{"id":64077,"date":"2016-11-04T13:29:11","date_gmt":"2016-11-04T20:29:11","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=64077"},"modified":"2025-05-28T23:09:34","modified_gmt":"2025-05-29T06:09:34","slug":"cerber-ransomware-now-hunts-databases","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/","title":{"rendered":"Cerber Ransomware Now Hunts for Databases"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is available for purchase as a service (ransomware as a service) on the &#8220;dark net&#8221; as part of an affiliate program. Cerber is part of a turnkey service in which clients share 40% of their profits with the developers. In turn, the Cerber team does all the work on the back end to make it simple for their affiliates to distribute the malware and receive payments from victims, minus the overhead costs.<\/p>\n<p>This update is significant. It expands the capabilities to not only targeted consumers, but now to businesses as well. This shift is the latest trend with the top ransomware families. Attackers have realized that though consumers may pay $300\u2013$500 for their files, businesses will may much more. As most criminals do, they pursue the money.<\/p>\n<h2><strong>Three changes \u00a0<\/strong><\/h2>\n<p>The latest version of Cerber has made three important changes. The malware now alters the extensions of encrypted files to a random four characters. Previously it changed the extension of altered files to .cerber3.\u00a0This adaptation makes it more difficult to scan for affected files. (For more on the extensions, read <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/unfolding-the-mystery-of-cerber-ransomwares-random-file-extension\/\">this McAfee Labs blog.)<\/a><\/p>\n<p>Second, a new HTML executable file displays the ransom note and instructions in a window. It is cleaner, provides links, and is more professional looking. This may give victims more confidence that they are dealing with professionals and should expect to receive a key to unlock their files if they pay.<\/p>\n<p>Finally, and most important, the malware now attempts to stop database processes running on the target system so it can encrypt the data. This is a significant shift in focus from consumers to businesses, which typically run databases containing important operational data. When database files are open and in use by software, they cannot easily be encrypted. Cerber attempts to close the database software so the files can be encrypted.<\/p>\n<h2><strong>Big business\u00a0<\/strong><\/h2>\n<p>Security experts believe Cerber is based in Russia because it avoids systems configured in the Russian language. But it has the rest of the world to target, and it does well. Estimates vary, but profits appear to range from $1 million to $2.5 million per year. In August, Check Point Software and IntSights tracked 161 campaigns active with eight new ones launched every day. In July, they tracked 150,000 new system infections, with an average extortion demand of one Bitcoin.<\/p>\n<h2><strong>Cerber in action<\/strong><\/h2>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/WA4703gENls\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Cerber developers are pushing the next evolution of ransomware by going after database files. Admins, watch your database processes for unexpected stops. It might be an indication of Cerber ransomware trying to undermine file integrity. But that would be the wrong time to consider instituting good backups and applying good security practices.<\/p>\n<p>The best strategic cybersecurity capability process includes elements to Predict, Prevent, Detect, and Respond to risks. This holds true for protection against ransomware. A solid data backup\/restoration capability is important, as is quality antimalware to block attacks. Behavioral controls to educate users will reduce the biggest infection vector: people opening infected phishing emails. Rapid detection and sensors must be present to quickly raise the alarm for variants that cannot be stopped. Recovery teams with clear processes, tools, and backups must then get things back to normal. Ransomware is not easy to defeat, but the first step it to have a comprehensive plan and resources. Cerber and others will continue to evolve. Therefore, your security must be just as agile.<\/p>\n<h2><strong>Resources<\/strong><\/h2>\n<ul>\n<li><a href=\"http:\/\/www.bleepingcomputer.com\/news\/security\/cerber-ransomware-switches-to-a-random-extension-and-ends-database-processes\/\">http:\/\/www.bleepingcomputer.com\/news\/security\/cerber-ransomware-switches-to-a-random-extension-and-ends-database-processes\/<\/a><\/li>\n<li><a href=\"http:\/\/blog.checkpoint.com\/2016\/08\/16\/cerberring\/\" target=\"_blank\" rel=\"noopener\">http:\/\/blog.checkpoint.com\/2016\/08\/16\/cerberring\/<span class=\"screen-reader-text\">Opens in a new window<\/span><\/a><\/li>\n<li><a href=\"http:\/\/www.zdnet.com\/article\/ransomware-as-a-service-for-allows-wannabe-hackers-to-cash-in-on-cyber-extortion\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.zdnet.com\/article\/ransomware-as-a-service-for-allows-wannabe-hackers-to-cash-in-on-cyber-extortion\/<span class=\"screen-reader-text\">Opens in a new window<\/span><\/a><\/li>\n<li><a href=\"http:\/\/www.pcworld.com\/article\/3127815\/cerber-ransomware-kills-database-connections-to-access-important-data.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.pcworld.com\/article\/3127815\/cerber-ransomware-kills-database-connections-to-access-important-data.html<span class=\"screen-reader-text\">Opens in a new window<\/span><\/a><\/li>\n<li><a href=\"http:\/\/virusguides.com\/cerber-ransomware-updated-adds-random-file-extension\/\" target=\"_blank\" rel=\"noopener\">http:\/\/virusguides.com\/cerber-ransomware-updated-adds-random-file-extension\/<span class=\"screen-reader-text\">Opens in a new window<\/span><\/a><\/li>\n<li><a href=\"https:\/\/threatpost.com\/2-5-million-a-year-ransomware-as-a-service-ring-uncovered\/119902\/\" target=\"_blank\" rel=\"noopener\">https:\/\/threatpost.com\/2-5-million-a-year-ransomware-as-a-service-ring-uncovered\/119902\/<span class=\"screen-reader-text\">Opens in a new window<\/span><\/a><\/li>\n<\/ul>\n<p><strong>Image credit<\/strong> and a good write-up: <a href=\"http:\/\/www.bleepingcomputer.com\/news\/security\/cerber-ransomware-switches-to-a-random-extension-and-ends-database-processes\/\">http:\/\/www.bleepingcomputer.com\/news\/security\/cerber-ransomware-switches-to-a-random-extension-and-ends-database-processes\/<\/a><\/p>\n<p>Interested in more?\u00a0 Follow me on\u00a0<a href=\"https:\/\/twitter.com\/Matt_Rosenquist\">Twitter (@Matt_Rosenquist)<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.linkedin.com\/today\/author\/matthewrosenquist\" target=\"_blank\" rel=\"noopener\">LinkedIn<span class=\"screen-reader-text\">Opens in a new window<\/span><\/a>\u00a0to hear insights and what is going on in cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[76,180,4549],"coauthors":[4136],"class_list":["post-64077","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybercrime","tag-malware","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cerber Ransomware Now Hunts for Databases | McAfee Blog<\/title>\n<meta name=\"description\" content=\"&nbsp; Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is available for purchase as a service\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cerber Ransomware Now Hunts for Databases | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is available for purchase as a service\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-04T20:29:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T06:09:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/ransomware.png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Cerber Ransomware Now Hunts for Databases\",\"datePublished\":\"2016-11-04T20:29:11+00:00\",\"dateModified\":\"2025-05-29T06:09:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/\"},\"wordCount\":678,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"cybercrime\",\"malware\",\"ransomware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/\",\"name\":\"Cerber Ransomware Now Hunts for Databases | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2016-11-04T20:29:11+00:00\",\"dateModified\":\"2025-05-29T06:09:34+00:00\",\"description\":\"&nbsp; Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is available for purchase as a service\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cerber Ransomware Now Hunts for Databases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cerber Ransomware Now Hunts for Databases | McAfee Blog","description":"&nbsp; Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is available for purchase as a service","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cerber Ransomware Now Hunts for Databases | McAfee Blog","og_description":"&nbsp; Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is available for purchase as a service","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-11-04T20:29:11+00:00","article_modified_time":"2025-05-29T06:09:34+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/ransomware.png","type":"","width":"","height":""}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Cerber Ransomware Now Hunts for Databases","datePublished":"2016-11-04T20:29:11+00:00","dateModified":"2025-05-29T06:09:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/"},"wordCount":678,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["cybercrime","malware","ransomware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/","name":"Cerber Ransomware Now Hunts for Databases | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2016-11-04T20:29:11+00:00","dateModified":"2025-05-29T06:09:34+00:00","description":"&nbsp; Cerber is one of the most popular ransomware packages. It has upgraded itself to also target databases. It is available for purchase as a service","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-now-hunts-databases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Cerber Ransomware Now Hunts for Databases"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/64077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=64077"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/64077\/revisions"}],"predecessor-version":[{"id":214671,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/64077\/revisions\/214671"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=64077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=64077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=64077"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=64077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}