{"id":64205,"date":"2016-11-08T21:03:49","date_gmt":"2016-11-09T05:03:49","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=64205"},"modified":"2025-06-02T20:54:25","modified_gmt":"2025-06-03T03:54:25","slug":"more-capable-iot-botnets-to-emerge-as-the-pros-enter-the-fray","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/more-capable-iot-botnets-to-emerge-as-the-pros-enter-the-fray\/","title":{"rendered":"More Capable IoT Botnets to Emerge as the &#8216;Pros&#8217; Enter the Fray"},"content":{"rendered":"<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Botnet1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-64206\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Botnet1.jpg\" alt=\"botnet1\" width=\"1000\" height=\"563\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1-300x169.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1-768x432.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1-888x500.jpg 888w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n<p>On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by the Internet of Things (IoT). There are already hundreds of such botnets in the underground hacking ecosystem, from which services, code, and specific attacks can be purchased or acquired. New botnets are being developed to meet the growing demand and to circumvent anticipated security controls.<\/p>\n<h2><strong>The latest IoT botnet<\/strong><\/h2>\n<p>Researchers have <a href=\"http:\/\/blog.malwaremustdie.org\/2016\/10\/mmd-0059-2016-linuxirctelnet-new-ddos.html\" target=\"_blank\" rel=\"noopener\">spotted the new IoT botnet<\/a>\u00a0Linux\/IRCTelnet.\u00a0In just five days, it <a href=\"http:\/\/arstechnica.com\/security\/2016\/11\/new-iot-botnet-that-borrows-from-notorious-mirai-infects-3500-devices\/\" target=\"_blank\" rel=\"noopener\">infected 3,500 devices<\/a> and features an old-school adaptation: using Internet relay chat (IRC) as the control structure. IRC is a very old technology based upon the original chat boards (before the World Wide Web). A\u00a0decade ago many of the first botnets used IRC. It is not particularly difficult for security software to combat, and thus represents a curious choice by the attackers, whom I assume are not top tier (certainly not at the level of nation-states).<\/p>\n<p>Linux\/IRCTelnet is not based upon the popular Mirai IoT DDoS botnet software, but rather on\u00a0<a href=\"http:\/\/www.theregister.co.uk\/2016\/10\/31\/iot_botnet_wannabe\/\" target=\"_blank\" rel=\"noopener\">Aidra code<\/a>. Linux\/IRCTelnet does, however, leverage the default passwords of IoT devices to gain control. It is the easiest path at the moment. Attackers will find other entries once that door closes, so do not imagine we can &#8220;solve&#8221; IoT security with the elimination of default passwords. It is just one chess move in a long game we are begrudgingly forced to play. Although this Linux bot is still new and small, it could hold the potential for more directed attacks and highlights how malware writers are working to differentiate their attack code.<\/p>\n<h2><strong>More targets will arise<\/strong><\/h2>\n<p>We already see a broad range of telecommunications, political, business, Internet infrastructure, and social sites being targeted. The latest is an attack against the national Internet access of\u00a0<a href=\"http:\/\/www.bbc.com\/news\/technology-37859678\" target=\"_blank\" rel=\"noopener\">Liberia<\/a>. Access to the web has been spotty for customers, with attackers at times pushing more than 600Gb\/second of data to choke the network. Most access is provided by the African Coast to Europe undersea cable, and these attacks could affect many other nations in West Africa that rely on this data pipeline.<\/p>\n<h2><strong>What comes next?<\/strong><\/h2>\n<p>Expect more entry-level botnets, many of which will eventually be supplanted by more professional malware. Thus far, most of the IoT botnets have been basic. This will change as more professional and well-funded players emerge.<\/p>\n<p>Look for sophisticated attackers to do the following when they enter the fray:<\/p>\n<ul>\n<li>Patch or change the passwords of the victims&#8217; IoT devices after infection, so others cannot take over their prey.<\/li>\n<li>Set up more sophisticated and concealed control structures to make it more difficult to track bot herders or interfere with their commands.<\/li>\n<li>Implement encrypted communications to the end nodes to conceal instructions, updates, and new targeting instructions.<\/li>\n<li>Begin exploiting vulnerabilities in real-time or standard operating systems on high-end devices to gain more functionality and persistence.<\/li>\n<li>Begin siphoning data from IoT devices, which can be valuable for many purposes, including extending attacks further into homes, businesses, and governments.<\/li>\n<\/ul>\n<p>I predict the next phase of attacks on availability will begin right around the time the industry effectively addresses the default-password weaknesses. Then we&#8217;ll see confidentiality attacks, followed by integrity compromises. Brace for a long fight because IoT devices are <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/top-5-things-know-recent-iot-attacks\/\">highly coveted by attackers.<\/a> This competition will be a major challenge.<\/p>\n<p>&nbsp;<\/p>\n<p>Interested in more? \u00a0Follow me on\u00a0<a href=\"http:\/\/twitter.com\/Matt_Rosenquist\" target=\"_blank\" rel=\"noopener\">Twitter (@Matt_Rosenquist)<\/a>\u00a0and\u00a0<a href=\"http:\/\/www.linkedin.com\/today\/author\/matthewrosenquist\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\u00a0to hear insights and what is going on in cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[4452,4131],"coauthors":[4136],"class_list":["post-64205","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybersecurity","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>More Capable IoT Botnets to Emerge as the &#039;Pros&#039; Enter the Fray | McAfee Blog<\/title>\n<meta name=\"description\" content=\"On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by the Internet of Things (IoT). There\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"More Capable IoT Botnets to Emerge as the &#039;Pros&#039; Enter the Fray | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by the Internet of Things (IoT). There\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-09T05:03:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T03:54:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/more-capable-iot-botnets-to-emerge-as-the-pros-enter-the-fray\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"More Capable IoT Botnets to Emerge as the &#8216;Pros&#8217; Enter the Fray\",\"datePublished\":\"2016-11-09T05:03:49+00:00\",\"dateModified\":\"2025-06-03T03:54:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/more-capable-iot-botnets-to-emerge-as-the-pros-enter-the-fray\/\"},\"wordCount\":588,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Botnet1.jpg\",\"keywords\":[\"cybersecurity\",\"Internet of Things\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/more-capable-iot-botnets-to-emerge-as-the-pros-enter-the-fray\/\",\"url\":\"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist\",\"name\":\"More Capable IoT Botnets to Emerge as the 'Pros' Enter the Fray | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Botnet1.jpg\",\"datePublished\":\"2016-11-09T05:03:49+00:00\",\"dateModified\":\"2025-06-03T03:54:25+00:00\",\"description\":\"On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by the Internet of Things (IoT). There\",\"breadcrumb\":{\"@id\":\"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Botnet1.jpg\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Botnet1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"More Capable IoT Botnets to Emerge as the &#8216;Pros&#8217; Enter the Fray\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"More Capable IoT Botnets to Emerge as the 'Pros' Enter the Fray | McAfee Blog","description":"On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by the Internet of Things (IoT). There","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"More Capable IoT Botnets to Emerge as the 'Pros' Enter the Fray | McAfee Blog","og_description":"On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by the Internet of Things (IoT). There","og_url":"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-11-09T05:03:49+00:00","article_modified_time":"2025-06-03T03:54:25+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/more-capable-iot-botnets-to-emerge-as-the-pros-enter-the-fray\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"More Capable IoT Botnets to Emerge as the &#8216;Pros&#8217; Enter the Fray","datePublished":"2016-11-09T05:03:49+00:00","dateModified":"2025-06-03T03:54:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/more-capable-iot-botnets-to-emerge-as-the-pros-enter-the-fray\/"},"wordCount":588,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Botnet1.jpg","keywords":["cybersecurity","Internet of Things"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/more-capable-iot-botnets-to-emerge-as-the-pros-enter-the-fray\/","url":"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist","name":"More Capable IoT Botnets to Emerge as the 'Pros' Enter the Fray | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#primaryimage"},"image":{"@id":"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Botnet1.jpg","datePublished":"2016-11-09T05:03:49+00:00","dateModified":"2025-06-03T03:54:25+00:00","description":"On the heels of severe distributed denial of service (DDoS) attacks, we see new botnets emerging that are powered by the Internet of Things (IoT). There","breadcrumb":{"@id":"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Botnet1.jpg","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Botnet1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.linkedin.com\/pulse\/new-iot-botnets-emerge-matthew-rosenquist#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"More Capable IoT Botnets to Emerge as the &#8216;Pros&#8217; Enter the Fray"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/64205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=64205"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/64205\/revisions"}],"predecessor-version":[{"id":214986,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/64205\/revisions\/214986"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=64205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=64205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=64205"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=64205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}