{"id":46790,"date":"2016-01-05T16:30:18","date_gmt":"2016-01-06T00:30:18","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=46790"},"modified":"2025-06-03T01:25:31","modified_gmt":"2025-06-03T08:25:31","slug":"new-teslacrypt-ransomware-arrives-via-spam","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/","title":{"rendered":"New TeslaCrypt Ransomware Arrives via Spam"},"content":{"rendered":"<p style=\"text-align: left;\">During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Nemucod, a malicious JavaScript that usually arrives as a .zip attachment and tries to download other malware. Nemucod is known to download threats such as\u00a0Fareit, CryptoWall, and others. However, we have now observed that Nemucod is downloading new variants of TeslaCrypt, a file-encrypting ransomware discovered in early 2015.<\/p>\n<p style=\"text-align: left;\">Initially, TeslaCrypt infected systems from a compromised website, using AES encryption and demanding a ransom to decrypt the files. It redirects victims to a site running the\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/new-exploit-kits-improve-evasion-techniques\">Angler exploit kit<\/a>. (For more on Angler, read the\u00a0<em>McAfee Labs Threats Report,<\/em>\u00a0<em>February 2015)<\/em>. McAfee Labs <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/teslacrypt-joins-ransomware-field\/\">blogged about that variant <\/a>in March 2015.<\/p>\n<p>As expected, the attackers have now come up with a new twist to step up TeslaCrypt infections through\u00a0a very strong spam campaign.<strong>\u00a0<\/strong>The attackers are consistently offering more sophisticated malware and social engineering techniques to distribute it. As a consequence, TeslaCrypt has become one of the most prevalent and hazardous threats in circulation.<\/p>\n<h2><strong>Nemucod&#8217;s spam campaign<\/strong><\/h2>\n<p>The new spam campaign contains a .zip file as an attachment. The .zip contains a malicious JavaScript file to evade detection from some email scanners and maximize its outreach. The contents of the email are carefully crafted to lure victims\u00a0using social engineering techniques.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46826\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email-300x290.jpg\" alt=\"Dec2015Tesla-zip attached email\" width=\"346\" height=\"334\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email-300x290.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email.jpg 517w\" sizes=\"auto, (max-width: 346px) 100vw, 346px\" \/><\/p>\n<p>The contents of the JavaScript\u00a0file are highly obfuscated and contain a lot of junk code.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46824\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-obfuscated-JS-295x300.jpg\" alt=\"Dec2015Tesla-obfuscated JS\" width=\"340\" height=\"346\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-obfuscated-JS-295x300.jpg 295w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-obfuscated-JS-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-obfuscated-JS-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-obfuscated-JS.jpg 489w\" sizes=\"auto, (max-width: 340px) 100vw, 340px\" \/><\/p>\n<p>After deobfuscating the contents, the\u00a0code tries to download an executable from whatdidyaysay.com or iamthewinnerhere.com and stores it in the %TEMP% location.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46833\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-deobfuscatedJS-277x300.jpg\" alt=\"Dec2015Tesla-deobfuscatedJS\" width=\"495\" height=\"536\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-deobfuscatedJS-277x300.jpg 277w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-deobfuscatedJS-768x831.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-deobfuscatedJS.jpg 833w\" sizes=\"auto, (max-width: 495px) 100vw, 495px\" \/><\/p>\n<h2><strong>After Nemucod comes W97M downloader<\/strong><\/h2>\n<p>Just one week after Nemucod, we saw new variants of W97M\/Downloader also downloading Teslacrypt. The spam email contains a document file attachment or a .zip attachment containing a document file. Using a fake invoice, attackers try to convince users into opening an attached .doc file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46823\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-doc-attached-email-272x300.jpg\" alt=\"Dec2015Tesla-doc attached email\" width=\"353\" height=\"390\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-doc-attached-email-272x300.jpg 272w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-doc-attached-email.jpg 505w\" sizes=\"auto, (max-width: 353px) 100vw, 353px\" \/><\/p>\n<p>To an unsuspecting user this email\u00a0looks like a legitimate urgent notice about an unpaid invoice, but after taking a closer look we realize it could be a phishing email. The macro code inside attached .doc looks like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46830\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-extracted-macro-300x151.jpg\" alt=\"Dec2015Tesla-extracted macro\" width=\"381\" height=\"192\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-extracted-macro-300x151.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-extracted-macro.jpg 521w\" sizes=\"auto, (max-width: 381px) 100vw, 381px\" \/><\/p>\n<h2 style=\"text-align: left;\"><strong>Looking into the new TeslaCrypt<\/strong><\/h2>\n<p style=\"text-align: left;\">The new variant is TeslaCrypt Version 2.2.0. This version encrypts users&#8217; files and appends the filenames with a .vvv extension. The file extension changes regularly. (The previous version of TeslaCrypt used the file extension .ccc.) TeslaCrypt encrypts files using RSA-4096. The malware also drops two files on the victim\u2019s machine\u2014one plain-text file and an HTML file\u2014containing instructions on how to pay the ransom and receive a decryption key. The ransom message instructs the victim to install the anonymous Tor web browser and visit a Tor website for further instructions.<\/p>\n<p style=\"text-align: left;\">Let&#8217;s dig into the\u00a0code to understand more about this new version. Upon execution, TeslaCrypt\u00a0drops and executes a copy in %AppData% directory and deletes itself.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-46791 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-dropcopy-300x260.jpg\" alt=\"Dec2015Tesla-dropcopy\" width=\"502\" height=\"435\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-dropcopy-300x260.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-dropcopy-768x664.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-dropcopy.jpg 771w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>To ensure only one instance is running, the malware\u00a0creates a mutex as &#8220;2134-1234-1324-2134-1324-2134.&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46815\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-Mutex-1-300x60.jpg\" alt=\"Dec2015Tesla-Mutex\" width=\"480\" height=\"96\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-Mutex-1-300x60.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-Mutex-1.jpg 768w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/p>\n<p>It then sets the EnableLinkedConnections registry to force Windows to automatically make the network drives available to both the standard and administrator accounts. This way, this ransom will be able to search and encrypt files on network drives and shares without any issues.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46807\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-RegEnableLinks-300x209.jpg\" alt=\"Dec2015Tesla-RegEnableLinks\" width=\"474\" height=\"330\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-RegEnableLinks-300x209.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-RegEnableLinks-768x534.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-RegEnableLinks.jpg 775w\" sizes=\"auto, (max-width: 474px) 100vw, 474px\" \/><\/p>\n<p>The malware\u00a0also creates an autostart registry entry to make sure its copy will be executed upon rebooting.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46806\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-RegAutoStart-300x197.jpg\" alt=\"Dec2015Tesla-RegAutoStart\" width=\"480\" height=\"315\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-RegAutoStart-300x197.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-RegAutoStart-768x505.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-RegAutoStart.jpg 770w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/p>\n<p>As with old TeslaCrypt variants, the new one removes the volume shadow copies from the target&#8217;s system, thereby preventing\u00a0the user from restoring the encrypted files. (Shadow copy is a technology in Windows that helps users make backup copies (snapshots) of computer files or volumes.) To delete the shadow volume copies, TeslaCrypt uses the command &#8220;vssadmin.exe Delete Shadows \/All \/Quiet.&#8221; This ransomware uses the vssadmin.exe utility to quietly delete all the shadow volume copies on the computer.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46810\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-vssadmin-300x182.jpg\" alt=\"Dec2015Tesla-vssadmin\" width=\"496\" height=\"301\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-vssadmin-300x182.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-vssadmin-768x466.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-vssadmin.jpg 827w\" sizes=\"auto, (max-width: 496px) 100vw, 496px\" \/><\/p>\n<p>TeslaCrypt\u00a0next\u00a0changes boot configuration data (BCD) by using\u00a0its command-line tool (bcdedit.exe) to disable some features, so victims\u00a0will have a hard time restoring or recovering encrypted files. BCD is a firmware-independent database for boot-time configuration data. It performs the following:<\/p>\n<ul>\n<li>Disables Emergency Management Services (EMS).<\/li>\n<li>Disables the edit and advanced boot options\u00a0at startup.<\/li>\n<li>Disables Windows startup repair and error recovery.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46793\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-bcdedit-300x80.jpg\" alt=\"Dec2015Tesla-bcdedit\" width=\"536\" height=\"143\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-bcdedit-300x80.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-bcdedit-768x204.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-bcdedit.jpg 860w\" sizes=\"auto, (max-width: 536px) 100vw, 536px\" \/><\/p>\n<p>The remote server and configuration details are all encrypted in its body. The ransomware decrypts them first before attempting to connect to them. The following are the decrypted remote URLs found on the sample we analyzed:<\/p>\n<ul>\n<li>http:\/\/atendercrumb.com\/wp-content\/plugins\/theme-check\/misc.php<\/li>\n<li>http:\/\/aumentopenis.org\/wp-content\/plugins\/theme-check\/misc.php<\/li>\n<li>http:\/\/apiercephoto.com\/wp-content\/plugins\/theme-check\/misc.php<\/li>\n<li>http:\/\/austinberean.com\/wp-content\/plugins\/theme-check\/misc.php<\/li>\n<li>http:\/\/attlecostumiers.com\/wp-content\/plugins\/theme-check\/misc.php<\/li>\n<li>http:\/\/athomegirl.com\/wp-content\/plugins\/theme-check\/misc.php<\/li>\n<\/ul>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46795\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-Cnc-300x95.jpg\" alt=\"Dec2015Tesla-Cnc\" width=\"508\" height=\"161\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-Cnc-300x95.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-Cnc-768x243.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-Cnc.jpg 962w\" sizes=\"auto, (max-width: 508px) 100vw, 508px\" \/><\/div>\n<p>This ransomware\u00a0created three malicious threads to perform the following:<\/p>\n<ul>\n<li>Connect to a remote server.\u00a0It also uses &#8220;http:\/\/myexternalip.com\/raw&#8221; to get the user&#8217;s external IP.<\/li>\n<\/ul>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46794\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-checkCnC-300x68.jpg\" alt=\"Dec2015Tesla-checkCnC\" width=\"525\" height=\"119\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-checkCnC-300x68.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-checkCnC-768x174.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-checkCnC-1024x232.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-checkCnC.jpg 1058w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><\/div>\n<div><\/div>\n<ul>\n<li>Terminate processes containing the following strings:\n<ul>\n<li>&#8220;askmg&#8221;: task manager process, taskmgr.ex.<\/li>\n<li>&#8220;rocex&#8221;: process explorer, processxp.exe.<\/li>\n<li>&#8220;egedit&#8221;: registry editor, regedit.exe.<\/li>\n<li>&#8220;sconfi&#8221;: system configuration, msconfig.exe.<\/li>\n<li>&#8220;cmd&#8221;: command-line tool, cmd.exe.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46809\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-terminate-269x300.jpg\" alt=\"Dec2015Tesla-terminate\" width=\"415\" height=\"463\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-terminate-269x300.jpg 269w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-terminate.jpg 674w\" sizes=\"auto, (max-width: 415px) 100vw, 415px\" \/><\/div>\n<ul>\n<li>Enumerate logical\/network drives and shares, and encrypt files.<\/li>\n<\/ul>\n<p>The malware starts by calling the GetLogicalDriveStringsW API and lists all available drives in the system. It searches for the target files to encrypt in all fixed, network, and removable drives.<\/p>\n<div><\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46799\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-GetDrives-300x181.jpg\" alt=\"Dec2015Tesla-GetDrives\" width=\"503\" height=\"303\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-GetDrives-300x181.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-GetDrives-768x463.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-GetDrives.jpg 778w\" sizes=\"auto, (max-width: 503px) 100vw, 503px\" \/><\/div>\n<div><\/div>\n<div><\/div>\n<p>It also enumerates all network shares.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46804\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-network-300x86.jpg\" alt=\"Dec2015Tesla-network\" width=\"467\" height=\"134\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-network-300x86.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-network.jpg 729w\" sizes=\"auto, (max-width: 467px) 100vw, 467px\" \/><\/p>\n<p>Once a resource (drive or share)\u00a0is available, TeslaCrypt\u00a0searches for files to encrypt but avoids the following:<\/p>\n<ul>\n<li>Files from\u00a0%Windows%, %ProgramFiles%, and %AllUsers% directories.<\/li>\n<li>Files containing strings such as &#8220;recove&#8221; and &#8220;.vvv&#8221; to avoid encrypting the &#8220;HowTo_Restore&#8221; instruction files and those already encrypted.<\/li>\n<\/ul>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46798\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-filesearching-300x121.jpg\" alt=\"Dec2015Tesla-filesearching\" width=\"488\" height=\"197\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-filesearching-300x121.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-filesearching-768x309.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-filesearching.jpg 789w\" sizes=\"auto, (max-width: 488px) 100vw, 488px\" \/><\/div>\n<div><\/div>\n<p>TeslaCrypt tries to encrypt files with the following extensions:<\/p>\n<div>\u00a0<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46797\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-ext-300x121.jpg\" alt=\"Dec2015Tesla-ext\" width=\"431\" height=\"174\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-ext-300x121.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-ext-768x309.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-ext.jpg 787w\" sizes=\"auto, (max-width: 431px) 100vw, 431px\" \/><\/div>\n<div><\/div>\n<div><\/div>\n<p>Finally, it creates three &#8220;Howto_Restore&#8221; encrypted files in the %Desktop% directory\u00a0and pop them on\u00a0the victim&#8217;s screen:<\/p>\n<ul>\n<li>Howto_Restore_FILES.TXT<\/li>\n<\/ul>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46802\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-HowTXT-300x262.jpg\" alt=\"Dec2015Tesla-HowTXT\" width=\"445\" height=\"389\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-HowTXT-300x262.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-HowTXT-768x671.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-HowTXT.jpg 874w\" sizes=\"auto, (max-width: 445px) 100vw, 445px\" \/><\/div>\n<ul>\n<li>Howto_Restore_FILES.HTM<\/li>\n<\/ul>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46801\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-HowHTML-260x300.jpg\" alt=\"Dec2015Tesla-HowHTML\" width=\"443\" height=\"511\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-HowHTML-260x300.jpg 260w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-HowHTML-768x888.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-HowHTML.jpg 776w\" sizes=\"auto, (max-width: 443px) 100vw, 443px\" \/><\/div>\n<ul>\n<li>Howto_Restore_FILES.BMP<\/li>\n<\/ul>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-46800\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-HowBMP-300x275.jpg\" alt=\"Dec2015Tesla-HowBMP\" width=\"442\" height=\"405\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-HowBMP-300x275.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-HowBMP-768x704.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-HowBMP.jpg 834w\" sizes=\"auto, (max-width: 442px) 100vw, 442px\" \/><\/div>\n<div><\/div>\n<div><\/div>\n<p>McAfee advises users to keep their antimalware signatures up to date at all times. McAfee products detect the malicious macro, malicious JavaScript, and the TeslaCrypt payload as W97M\/Downloader.aht and JS\/Nemucod.ao, JS\/Nemucod.ap, and Ransom-Tescrypt![Partial hash], respectively,\u00a0with DAT Versions 8025 and later.<\/p>\n<p><em>This post was prepared with the invaluable assistance of Rakesh Sharma and Diwakar Dinkar.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Nemucod, a malicious&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,338,180],"coauthors":[3973],"class_list":["post-46790","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New TeslaCrypt Ransomware Arrives via Spam | McAfee Blog<\/title>\n<meta name=\"description\" content=\"During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Nemucod, a malicious JavaScript that usually arrives as a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New TeslaCrypt Ransomware Arrives via Spam | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Nemucod, a malicious JavaScript that usually arrives as a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-06T00:30:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T08:25:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"517\" \/>\n\t<meta property=\"og:image:height\" content=\"499\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"New TeslaCrypt Ransomware Arrives via Spam\",\"datePublished\":\"2016-01-06T00:30:18+00:00\",\"dateModified\":\"2025-06-03T08:25:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/\"},\"wordCount\":1052,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email-300x290.jpg\",\"keywords\":[\"computer security\",\"cybercrime\",\"endpoint protection\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/\",\"name\":\"New TeslaCrypt Ransomware Arrives via Spam | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email-300x290.jpg\",\"datePublished\":\"2016-01-06T00:30:18+00:00\",\"dateModified\":\"2025-06-03T08:25:31+00:00\",\"description\":\"During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Nemucod, a malicious JavaScript that usually arrives as a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email-300x290.jpg\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email-300x290.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"New TeslaCrypt Ransomware Arrives via Spam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New TeslaCrypt Ransomware Arrives via Spam | McAfee Blog","description":"During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Nemucod, a malicious JavaScript that usually arrives as a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"New TeslaCrypt Ransomware Arrives via Spam | McAfee Blog","og_description":"During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Nemucod, a malicious JavaScript that usually arrives as a","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-01-06T00:30:18+00:00","article_modified_time":"2025-06-03T08:25:31+00:00","og_image":[{"width":517,"height":499,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"New TeslaCrypt Ransomware Arrives via Spam","datePublished":"2016-01-06T00:30:18+00:00","dateModified":"2025-06-03T08:25:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/"},"wordCount":1052,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email-300x290.jpg","keywords":["computer security","cybercrime","endpoint protection","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/","name":"New TeslaCrypt Ransomware Arrives via Spam | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email-300x290.jpg","datePublished":"2016-01-06T00:30:18+00:00","dateModified":"2025-06-03T08:25:31+00:00","description":"During the last couple of weeks, McAfee Labs has observed a huge increase in spam related to Nemucod, a malicious JavaScript that usually arrives as a","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email-300x290.jpg","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Dec2015Tesla-zip-attached-email-300x290.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-teslacrypt-ransomware-arrives-via-spam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"New TeslaCrypt Ransomware Arrives via Spam"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=46790"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46790\/revisions"}],"predecessor-version":[{"id":215003,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46790\/revisions\/215003"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=46790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=46790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=46790"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=46790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}