{"id":94034,"date":"2019-02-04T10:00:12","date_gmt":"2019-02-04T18:00:12","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=94034"},"modified":"2024-02-18T20:20:31","modified_gmt":"2024-02-19T04:20:31","slug":"malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/","title":{"rendered":"MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware"},"content":{"rendered":"<p>McAfee\u2019s Mobile Research team recently learned of a new malicious Android application masquerading as a plugin for a transportation application series developed by a South Korean developer. The series provides a range of information for each region of South Korea, such as bus stop locations, bus arrival times and so on. There are a total of four apps in the series, with three of them available from Google Play since 2013 and the other from around 2017. Currently, all four apps have been removed from Google Play while the fake plugin itself was never uploaded to the store. While analyzing the fake plugin, we were looking for initial downloaders and additional payloads &#8211; we discovered one specific version of each app in the series (uploaded at the same date) which was dropping malware onto the devices on which they were installed, explaining their removal from Google Play after 5 years of development.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94035\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Cached-Google-Play-page.png\" alt=\"\" width=\"707\" height=\"562\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Cached-Google-Play-page.png 707w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Cached-Google-Play-page-300x238.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Cached-Google-Play-page-629x500.png 629w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/p>\n<p><em>Figure 1. Cached Google Play page of Daegu Bus application, one of the apps in series<\/em><\/p>\n<p>When the malicious transportation app is installed, it downloads an additional payload from hacked web servers which includes the fake plugin we originally acquired. After the fake plugin is downloaded and installed, it does something completely different &#8211; it acts as a plugin of the transportation application and installs a trojan on the device, trying to phish users to input their Google account password and completely take control of the device. What is interesting is that the malware uses the native library to take over the device and also deletes the library to hide from detection. It uses names of popular South Korean services like Naver, KakaoTalk, Daum and SKT. According to our telemetry data, the number of infected devices was quite low, suggesting that the final payload was installed to only a small group of targets.<\/p>\n<h2>The Campaign<\/h2>\n<p>The following diagram explains the overall flow from malware distribution to device infection.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94038\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Device-infection-process.png\" alt=\"\" width=\"746\" height=\"591\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Device-infection-process.png 746w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Device-infection-process-300x238.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Device-infection-process-631x500.png 631w\" sizes=\"auto, (max-width: 746px) 100vw, 746px\" \/><\/p>\n<p><em>Figure 2. Device infection process<\/em><\/p>\n<p>When the malicious version of the transportation app is installed, it checks whether the fake plugin is already installed and, if not, downloads from the server and installs it. After that, it downloads and executes an additional native trojan binary which is similar to the trojan which is dropped by the fake plugin. After everything is done, it connects with the C2 servers and handles received commands.<\/p>\n<h2>Initial Downloader<\/h2>\n<p>The following table shows information about the malicious version of each transportation app in the series. As the Google Play number of install stats shows, these apps have been downloaded on many devices.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94061\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Initial-downloader.jpg\" alt=\"\" width=\"822\" height=\"132\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Initial-downloader.jpg 822w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Initial-downloader-300x48.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Initial-downloader-768x123.jpg 768w\" sizes=\"auto, (max-width: 822px) 100vw, 822px\" \/><\/p>\n<p>Unlike the clean version of the app, the malicious version contains a native library named \u201clibAudio3.0.so\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94041\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Transportation-app-version.png\" alt=\"\" width=\"316\" height=\"326\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Transportation-app-version.png 316w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Transportation-app-version-291x300.png 291w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Transportation-app-version-24x24.png 24w\" sizes=\"auto, (max-width: 316px) 100vw, 316px\" \/><\/p>\n<p><em>Figure 3. Transportation app version with malicious native library embedded<\/em><\/p>\n<p>In the BaseMainActivity class of the app, it loads the malicious library and calls startUpdate() and updateApplication().<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94043\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Malicious-library.png\" alt=\"\" width=\"676\" height=\"405\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Malicious-library.png 676w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Malicious-library-300x180.png 300w\" sizes=\"auto, (max-width: 676px) 100vw, 676px\" \/><\/p>\n<p><em>Figure 4. Malicious library being loaded and executed in the app<\/em><\/p>\n<p>startUpdate() checks whether the app is correctly installed by checking for the existence of a specific flag file named \u201cbackground.png\u201d and whether the fake plugin is installed already. If the device is not already infected, the fake plugin is downloaded from a hacked web server and installed after displaying a toast message to the victim. updateApplication() downloads a native binary from the same hacked server and dynamically loads it. The downloaded file (saved as libSound1.1.so) is then deleted after being loaded into memory and, finally, it executes an exported function which acts as a trojan. As previously explained, this file is similar to the file dropped by the fake plugin which is discussed later in this post.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94062\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Additional-payload-download-servers.jpg\" alt=\"\" width=\"822\" height=\"252\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Additional-payload-download-servers.jpg 822w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Additional-payload-download-servers-300x92.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Additional-payload-download-servers-768x235.jpg 768w\" sizes=\"auto, (max-width: 822px) 100vw, 822px\" \/><\/p>\n<p><em>Figure 5 Additional payload download servers<\/em><\/p>\n<h2>Fake Plugin<\/h2>\n<p>The fake plugin is downloaded from a hacked web server with file extension \u201c.mov\u201d to look like a media file. When it is installed and executed, it displays a toast message saying the plugin was successfully installed (in Korean) and calls a native function named playMovie(). The icon for the fake plugin soon disappears from the screen. The native function implemented in LibMovie.so, which is stored inside the asset folder, drops a malicious trojan to the current running app\u2019s directory masquerading as libpng.2.1.so file. The dropped trojan is originally embedded in the LibMovie.so xor&#8217;ed, which is decoded at runtime. After giving permissions, the address of the exported function \u201cLibfunc\u201d in the dropped trojan is dynamically retrieved using dlsym(). The dropped binary in the filesystem is deleted to avoid detection and finally Libfunc is executed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94044\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Toast-message.jpg\" alt=\"\" width=\"636\" height=\"569\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Toast-message.jpg 636w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Toast-message-300x268.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Toast-message-559x500.jpg 559w\" sizes=\"auto, (max-width: 636px) 100vw, 636px\" \/><\/p>\n<p><em>Figure 6 Toast message when malware is installed<\/em><\/p>\n<p>In the other forked process, it tries to access the \u201cnaver.property\u201d file on an installed SD Card, if there is one, and if it succeeds, it tries starting \u201c.KaKaoTalk\u201d activity which displays a Google phishing page (more on that in the next section) . The overall flow of the dropper is explained in the following diagram:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94045\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Execution-flow.png\" alt=\"\" width=\"832\" height=\"548\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Execution-flow.png 832w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Execution-flow-300x198.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Execution-flow-768x506.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Execution-flow-759x500.png 759w\" sizes=\"auto, (max-width: 832px) 100vw, 832px\" \/><\/p>\n<p><em>Figure 7. Execution flow of the dropper<\/em><\/p>\n<p>Following is a snippet of a manifest file showing that \u201c.KaKaoTalk\u201d activity is exported.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94046\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Execution-flow.jpg\" alt=\"\" width=\"800\" height=\"62\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Execution-flow.jpg 800w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Execution-flow-300x23.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Execution-flow-768x60.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><em>Figure 8. Android Manifest defining \u201c.KaKaoTalk\u201d activity as exported<\/em><\/p>\n<h2>Phishing in JavaScript<\/h2>\n<p>KakaoTalk class opens a local HTML file, javapage.html, with the user\u2019s email address registered on the infected device automatically set to log into their account.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94047\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/KakaoTalk-class.jpg\" alt=\"\" width=\"1070\" height=\"491\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/KakaoTalk-class.jpg 1070w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/KakaoTalk-class-300x138.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/KakaoTalk-class-768x352.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/KakaoTalk-class-1024x470.jpg 1024w\" sizes=\"auto, (max-width: 1070px) 100vw, 1070px\" \/><\/p>\n<p><em>Figure 9. KakaoTalk class loads malicious local html file<\/em><\/p>\n<p>The victim\u2019s email address is set to the local page through a JavaScript function setEmailAddress after the page is finished loading. A fake Korean Google login website is displayed:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94048\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Malicious-JavaScript.png\" alt=\"\" width=\"440\" height=\"782\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Malicious-JavaScript.png 440w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Malicious-JavaScript-169x300.png 169w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Malicious-JavaScript-281x500.png 281w\" sizes=\"auto, (max-width: 440px) 100vw, 440px\" \/><\/p>\n<p><em>Figure 10. The malicious JavaScript shows crafted Google login page with user account<\/em><\/p>\n<p>We found the following attempts of exploitation of Google legitimate services by the malware author:<\/p>\n<ul>\n<li>Steal victim&#8217;s Google account and password<\/li>\n<li>Request password recovery for a specific account<\/li>\n<li>Set recovery email address when creating new Google account<\/li>\n<\/ul>\n<p>An interesting element of the phishing attack is that the malware authors tried to set their own email as the recovery address on Google\u2019s legitimate services. For example, when a user clicks on the new Google account creation link in the phishing page, the crafted link is opened with the malware author\u2019s email address as a parameter of RecoveryEmailAddress.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94049\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Crafted-JavaScript.jpg\" alt=\"\" width=\"1432\" height=\"200\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Crafted-JavaScript.jpg 1432w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Crafted-JavaScript-300x42.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Crafted-JavaScript-768x107.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Crafted-JavaScript-1024x143.jpg 1024w\" sizes=\"auto, (max-width: 1432px) 100vw, 1432px\" \/><\/p>\n<p><em>Figure 11. The crafted JavaScript attempts to set recovery email address for new Google account creation.<\/em><\/p>\n<p>Fortunately for end users, none of the above malicious attempts are successful. The parameter with the malware author\u2019s email address is simply ignored at the account creation stage.<\/p>\n<h2>Trojan<\/h2>\n<p>In addition to the Google phishing page, when \u201cLibfunc\u201d function of the trojan (dropped by the fake plugin or downloaded from the server) is executed, the mobile phone is totally compromised. It receives commands from the following hardcoded list of C2 servers. The main functionality of the trojan is implemented in a function called \u201cdoMainProc()\u201d. Please note that there are a few variants of the trojanwith different functionality but, overall, they are pretty much the same.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94051\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/C2-Servers.png\" alt=\"\" width=\"593\" height=\"113\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/C2-Servers.png 593w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/C2-Servers-300x57.png 300w\" sizes=\"auto, (max-width: 593px) 100vw, 593px\" \/><\/p>\n<p><em>Figure 12. Hardcoded list of C2 servers<\/em><\/p>\n<p>The geolocation of hardcoded C2 servers lookslike the following:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94052\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/C2-Server-location.jpg\" alt=\"\" width=\"821\" height=\"298\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/C2-Server-location.jpg 821w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/C2-Server-location-300x109.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/C2-Server-location-768x279.jpg 768w\" sizes=\"auto, (max-width: 821px) 100vw, 821px\" \/><\/p>\n<p><em>Figure 13. Location of C2 Servers<\/em><\/p>\n<p>Inside doMainProc(), the trojan receives commands from the C2 server and calls appropriate handlers. Part of the switch block below gives us an idea of what type of commands this trojan supports.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94053\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Subset-of-command-handlers.jpg\" alt=\"\" width=\"384\" height=\"606\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Subset-of-command-handlers.jpg 384w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Subset-of-command-handlers-190x300.jpg 190w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Subset-of-command-handlers-317x500.jpg 317w\" sizes=\"auto, (max-width: 384px) 100vw, 384px\" \/><\/p>\n<p><em>Figure 14.\u00a0Subset of command handlers implemented in the dropped trojan.<\/em><\/p>\n<p>As you can see, it has all the functionality that a normal trojan has. Downloading, uploading and deleting files on the device, leaking information to a remote server and so on. The following table explains supported C2 commands:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94056\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/C2-Commands-2.jpg\" alt=\"\" width=\"819\" height=\"639\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/C2-Commands-2.jpg 819w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/C2-Commands-2-300x234.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/C2-Commands-2-768x599.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/C2-Commands-2-641x500.jpg 641w\" sizes=\"auto, (max-width: 819px) 100vw, 819px\" \/><\/p>\n<p><em>Figure 15. C2 Commands<\/em><\/p>\n<p>Before entering the command handling loop, the trojan does some initialization, like sending device information files to the server and checking the UID of the device. Only after the UID checking returns a 1 does it enter the loop.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94057\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Connected-servers.jpg\" alt=\"\" width=\"698\" height=\"82\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Connected-servers.jpg 698w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Connected-servers-300x35.jpg 300w\" sizes=\"auto, (max-width: 698px) 100vw, 698px\" \/><\/p>\n<p><em>Figure 16 Servers connected before entering command loop<\/em><\/p>\n<p>Among these commands, directory indexing in particular is important. The directory structure is saved in a file named \u201ckakao.property\u201d and while indexing the given path in the user device, it checks the file with specific keywords and if it matches, uploads the file to the remote upload server. These keywords are Korean and its translated English version is as per the following table:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94063\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Search-file-keywords-1.jpg\" alt=\"\" width=\"792\" height=\"1184\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Search-file-keywords-1.jpg 792w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Search-file-keywords-1-201x300.jpg 201w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Search-file-keywords-1-768x1148.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Search-file-keywords-1-685x1024.jpg 685w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Search-file-keywords-1-334x500.jpg 334w\" sizes=\"auto, (max-width: 792px) 100vw, 792px\" \/><\/p>\n<p><em>Figure 17 Search file keywords<\/em><\/p>\n<p>By looking at the keywords we can anticipate that the malware authors were looking for files related to the military, politics and so on. These files are uploaded to a separate server.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-94059\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Keyword-matching.jpg\" alt=\"\" width=\"700\" height=\"58\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Keyword-matching.jpg 700w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Keyword-matching-300x25.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p><em>Figure 18 Keyword matching file upload server<\/em><\/p>\n<h2>Conclusion<\/h2>\n<p>Applications can easily trick users into installing them before then leaking sensitive information. Also, it is not uncommon to see malware sneaking onto the official Google Play store, making it hard for users to protect their devices. This malware has not been written for ordinary phishing attempts, but rather very targeted attacks, searching the victim\u2019s devices for files related to the military and politics, likely trying to leak confidential information. Users should always install applications that they can fully trust even though they are downloaded from trusted sources.<\/p>\n<p>McAfee Mobile Security detects this threat as Android\/MalBus and alerts mobile users if it is present, while protecting them from any data loss. For more information about McAfee Mobile Security, visit <a href=\"https:\/\/www.mcafeemobilesecurity.com\">https:\/\/www.mcafeemobilesecurity.com<\/a>.<\/p>\n<h2>Hashes (SHA-256)<\/h2>\n<p><strong>Initial Downloader (APK)<\/strong><br \/>\n\u2022 19162b063503105fdc1899f8f653b42d1ff4fcfcdf261f04467fad5f563c0270<br \/>\n\u2022 bed3e665d2b5fd53aab19b8a62035a5d9b169817adca8dfb158e3baf71140ceb<br \/>\n\u2022 3252fbcee2d1aff76a9f18b858231adb741d4dc07e803f640dcbbab96db240f9<br \/>\n\u2022 e71dc11e8609f6fd84b7af78486b05a6f7a2c75ed49a46026e463e9f86877801<\/p>\n<p><strong>Fake Plugin (APK)<\/strong><br \/>\n\u2022 ecb6603a8cd1354c9be236a3c3e7bf498576ee71f7c5d0a810cb77e1138139ec<br \/>\n\u2022 b8b5d82eb25815dd3685630af9e9b0938bccecb3a89ce0ad94324b12d25983f0<\/p>\n<p><strong>Trojan (additional payload)<\/strong><br \/>\n\u2022 b9d9b2e39247744723f72f63888deb191eafa3ffa137a903a474eda5c0c335cf<br \/>\n\u2022 12518eaa24d405debd014863112a3c00a652f3416df27c424310520a8f55b2ec<br \/>\n\u2022 91f8c1f11227ee1d71f096fd97501c17a1361d71b81c3e16bcdabad52bfa5d9f<br \/>\n\u2022 20e6391cf3598a517467cfbc5d327a7bb1248313983cba2b56fd01f8e88bb6b9<\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee\u2019s Mobile Research team recently learned of a new malicious Android application masquerading as a plugin for a transportation application&#8230;<\/p>\n","protected":false},"author":674,"featured_media":93895,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[4322,1814,4452,3952,180,214],"coauthors":[3973],"class_list":["post-94034","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs","tag-app-security","tag-computer-security","tag-cybersecurity","tag-internet-security","tag-malware","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"McAfee\u2019s Mobile Research team recently learned of a new malicious Android application masquerading as a plugin for a transportation application series\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"McAfee\u2019s Mobile Research team recently learned of a new malicious Android application masquerading as a plugin for a transportation application series\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-04T18:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T04:20:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/shutterstock_613160978.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware\",\"datePublished\":\"2019-02-04T18:00:12+00:00\",\"dateModified\":\"2024-02-19T04:20:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/\"},\"wordCount\":1686,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/shutterstock_613160978.jpg\",\"keywords\":[\"app security\",\"computer security\",\"cybersecurity\",\"internet security\",\"malware\",\"mobile security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/\",\"name\":\"MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/shutterstock_613160978.jpg\",\"datePublished\":\"2019-02-04T18:00:12+00:00\",\"dateModified\":\"2024-02-19T04:20:31+00:00\",\"description\":\"McAfee\u2019s Mobile Research team recently learned of a new malicious Android application masquerading as a plugin for a transportation application series\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/shutterstock_613160978.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/shutterstock_613160978.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware After 5 Years of Development\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware | McAfee Blog","description":"McAfee\u2019s Mobile Research team recently learned of a new malicious Android application masquerading as a plugin for a transportation application series","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware | McAfee Blog","og_description":"McAfee\u2019s Mobile Research team recently learned of a new malicious Android application masquerading as a plugin for a transportation application series","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-02-04T18:00:12+00:00","article_modified_time":"2024-02-19T04:20:31+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/shutterstock_613160978.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware","datePublished":"2019-02-04T18:00:12+00:00","dateModified":"2024-02-19T04:20:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/"},"wordCount":1686,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/shutterstock_613160978.jpg","keywords":["app security","computer security","cybersecurity","internet security","malware","mobile security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/","name":"MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/shutterstock_613160978.jpg","datePublished":"2019-02-04T18:00:12+00:00","dateModified":"2024-02-19T04:20:31+00:00","description":"McAfee\u2019s Mobile Research team recently learned of a new malicious Android application masquerading as a plugin for a transportation application series","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/shutterstock_613160978.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/shutterstock_613160978.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malbus-popular-south-korean-bus-app-series-in-google-play-found-dropping-malware-after-5-years-of-development\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"MalBus: Popular South Korean Bus App Series in Google Play Found Dropping Malware After 5 Years of Development"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=94034"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94034\/revisions"}],"predecessor-version":[{"id":182976,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94034\/revisions\/182976"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/93895"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=94034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=94034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=94034"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=94034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}