labs Threat Report: December 2016 illustrates how attackers are creating hard-to-detect malware by infecting legitimate code with&#8230;<\/p>\n","protected":false},"author":838,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11878],"tags":[16487,14785],"coauthors":[4687],"class_list":["post-68012","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-ciberseguridad-es-es","tag-malware-es-es"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>&quot;Troyanizaci\u00f3n&quot; de Aplicaciones Leg\u00edtimas en Aumento | Blog de McAfee<\/title>\n<meta name=\"description\" content=\"The recent McAfee Labs Threat Report: December 2016 illustrates how attackers are creating hard-to-detect malware by infecting legitimate code with\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Troyanizaci\u00f3n&quot; de Aplicaciones Leg\u00edtimas en Aumento | Blog de McAfee\" \/>\n<meta property=\"og:description\" content=\"The recent McAfee Labs Threat Report: December 2016 illustrates how attackers are creating hard-to-detect malware by infecting legitimate code with\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog de McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-18T18:10:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-28T09:03:43+00:00\" \/>\n<meta name=\"author\" content=\"McAfee LTAM\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee LTAM\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/\"},\"author\":{\"name\":\"McAfee LTAM\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc\"},\"headline\":\"&#8220;Troyanizaci\u00f3n&#8221; de Aplicaciones Leg\u00edtimas en Aumento\",\"datePublished\":\"2017-01-18T18:10:28+00:00\",\"dateModified\":\"2025-04-28T09:03:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/\"},\"wordCount\":484,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\"},\"keywords\":[\"ciberseguridad\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/\",\"name\":\"\\\"Troyanizaci\u00f3n\\\" de Aplicaciones Leg\u00edtimas en Aumento | Blog de McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#website\"},\"datePublished\":\"2017-01-18T18:10:28+00:00\",\"dateModified\":\"2025-04-28T09:03:43+00:00\",\"description\":\"The recent McAfee Labs Threat Report: December 2016 illustrates how attackers are creating hard-to-detect malware by infecting legitimate code with\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"&#8220;Troyanizaci\u00f3n&#8221; de Aplicaciones Leg\u00edtimas en Aumento\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\",\"name\":\"Blog de McAfee\",\"description\":\"Noticias sobre seguridad en Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc\",\"name\":\"McAfee LTAM\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/image\/138881b47da8f70f6daacc26e1ea0963\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg\",\"caption\":\"McAfee LTAM\"},\"description\":\"Conozca nuestra visi\u00f3n global en espa\u00f1ol y portugu\u00e9s, sobre tendencias y ejes de pensamiento en temas de ciber-seguridad, enfocada en el ciclo de vida de la amenazas y mostrando como protegerlas, detectarlas y corregirlas utilizando intercambio de inteligencia, frente a los desaf\u00edos de la actualidad | Learn about our global vision in Spanish and Portuguese, trends and thought leadership topics oriented to cyber security, and the threat defense life-cycle to protect, detect and correct them, using threat intelligence and driving today\u00b4s challenges.\",\"sameAs\":[\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/author\/intel-security-ltam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\"Troyanizaci\u00f3n\" de Aplicaciones Leg\u00edtimas en Aumento | Blog de McAfee","description":"The recent McAfee Labs Threat Report: December 2016 illustrates how attackers are creating hard-to-detect malware by infecting legitimate code with","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"\"Troyanizaci\u00f3n\" de Aplicaciones Leg\u00edtimas en Aumento | Blog de McAfee","og_description":"The recent McAfee Labs Threat Report: December 2016 illustrates how attackers are creating hard-to-detect malware by infecting legitimate code with","og_url":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/","og_site_name":"Blog de McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-01-18T18:10:28+00:00","article_modified_time":"2025-04-28T09:03:43+00:00","author":"McAfee LTAM","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee LTAM","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/"},"author":{"name":"McAfee LTAM","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc"},"headline":"&#8220;Troyanizaci\u00f3n&#8221; de Aplicaciones Leg\u00edtimas en Aumento","datePublished":"2017-01-18T18:10:28+00:00","dateModified":"2025-04-28T09:03:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/"},"wordCount":484,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization"},"keywords":["ciberseguridad","malware"],"articleSection":["McAfee Labs"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/","name":"\"Troyanizaci\u00f3n\" de Aplicaciones Leg\u00edtimas en Aumento | Blog de McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#website"},"datePublished":"2017-01-18T18:10:28+00:00","dateModified":"2025-04-28T09:03:43+00:00","description":"The recent McAfee Labs Threat Report: December 2016 illustrates how attackers are creating hard-to-detect malware by infecting legitimate code with","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/troyanizacion-de-aplicaciones-legitimas-en-aumento\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"&#8220;Troyanizaci\u00f3n&#8221; de Aplicaciones Leg\u00edtimas en Aumento"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#website","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/","name":"Blog de McAfee","description":"Noticias sobre seguridad en Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/es-es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc","name":"McAfee LTAM","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/image\/138881b47da8f70f6daacc26e1ea0963","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg","caption":"McAfee LTAM"},"description":"Conozca nuestra visi\u00f3n global en espa\u00f1ol y portugu\u00e9s, sobre tendencias y ejes de pensamiento en temas de ciber-seguridad, enfocada en el ciclo de vida de la amenazas y mostrando como protegerlas, detectarlas y corregirlas utilizando intercambio de inteligencia, frente a los desaf\u00edos de la actualidad | Learn about our global vision in Spanish and Portuguese, trends and thought leadership topics oriented to cyber security, and the threat defense life-cycle to protect, detect and correct them, using threat intelligence and driving today\u00b4s challenges.","sameAs":["https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/es-es\/author\/intel-security-ltam\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/68012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/users\/838"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/comments?post=68012"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/68012\/revisions"}],"predecessor-version":[{"id":212441,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/68012\/revisions\/212441"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/media?parent=68012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/categories?post=68012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/tags?post=68012"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/coauthors?post=68012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}