{"id":67709,"date":"2017-01-05T14:38:38","date_gmt":"2017-01-05T22:38:38","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=67709"},"modified":"2025-08-06T06:47:00","modified_gmt":"2025-08-06T13:47:00","slug":"switcher-malware-2017","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/","title":{"rendered":"How \u2018Switcher\u2019 Malware Moves an Attack from Your Phone to Your Router"},"content":{"rendered":"<p>Why attack one device when you can get inside an entire network and manipulate every device connected to it? That\u2019s \u2018Switcher\u2019 malware\u2019s motto \u2013 the newest Android Trojan threat. It uses unsuspecting Android devices as tools to <a href=\"http:\/\/www.zdnet.com\/article\/this-android-infecting-trojan-malware-uses-your-phone-to-attack-your-router\/\" target=\"_blank\" rel=\"noopener\">redirect all traffic from Wi-Fi connected devices<\/a> on a given network to one owned by a cybercriminal, putting those gadgets directly into the hands of attackers.<\/p>\n<p>The malware variant begins its attack by first infecting an unsuspecting phone by masking itself as a mobile app. Two masks have been seen in use so far: one in which the malware disguises itself as an app for Baidu (the search engine), and another where it appears within an app that locates and shares Wi-Fi information. \u00a0Once in, it then performs brute-force attacks on the router it\u2019s connected to in an attempt to crack its password. If it gets inside successfully, <a href=\"http:\/\/searchsecurity.techtarget.com\/news\/450410127\/Switcher-Android-Trojan-targets-routers-with-rogue-DNS-servers\" target=\"_blank\" rel=\"noopener\">the malware changes the addresses of the DNS server<\/a> (an Internet service that translates\u00a0domain names\u00a0into IP addresses) in the router\u2019s settings. This then reroutes all DNS activity from devices in the attacked Wi-Fi network to the servers of the cybercriminals &#8212; such an attack is also known as <a href=\"https:\/\/www.gohacking.com\/dns-hijacking\/\" target=\"_blank\" rel=\"noopener\">DNS hijacking.<\/a><\/p>\n<p>If a cybercriminal can hijack a DNS server, all devices connected to it (think the mobile phone and laptop connected to your home Wi-Fi network) will unknowingly interact with the malicious server, making them openly susceptible to attack. Meaning, any device connecting to that network at any time could be compromised, leaving mounds of personal data vulnerable.<\/p>\n<p>The good news? Only 1,280 Wi-Fi networks have fallen victim to the attack. The bad news however, is that even if the attack is detected, it can be difficult to remove the infection, thanks to backup servers cybercriminals may have in place.<\/p>\n<p>So how exactly is this attack possible? Two words: default credentials. The \u2018Switcher\u2019 Trojan is said to succeed in its initial infiltration by using a long, predefined list of password and login combinations\u2014a task which is made far too easy if the router still uses easily hackable, default credentials.<\/p>\n<h2>Tips to Fight DNS Attacks<\/h2>\n<p>So, what can you do to stay protected against router-based attacks like these? First off, it\u2019s crucial to change default router passwords so your network\u2014and all devices connected to it\u2014aren\u2019t susceptible to a breach. Remember: if hackers can get into a router, it\u2019s like giving them the keys to your entire, connected kingdom of devices. Here are a few more tips for fighting a DNS hijacking attack, to keep in your back pocket:<\/p>\n<ul>\n<li><strong>Be careful of what devices connect to your network<\/strong>. Just because the \u2018Switcher\u2019 malware isn\u2019t on your phone, doesn\u2019t mean it couldn\u2019t be on a visitor\u2019s Android phone who wishes to connect to your network. Be careful who you give your Wi-Fi password out to you, and make sure you know what devices are connecting to your network. Change your network password often, and make sure it\u2019s long and complex.<\/li>\n<\/ul>\n<ul>\n<li><strong>Lock down your mobile<\/strong>. Since this attack begins by infiltrating a phone, it\u2019s key to ensure your mobile device is protected from all angles. Look to security solutions that lock down your mobile from the inside out, like <a href=\"https:\/\/www.mcafeemobilesecurity.com\/\" target=\"_blank\" rel=\"noopener\">McAfee Mobile Security<\/a>, which detects and blocks malware such as the \u2018Switcher\u2019 strain.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why attack one device when you can get inside an entire network and manipulate every device connected to it? That\u2019s&#8230;<\/p>\n","protected":false},"author":674,"featured_media":129703,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[37,180,4295],"coauthors":[3973],"class_list":["post-67709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-android","tag-malware","tag-mobile"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How \u2018Switcher\u2019 Malware Moves an Attack from Your Phone to Your Router | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Why attack one device when you can manipulate every device connected to an entire network? That\u2019s the Switcher malware motto.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How \u2018Switcher\u2019 Malware Moves an Attack from Your Phone to Your Router | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Why attack one device when you can manipulate every device connected to an entire network? That\u2019s the Switcher malware motto.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-05T22:38:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-06T13:47:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"How \u2018Switcher\u2019 Malware Moves an Attack from Your Phone to Your Router\",\"datePublished\":\"2017-01-05T22:38:38+00:00\",\"dateModified\":\"2025-08-06T13:47:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/\"},\"wordCount\":571,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg\",\"keywords\":[\"android\",\"malware\",\"mobile\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/\",\"name\":\"How \u2018Switcher\u2019 Malware Moves an Attack from Your Phone to Your Router | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg\",\"datePublished\":\"2017-01-05T22:38:38+00:00\",\"dateModified\":\"2025-08-06T13:47:00+00:00\",\"description\":\"Why attack one device when you can manipulate every device connected to an entire network? That\u2019s the Switcher malware motto.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg\",\"width\":614,\"height\":300,\"caption\":\"virus scan looking for malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How \u2018Switcher\u2019 Malware Moves an Attack from Your Phone to Your Router\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How \u2018Switcher\u2019 Malware Moves an Attack from Your Phone to Your Router | McAfee Blog","description":"Why attack one device when you can manipulate every device connected to an entire network? That\u2019s the Switcher malware motto.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How \u2018Switcher\u2019 Malware Moves an Attack from Your Phone to Your Router | McAfee Blog","og_description":"Why attack one device when you can manipulate every device connected to an entire network? That\u2019s the Switcher malware motto.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-01-05T22:38:38+00:00","article_modified_time":"2025-08-06T13:47:00+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"How \u2018Switcher\u2019 Malware Moves an Attack from Your Phone to Your Router","datePublished":"2017-01-05T22:38:38+00:00","dateModified":"2025-08-06T13:47:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/"},"wordCount":571,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg","keywords":["android","malware","mobile"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/","name":"How \u2018Switcher\u2019 Malware Moves an Attack from Your Phone to Your Router | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg","datePublished":"2017-01-05T22:38:38+00:00","dateModified":"2025-08-06T13:47:00+00:00","description":"Why attack one device when you can manipulate every device connected to an entire network? That\u2019s the Switcher malware motto.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg","width":614,"height":300,"caption":"virus scan looking for malware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/switcher-malware-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"How \u2018Switcher\u2019 Malware Moves an Attack from Your Phone to Your Router"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/67709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=67709"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/67709\/revisions"}],"predecessor-version":[{"id":214341,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/67709\/revisions\/214341"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/129703"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=67709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=67709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=67709"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=67709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}