{"id":40291,"date":"2014-12-22T17:53:05","date_gmt":"2014-12-23T01:53:05","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=40291"},"modified":"2025-06-04T04:08:41","modified_gmt":"2025-06-04T11:08:41","slug":"slow-file-infector-spies-on-victims","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/","title":{"rendered":"Slow File Infector Spies on Victims"},"content":{"rendered":"<p><em style=\"font-family: inherit; font-size: inherit;\">Sourabh Kadam contributed to this blog.<\/em><\/p>\n<p>In the middle of 2012 McAfee Labs observed the complex malware <a href=\"https:\/\/kc.mcafee.com\/resources\/sites\/MCAFEE\/content\/live\/PRODUCT_DOCUMENTATION\/23000\/PD23930\/en_US\/McAfee_Labs_Threat_Advisory_XDocCrypt.pdf\">XDocCrypt <\/a>infecting documents, Excel workbooks, and executable files. Recently we have seen a similar infection method that attacks PDF, MSI (Windows installer), and executables, though the current malware is not as complex as XDocCrypt.<\/p>\n<p>W32\/PDFCrypt is not complex. The coding standards, propagation methods, stealth mechanism, and the payload binaries clearly indicate that this author is a novice.<\/p>\n<p>W32\/PDFCrypt adds selective parasitic capabilities to infect PDF, MSI, and executable files&#8211;the last named setup.exe (all lowercase)&#8211;as shown in the following screen capture, which names the file types that this malware can infect. Infections occur only through removable media and writable mapped network drives. We saw no infections on the local host. Nothing appeared to happen during the first 30 minutes, but then the malware started to work.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/extension_Routine.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-40294 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/extension_Routine.png\" alt=\"extension_Routine\" width=\"796\" height=\"313\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/extension_Routine.png 796w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/extension_Routine-300x117.png 300w\" sizes=\"auto, (max-width: 796px) 100vw, 796px\" \/><\/a><\/p>\n<p>The hijacked original files are compressed using the APLIB compression library. Then the original file is replaced with the infected executable and the compressed data (original file) is added in resource data directory \u201cRT_DATA 2AF8\u201d.<\/p>\n<p>Though coded to infect PDF, MSI, and setup.exe files, we saw active infections only on PDFs. This malware did not have the intelligence to check for the actual file type; rather it just read the file extension.<\/p>\n<p>The malware decompresses the original file (pdf, msi, exe) and copies it to %temp% with a random name. It then executes the original file from %temp% along with the following files. The malware creates these files if they do not exist:<\/p>\n<p>\u2022 %APPDATA%\\SoftwareProtectionPlatform\\sppc.exe<br \/>\n\u2022 %WINDIR%\\SYSTEM32\\wsauth.exe<br \/>\n\u2022 \\temp.exe<\/p>\n<p>Wsauth.exe runs as a service and hides from Windows Explorer by hooking the function NtQueryDirectoryFile in ntdll.dll.<\/p>\n<p>We saw temp.exe, which ensures the host becomes infected, only on removable media. It has the icon of a folder to lure users.<\/p>\n<p>This malware does not ask for any ransom to decompress the original files&#8211;unlike the ransomware CryptoLocker. W32\/PDFCrypt spies on its victims, collecting user data by hooking onto browsers such as Internet Explorer, Firefox, and Chrome.<\/p>\n<h2>The malware gathers the following information from the compromised system:<\/h2>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/sysinfo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-40295\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/sysinfo.png\" alt=\"sysinfo\" width=\"852\" height=\"363\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/sysinfo.png 852w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/sysinfo-300x127.png 300w\" sizes=\"auto, (max-width: 852px) 100vw, 852px\" \/><\/a><\/p>\n<p>After a delay of around 45 minutes, the malware downloaded an old Conficker worm, which McAfee has detected since January 2013.<br \/>\nThe resource data directory contained the following DLLs and corresponding resource IDs.<\/p>\n<table style=\"height: 120px;\" border=\"1\" width=\"217\">\n<tbody>\n<tr>\n<td width=\"117\">\n<p style=\"text-align: left;\"><strong>DLL name<\/strong><\/p>\n<\/td>\n<td width=\"91\"><strong>Resource ID<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"117\">32-bit aplib.dll<\/td>\n<td width=\"91\">6Ah<\/td>\n<\/tr>\n<tr>\n<td width=\"117\">64-bit aplib.dll<\/td>\n<td width=\"91\">6Bh<\/td>\n<\/tr>\n<tr>\n<td width=\"117\">client.dll<\/td>\n<td width=\"91\">65h<\/td>\n<\/tr>\n<tr>\n<td width=\"117\">client64.dll<\/td>\n<td width=\"91\">66h<\/td>\n<\/tr>\n<tr>\n<td width=\"117\">miniresources.dll<\/td>\n<td width=\"91\">69h<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The files client.dll, on 32-bit machines, and client64.dll, on 64-bit machines, are the main infectors. Once in the memory of explorer.exe, this file carries out the complete infection cycle. Client*.dll uses the file *bit aplib.dll to compress the target files. It also runs the file wsauth.exe as a service component.<\/p>\n<p>The miniresource.dll file hosts the icons for PDF and MSI files. The icon and resource information of the original executable is reused by the infected file. Miniresource.dll builds the resource information on the infected executable.<\/p>\n<p>Like Conficker, this malware can generate domains using the Domain Generation Algorithmand uses DNS to check the status of the remote host. Once connected to a live server, the malware downloads further payloads, in our case Conficker. W32\/PDFCrypt can also connect to remote control servers.<\/p>\n<p>This malware is not widespread at this point. We have seen it in very few places around the world. McAfee DATs detect the dropper component. Infected PDF and exe files can be restored using the latest <a href=\"https:\/\/www.mcafee.com\/apps\/mcafee-labs\/beta\/dat-file-updates.aspx\">beta DATs<\/a> and <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-in\/downloads\/free-tools\/stinger.html\">the McAfee Stinger tool<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents,&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,32,3923,180],"coauthors":[3973],"class_list":["post-40291","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-data-protection","tag-email-and-web-security","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Slow File Infector Spies on Victims | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents, Excel workbooks, and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Slow File Infector Spies on Victims | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents, Excel workbooks, and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-23T01:53:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T11:08:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/extension_Routine.png\" \/>\n\t<meta property=\"og:image:width\" content=\"796\" \/>\n\t<meta property=\"og:image:height\" content=\"313\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Slow File Infector Spies on Victims\",\"datePublished\":\"2014-12-23T01:53:05+00:00\",\"dateModified\":\"2025-06-04T11:08:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/\"},\"wordCount\":598,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/extension_Routine.png\",\"keywords\":[\"computer security\",\"cybercrime\",\"data protection\",\"email and web security\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/\",\"name\":\"Slow File Infector Spies on Victims | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/extension_Routine.png\",\"datePublished\":\"2014-12-23T01:53:05+00:00\",\"dateModified\":\"2025-06-04T11:08:41+00:00\",\"description\":\"Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents, Excel workbooks, and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/extension_Routine.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/extension_Routine.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Slow File Infector Spies on Victims\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Slow File Infector Spies on Victims | McAfee Blog","description":"Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents, Excel workbooks, and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Slow File Infector Spies on Victims | McAfee Blog","og_description":"Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents, Excel workbooks, and","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-12-23T01:53:05+00:00","article_modified_time":"2025-06-04T11:08:41+00:00","og_image":[{"width":796,"height":313,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/extension_Routine.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Slow File Infector Spies on Victims","datePublished":"2014-12-23T01:53:05+00:00","dateModified":"2025-06-04T11:08:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/"},"wordCount":598,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/extension_Routine.png","keywords":["computer security","cybercrime","data protection","email and web security","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/","name":"Slow File Infector Spies on Victims | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/extension_Routine.png","datePublished":"2014-12-23T01:53:05+00:00","dateModified":"2025-06-04T11:08:41+00:00","description":"Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents, Excel workbooks, and","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/extension_Routine.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/extension_Routine.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/slow-file-infector-spies-on-victims\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Slow File Infector Spies on Victims"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=40291"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40291\/revisions"}],"predecessor-version":[{"id":215106,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40291\/revisions\/215106"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=40291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=40291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=40291"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=40291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}