{"id":89060,"date":"2018-05-23T14:28:28","date_gmt":"2018-05-23T21:28:28","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=89060"},"modified":"2025-06-08T19:16:01","modified_gmt":"2025-06-09T02:16:01","slug":"vpnfilter-botnet-targets-networking-devices","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/","title":{"rendered":"VPNFilter Botnet Targets Networking Devices"},"content":{"rendered":"<p>VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco <a href=\"https:\/\/blogs.cisco.com\/author\/talos\">Talos<\/a> team recently notified members of the <a href=\"https:\/\/www.cyberthreatalliance.org\/blog\/\">Cyber Threat A<\/a><a href=\"https:\/\/www.cyberthreatalliance.org\/blog\/\">lliance<\/a> (CTA) of its findings and published this <a href=\"https:\/\/blog.talosintelligence.com\/2018\/05\/VPNFilter.html\">blog<\/a>.<\/p>\n<p>The malware is believed to target networking devices, although the malware\u2019s initial infection vector is still unclear. Talos, which first reported this attack, claims that it has impacted at least 500,000 networking devices during the last few years. The malware can persist on infected devices and can steal website credentials and monitor Modbus SCADA protocols. It also implements file collection, command execution, data extraction, and device management and, even worse, it can render some or all of the infected devices unusable.<\/p>\n<p>The known devices affected by VPNFilter are some network-attached storage (NAS) devices such as Linksys, MikroTik, Netgear, and TP-Link networking equipment in the small and home office (SOHO) space, as well at QNAP.<\/p>\n<h2><strong>Malware infection stages<\/strong><\/h2>\n<p>VPNFilter has a three-stage infection.<\/p>\n<p>Stage 1 completes the persistence on the system and uses multiple control mechanisms to find and connect the Stage 2 deployment server.<\/p>\n<p>Stage 2 focuses on file collection, command execution, data extraction, and device management. Some versions possess a self-destruct capability to render itself unusable.<\/p>\n<p>Stage 3 includes two known modules:<\/p>\n<ul>\n<li>A traffic sniffer to steal website credentials and monitor Modbus SCADA protocols<\/li>\n<li>Tor to communicate with anonymous addresses<strong>\u00a0<\/strong><\/li>\n<\/ul>\n<h2><strong>Indicators of compromise and sample hashes<\/strong><\/h2>\n<h4><strong>URLs and IPs<\/strong><\/h4>\n<p>photobucket[.]com\/user\/nikkireed11\/library<br \/>\nphotobucket[.]com\/user\/kmila302\/library<br \/>\nphotobucket[.]com\/user\/lisabraun87\/library<br \/>\nphotobucket[.]com\/user\/eva_green1\/library<br \/>\nphotobucket[.]com\/user\/monicabelci4\/library<br \/>\nphotobucket[.]com\/user\/katyperry45\/library<br \/>\nphotobucket[.]com\/user\/saragray1\/library<br \/>\nphotobucket[.]com\/user\/millerfred\/library<br \/>\nphotobucket[.]com\/user\/jeniferaniston1\/library<br \/>\nphotobucket[.]com\/user\/amandaseyfried1\/library<br \/>\nphotobucket[.]com\/user\/suwe8\/library<br \/>\nphotobucket[.]com\/user\/bob7301\/library<br \/>\ntoknowall[.]com<\/p>\n<p>91.121.109[.]209<br \/>\n217.12.202[.]40<br \/>\n94.242.222[.]68<br \/>\n82.118.242[.]124<br \/>\n46.151.209[.]33<br \/>\n217.79.179[.]14<br \/>\n95.211.198[.]231<br \/>\n195.154.180[.]60<br \/>\n5.149.250[.]54<br \/>\n91.200.13[.]76<br \/>\n94.185.80[.]82<br \/>\n62.210.180[.]229<br \/>\n91.200.13[.]76<br \/>\n91.214.203[.]144<br \/>\n6b57dcnonk2edf5a[.]onion\/bin32\/update.php<br \/>\ntljmmy4vmkqbdof4[.]onion\/bin32\/update.php<br \/>\nzuh3vcyskd4gipkm[.]onion\/bin32\/update.php<br \/>\n6b57dcnonk2edf5a[.]onion\/bin32\/update.php<\/p>\n<h2><strong>File hashes<\/strong><\/h2>\n<ul>\n<li>First-Stage Malware\n<ul>\n<li>50ac4fcd3fbc8abcaa766449841b3a0a684b3e217fc40935f1ac22c34c58a9ec<\/li>\n<li>0e0094d9bd396a6594da8e21911a3982cd737b445f591581560d766755097d92<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>Second-Stage Malware\n<ul>\n<li>9683b04123d7e9fe4c8c26c69b09c2233f7e1440f828837422ce330040782d17<\/li>\n<li>d6097e942dd0fdc1fb28ec1814780e6ecc169ec6d24f9954e71954eedbc4c70e<\/li>\n<li>4b03288e9e44d214426a02327223b5e516b1ea29ce72fa25a2fcef9aa65c4b0b<\/li>\n<li>9eb6c779dbad1b717caa462d8e040852759436ed79cc2172692339bc62432387<\/li>\n<li>37e29b0ea7a9b97597385a12f525e13c3a7d02ba4161a6946f2a7d978cc045b4<\/li>\n<li>776cb9a7a9f5afbaffdd4dbd052c6420030b2c7c3058c1455e0a79df0e6f7a1d<\/li>\n<li>8a20dc9538d639623878a3d3d18d88da8b635ea52e5e2d0c2cce4a8c5a703db1<\/li>\n<li>0649fda8888d701eb2f91e6e0a05a2e2be714f564497c44a3813082ef8ff250b<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>Third-Stage Malware\n<ul>\n<li>f8286e29faa67ec765ae0244862f6b7914fcdde10423f96595cb84ad5cc6b344<\/li>\n<li>afd281639e26a717aead65b1886f98d6d6c258736016023b4e59de30b7348719<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><strong>Coverage and mitigation<\/strong><\/h2>\n<p>The aforementioned IOCs are covered as follows:<\/p>\n<ul>\n<li>Detection names for files: Linux\/VPNFilter and Linux\/VPNFilter.a\n<ul>\n<li>V3 DAT with coverage version: 3353<\/li>\n<li>V2 DAT with coverage version: 8902<\/li>\n<\/ul>\n<\/li>\n<li>All samples are GTI classified as malware<\/li>\n<li>All relevant URLs are GTI classified<\/li>\n<\/ul>\n<p>Further recommendations from the Talos threat research team:<\/p>\n<ul>\n<li>Reboot SOHO routers and NAS devices to remove the potentially destructive, nonpersistent Stage 2 and Stage 3 malware<\/li>\n<li>Work with the manufacturer to ensure that your device is up to date with the latest patches. Apply the updated patches immediately.<\/li>\n<\/ul>\n<p>ISPs should work aggressively with their customers to ensure their devices are patched to the most recent firmware\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.<\/p>\n","protected":false},"author":930,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1411,49,4452,180],"coauthors":[5136],"class_list":["post-89060","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-advanced-persistent-threats","tag-botnet","tag-cybersecurity","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>VPNFilter Botnet Targets Networking Devices | McAfee Blog<\/title>\n<meta name=\"description\" content=\"VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VPNFilter Botnet Targets Networking Devices | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-23T21:28:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T02:16:01+00:00\" \/>\n<meta name=\"author\" content=\"Xiaobing Lin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiaobing Lin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/\"},\"author\":{\"name\":\"Xiaobing Lin\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c37fe7abb0d82dac55d844171aaa775c\"},\"headline\":\"VPNFilter Botnet Targets Networking Devices\",\"datePublished\":\"2018-05-23T21:28:28+00:00\",\"dateModified\":\"2025-06-09T02:16:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/\"},\"wordCount\":625,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"advanced persistent threats\",\"botnet\",\"cybersecurity\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/\",\"name\":\"VPNFilter Botnet Targets Networking Devices | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2018-05-23T21:28:28+00:00\",\"dateModified\":\"2025-06-09T02:16:01+00:00\",\"description\":\"VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"VPNFilter Botnet Targets Networking Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c37fe7abb0d82dac55d844171aaa775c\",\"name\":\"Xiaobing Lin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/3b3a6813ef4a423e0b8050d103d27260\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/72bbcc4a74b07e10e4a1db775bbe4b33?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/72bbcc4a74b07e10e4a1db775bbe4b33?s=96&d=mm&r=g\",\"caption\":\"Xiaobing Lin\"},\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/xiaobing-lin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VPNFilter Botnet Targets Networking Devices | McAfee Blog","description":"VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"VPNFilter Botnet Targets Networking Devices | McAfee Blog","og_description":"VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-05-23T21:28:28+00:00","article_modified_time":"2025-06-09T02:16:01+00:00","author":"Xiaobing Lin","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Xiaobing Lin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/"},"author":{"name":"Xiaobing Lin","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c37fe7abb0d82dac55d844171aaa775c"},"headline":"VPNFilter Botnet Targets Networking Devices","datePublished":"2018-05-23T21:28:28+00:00","dateModified":"2025-06-09T02:16:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/"},"wordCount":625,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["advanced persistent threats","botnet","cybersecurity","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/","name":"VPNFilter Botnet Targets Networking Devices | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2018-05-23T21:28:28+00:00","dateModified":"2025-06-09T02:16:01+00:00","description":"VPNFilter is a botnet with capabilities to support both intelligence collection and destructive cyberattack operations. The Cisco Talos team recently notified members of the Cyber Threat Alliance (CTA) of its findings and published this blog.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vpnfilter-botnet-targets-networking-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"VPNFilter Botnet Targets Networking Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c37fe7abb0d82dac55d844171aaa775c","name":"Xiaobing Lin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/3b3a6813ef4a423e0b8050d103d27260","url":"https:\/\/secure.gravatar.com\/avatar\/72bbcc4a74b07e10e4a1db775bbe4b33?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72bbcc4a74b07e10e4a1db775bbe4b33?s=96&d=mm&r=g","caption":"Xiaobing Lin"},"url":"https:\/\/www.mcafee.com\/blogs\/author\/xiaobing-lin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/89060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/930"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=89060"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/89060\/revisions"}],"predecessor-version":[{"id":215278,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/89060\/revisions\/215278"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=89060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=89060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=89060"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=89060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}