{"id":123613,"date":"2021-06-28T13:00:16","date_gmt":"2021-06-28T20:00:16","guid":{"rendered":"\/blogs\/?p=123613"},"modified":"2024-01-16T01:05:50","modified_gmt":"2024-01-16T09:05:50","slug":"5-ransomware-threats-canadians-need-to-know","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/","title":{"rendered":"5 Ransomware Threats Canadians Need to Know"},"content":{"rendered":"<p><span data-contrast=\"none\">Every day you place your personal information in the hands of companies and trust that it will remain safe. However, what happens when external threats jeopardize your\u00a0personal\u00a0data security, especially\u00a0while working remotely?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The transition to remote work environments\u00a0and consumers\u2019 online habits\u00a0have made it more difficult for\u00a0Canadian\u00a0employees and consumers\u00a0to protect their personal information. This challenge is primarily due to\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/consumer-cyber-awareness\/8-tips-for-staying-safe-from-ransomware-attacks\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">ransomware<\/span><\/a><span data-contrast=\"none\">.\u00a0To protect yourself, you need to first understand how cybercriminals\u00a0take advantage of users\u2019 online behaviors to\u00a0launch strategic attacks against\u00a0employees\u00a0and\u00a0consumers through the\u00a0information\u00a0they glean from stolen company data.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">How Your Personal Actions Can Impact Corporate Systems<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Ransomware has been on the rise this past year with attacks increasing 62% in 2020 according to\u00a0<\/span><a href=\"https:\/\/www.statista.com\/statistics\/494947\/ransomware-attacks-per-year-worldwide\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Statista<\/span><\/a><span data-contrast=\"none\">.\u00a0In\u00a0fact,\u00a0<\/span><span data-contrast=\"auto\">7<\/span><span data-contrast=\"none\">8% of Canadian cybersecurity professionals said\u00a0that attacks increased due to employees working remotely\u00a0in a recent\u00a0<\/span><a href=\"https:\/\/www.carbonblack.com\/resources\/canada-security-insights-report-2021\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">VMware report<\/span><\/a><span data-contrast=\"none\">.\u00a0Cybercriminals\u00a0target\u00a0remote workers\u00a0primarily\u00a0through malicious links sent\u00a0through\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/consumer-threat-reports\/protect-yourself-against-phishing-scams-with-these-security-tips\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">phishing emails<\/span><\/a><span data-contrast=\"auto\">\u00a0\u2014\u00a0in fact,\u00a0o<\/span><span data-contrast=\"none\">ver\u00a0<\/span><a href=\"https:\/\/www150.statcan.gc.ca\/n1\/daily-quotidien\/201014\/dq201014a-eng.htm\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">one third of Canadian respondents<\/span><\/a><span data-contrast=\"none\">\u00a0in a\u00a0recent survey said they experienced at least one\u00a0phishing\u00a0attempt in the last year.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Hackers pose as legitimate organizations and prompt\u00a0individuals\u00a0to\u00a0take action:\u00a0say you\u00a0decide to check your personal email on your work laptop during your lunch break. You open a message that claims to\u00a0be from one of your\u00a0favorite\u00a0retailers\u00a0claiming that you just won $500 in shopping credit \u2013 all you need to do is click on the\u00a0link and fill out your banking information. This is an example of a phishing attack that could not only wreak havoc on your personal security, but your company\u2019s as well. If the link in the message downloads a credential-stealing malware\u00a0on your work laptop, there is a good chance that\u00a0your organization\u2019s private data\u00a0or network\u00a0could be compromised.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Knowing that many employees will be communicating virtually instead of face-to-face, hackers\u00a0can take advantage of the remote work environment by\u00a0posing\u00a0as employees from finance departments and sending\u00a0fake invoices for products or services. The\u00a0goal of\u00a0these fake invoices is for employees to call a support phone number to investigate, whereby hackers attain credit card numbers or other information they can leverage in\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/consumer-threat-reports\/protect-yourself-against-phishing-scams-with-these-security-tips\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">spear-phishing scams<\/span><\/a><span data-contrast=\"none\">.\u00a0Hackers can also spoof phone calls to make it look like it is coming from a legitimate number within the organization.\u00a0Revealing too much information to an unverified contact\u00a0is a risk that remote workers\u00a0must learn to identify and avoid.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Ransomware is always evolving, making it critical\u00a0to understand the nature of these threats\u00a0so you can\u00a0better avoid them.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">The 5 Most Dangerous Ransomware Scams <\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Cybercriminals are constantly finding new ways to automate their attacks and increase their profits.\u00a0Here is a look at five\u00a0<\/span><a href=\"https:\/\/cyber.gc.ca\/en\/guidance\/cyber-threat-bulletin-modern-ransomware-and-its-evolution\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">active ransomware variants<\/span><\/a><span data-contrast=\"none\">\u00a0cybercriminals use today\u2014and\u00a0how\u00a0they\u00a0deploy them.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">1. CryptoDefense<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">By the end of 2020,\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/lp\/threats-reports\/apr-2021.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">McAfee Labs<\/span><\/a><span data-contrast=\"none\">\u00a0observed a 69% increase in new ransomware, which\u00a0<\/span><a href=\"https:\/\/www.knowbe4.com\/cryptodefense-ransomware\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Cryptodefense<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"none\">largely drove.\u00a0This virus is\u00a0similar to\u00a0<\/span><a href=\"https:\/\/www.knowbe4.com\/cryptolocker-ransomware\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">CryptoLocker<\/span><\/a><span data-contrast=\"none\">, a trojan virus that spreads through email phishing to infiltrate hard drives and files.\u00a0Both\u00a0spread\u00a0ransomware,\u00a0use high levels of\u00a0encryption\u00a0to compromise users\u2019 files,\u00a0and\u00a0claim that these files cannot be decrypted\u00a0without a decryption key.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">2. Maze<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ransomware-maze\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Maze\u00a0ransomware<\/span><\/a><span data-contrast=\"none\">\u00a0has been active since November of 2019 and is operated by hackers notorious for leaking victim data upon non-payment. Maze operators first gain access to a network by using valid credentials.\u00a0It will then scan the network for user devices, check these devices for additional credentials, and compromise\u00a0user files.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">3. REvil\/Sodinokibi<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">In a\u00a0<\/span><a href=\"https:\/\/securityandtechnology.org\/ransomwaretaskforce\/report\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Ransomware Task Force interview<\/span><\/a><span data-contrast=\"none\">\u00a0with an affiliate of the\u00a0REvil\/<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Sodinokibi<\/span><\/a><span data-contrast=\"none\">\u00a0syndicate,\u00a0the\u00a0interviewee revealed that companies with cyber insurance are prime targets since the chances of a payout are high. This ransomware spreads through software vulnerabilities, phishing scams, and exploit kits. Once it infiltrates a device, it spreads through escalated privilege to compromise user files and systems.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">4. Ryuk<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ryuk-exploring-the-human-connection\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Ryuk<\/span><\/a><span data-contrast=\"none\">\u00a0has been around since August of 2018 and targets large companies, critical infrastructure, and hospitals. This ransomware is almost always spread through a banking trojan called\u00a0Trickbot, used by hackers to steal financial and banking credentials. The operators behind this ransomware demand higher ransoms compared to other groups. They also use opensource tools and manual hacking techniques to bypass detection and infiltrate private networks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">5. SamSam<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">The operators behind\u00a0SamSam\u00a0ransomware gain access through Windows servers using a Microsoft protocol that allows remote connections to other computers. Operators will then elevate their privilege to include admin rights once inside a network to infect servers with malware, requiring no action or authorization on the victim\u2019s part.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">How to Reduce the Risk and Impact of Ransomware<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Ransomware\u00a0can affect anyone,\u00a0regardless\u00a0of whether\u00a0you\u00a0are an employee or\u00a0a\u00a0customer\u00a0of a targeted company.\u00a0Keep these tips in mind to\u00a0reduce your risk of a ransomware attack and\u00a0know\u00a0what steps to take if you fall victim.\u00a0<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">1. Don\u2019t click on malicious links<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/phishing-email-examples-how-to-recognize-a-phishing-email\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Phishing emails<\/span><\/a><span data-contrast=\"none\">\u00a0are one of the most common methods a hacker will use to\u00a0infect devices and spread ransomware.\u00a0They will send links through seemingly legitimate emails to trick users into clicking\u00a0on them\u00a0and downloading malicious files.\u00a0Knowing how to spot one is the first step to\u00a0prevent infection. If you receive an\u00a0email\u00a0you suspect is a phishing scam, start by analyzing its structure: common indicators of a phishing scam\u00a0may include:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Grammatical errors with poorly written wording<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Pressure to take immediate action or confirm personal information<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Link addresses that do not match the anchor text in the email body<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Inconsistent sender name and email address<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">Suspicious attachments\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">Once you identify a phishing email,\u00a0don\u2019t click on any links or download attachments. Simply\u00a0delete it\u00a0and carry on with\u00a0your\u00a0day.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">2. Use multi-factor authentication and strong passwords<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Keep in mind that the cybercriminals behind Maze ransomware gained access to private networks through valid credentials.\u00a0Hackers typically obtain these credentials\u00a0through a \u201cpassword spray\u201d technique where they\u00a0attempt to log in to accounts\u00a0using a\u00a0list of commonly used\u00a0passwords.\u00a0However, hackers have a higher chance of guessing valid passwords if they are too short or not complex enough.\u00a0Additionally,\u00a0a hacker is more likely\u00a0to infiltrate\u00a0multiple accounts if they share the same password.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Strong passwords\u00a0help\u00a0ensure that a hacker cannot access your private network, gain administrative rights to your device, or infect another device you\u00a0are\u00a0connected to.\u00a0Create a\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/strong-password-ideas-to-keep-your-information-safe\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">password\u00a0that\u00a0is strong enough<\/span><\/a><span data-contrast=\"none\">\u00a0to withstand simple guess-and-check attempts by making them long, difficult,\u00a0and unique.\u00a0Multi-phrased passwords\u00a0or passphrases\u00a0also\u00a0help to\u00a0prevent hackers from breaking into\u00a0your\u00a0accounts, such as \u201cP3anutbutter&amp;J3lly.\u201d\u00a0Avoid reusing passwords across multiple accounts and change them periodically, especially after\u00a0an account has been breached.\u00a0Even if a hacker does steal your credentials,\u00a0multi-factor authentication\u00a0adds an extra\u00a0validation layer to prohibit unauthorized sign-in attempts.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">3. Use security software to monitor threats<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">Your device is more susceptible to ransomware and viruses without the right security tools to help mitigate the chances of infection. Avoid\u00a0the risk of a\u00a0ransomware\u00a0attack by employing a quality security solution like\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-ca\/antivirus\/mcafee-total-protection.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">McAfee Total Protection<\/span><\/a><span data-contrast=\"none\">. A holistic security solution can help you stay vigilant of\u00a0cyber threats by monitoring for ransomware\u00a0viruses\u00a0in addition to malware and spyware.\u00a0Security software can also monitor your internet connection and network traffic through regular scans\u00a0to flag malicious activity and provide guidance on how to sidestep these threats.\u00a0If a hacker attempts to launch an attack on your device, you can rest assured your security software will promptly alert you of the intrusion.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">\u00a04. Regularly update devices<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">In addition to social engineering tactics, hackers will leverage vulnerabilities in software to create a back door through which they can infiltrate user devices. A way to keep cyber criminals out is to keep your software applications and devices up to date.\u00a0This includes the apps on your mobile device as well as apps on your desktop.\u00a0Regular updates ensure that the proper security patches are implemented, the right bugs are fixed\u00a0and that hackers cannot exploit\u00a0these\u00a0vulnerabilities.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"none\">5. Remediate and restore files and systems<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"none\">If worse comes to worst\u00a0and your device is infected with ransomware,\u00a0the first thing\u00a0to do is isolate the device and disconnect from\u00a0shared networks.\u00a0Disconnecting the infected device ensures that\u00a0ransomware cannot spread to other devices on that same network.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Immediately gather evidence on what type of malware you are dealing with so you can accurately report it to authorities and\u00a0determine what\u00a0your options are for remediation.\u00a0You can\u00a0then\u00a0choose to remove it or\u00a0wipe your system completely\u00a0which is the most assured way to eliminate ransomware from your device.\u00a0Afterwards you can reinstall\u00a0your operating system and, provided you perform regular backups, restore your\u00a0files to a previous version.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Defeat Ransomware Threats\u00a0\u00a0\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">No one is truly out of the danger zone\u00a0when hackers strike. Ransomware is on the rise, and online users must\u00a0understand\u00a0how to bypass\u00a0these viruses to\u00a0avoid the ramifications of\u00a0a compromised device.\u00a0By understanding online security best practices, users can safeguard their online presence and defend against ransomware threats.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Stay Updated<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">To stay updated on all things\u202f<\/span><a href=\"https:\/\/www.mcafee.com\/en-ca\/index.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">McAfee<\/span><\/a><span data-contrast=\"auto\">\u202fand on top of the latest consumer and mobile security threats, follow\u202f<\/span><a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">@McAfee_Home<\/span><\/a><span data-contrast=\"auto\">\u202fon Twitter, subscribe to\u202four\u202f<\/span><a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/landing-page\/direct\/dr\/social\/generic\/newsletter.html?csrc=social&amp;csrcl2=blog&amp;cctype=newsletter_signup&amp;ccstype=&amp;ccoe=direct&amp;ccoel2=dr&amp;pkg_id=521&amp;affid=0\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">newsletter<\/span><\/a><span data-contrast=\"auto\">, listen to our podcast\u202f<\/span><a href=\"https:\/\/geo.itunes.apple.com\/podcast\/us\/id1257232208?mt=2&amp;at=1010lbVy&amp;ct=mcafeehackable_GaryBlog_EndBlurb\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Hackable?<\/span><\/a><span data-contrast=\"auto\">, and \u2018Like\u2019 us on\u202f<\/span><a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Facebook<\/span><\/a><span data-contrast=\"auto\">.\u202f<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every day you place your personal information in the hands of companies and trust that it will remain safe. However,&#8230;<\/p>\n","protected":false},"author":1228,"featured_media":125966,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[10150,4145,4549,10153],"coauthors":[7231],"class_list":["post-123613","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-cybersecurity-thhreat","tag-data-breach","tag-ransomware","tag-ransomware-scams"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Ransomware Threats Canadians Need to Know | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Every day you place your personal information in the hands of companies and trust that it will remain safe. However, what happens when external threats\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Ransomware Threats Canadians Need to Know | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Every day you place your personal information in the hands of companies and trust that it will remain safe. However, what happens when external threats\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-28T20:00:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-16T09:05:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vishnu Varadaraj\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vishnu Varadaraj\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/\"},\"author\":{\"name\":\"Vishnu Varadaraj\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f8bdc39e3b16d2e2570ece2073b2570a\"},\"headline\":\"5 Ransomware Threats Canadians Need to Know\",\"datePublished\":\"2021-06-28T20:00:16+00:00\",\"dateModified\":\"2024-01-16T09:05:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/\"},\"wordCount\":1551,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"keywords\":[\"cybersecurity thhreat\",\"Data Breach\",\"ransomware\",\"ransomware scams\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/\",\"name\":\"5 Ransomware Threats Canadians Need to Know | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"datePublished\":\"2021-06-28T20:00:16+00:00\",\"dateModified\":\"2024-01-16T09:05:50+00:00\",\"description\":\"Every day you place your personal information in the hands of companies and trust that it will remain safe. However, what happens when external threats\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"width\":300,\"height\":200,\"caption\":\"laptop with a ransomware threat\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"5 Ransomware Threats Canadians Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f8bdc39e3b16d2e2570ece2073b2570a\",\"name\":\"Vishnu Varadaraj\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/4218d9114a5a31272a04c8be649b0a2b\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/02\/vishnu-varadaraj-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/02\/vishnu-varadaraj-96x96.jpg\",\"caption\":\"Vishnu Varadaraj\"},\"description\":\"Vishnu Varadaraj leads product development in the areas of mobile &amp; desktop security services, identity platform and mobile threat research. Vishnu brings more than two decades of experience in building products for consumer markets with a focus on innovation &amp; customer experience. Outside of work Vishnu enjoys swimming, snowboarding, kayaking, etc. depending on the weather.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/vishnuvaradaraj\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/vishnu-varadaraj\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Ransomware Threats Canadians Need to Know | McAfee Blog","description":"Every day you place your personal information in the hands of companies and trust that it will remain safe. However, what happens when external threats","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"5 Ransomware Threats Canadians Need to Know | McAfee Blog","og_description":"Every day you place your personal information in the hands of companies and trust that it will remain safe. However, what happens when external threats","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-06-28T20:00:16+00:00","article_modified_time":"2024-01-16T09:05:50+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","type":"image\/jpeg"}],"author":"Vishnu Varadaraj","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Vishnu Varadaraj","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/"},"author":{"name":"Vishnu Varadaraj","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f8bdc39e3b16d2e2570ece2073b2570a"},"headline":"5 Ransomware Threats Canadians Need to Know","datePublished":"2021-06-28T20:00:16+00:00","dateModified":"2024-01-16T09:05:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/"},"wordCount":1551,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","keywords":["cybersecurity thhreat","Data Breach","ransomware","ransomware scams"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/","name":"5 Ransomware Threats Canadians Need to Know | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","datePublished":"2021-06-28T20:00:16+00:00","dateModified":"2024-01-16T09:05:50+00:00","description":"Every day you place your personal information in the hands of companies and trust that it will remain safe. However, what happens when external threats","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","width":300,"height":200,"caption":"laptop with a ransomware threat"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-ransomware-threats-canadians-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"5 Ransomware Threats Canadians Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/f8bdc39e3b16d2e2570ece2073b2570a","name":"Vishnu Varadaraj","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/4218d9114a5a31272a04c8be649b0a2b","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/02\/vishnu-varadaraj-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/02\/vishnu-varadaraj-96x96.jpg","caption":"Vishnu Varadaraj"},"description":"Vishnu Varadaraj leads product development in the areas of mobile &amp; desktop security services, identity platform and mobile threat research. Vishnu brings more than two decades of experience in building products for consumer markets with a focus on innovation &amp; customer experience. Outside of work Vishnu enjoys swimming, snowboarding, kayaking, etc. depending on the weather.","sameAs":["https:\/\/www.linkedin.com\/in\/vishnuvaradaraj\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/vishnu-varadaraj\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/123613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1228"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=123613"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/123613\/revisions"}],"predecessor-version":[{"id":180421,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/123613\/revisions\/180421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/125966"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=123613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=123613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=123613"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=123613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}