{"id":9637,"date":"2015-08-24T10:00:31","date_gmt":"2015-08-24T14:00:31","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=9637"},"modified":"2019-11-15T22:57:42","modified_gmt":"2019-11-15T11:57:42","slug":"security-week-34","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/security-week-34\/9637\/","title":{"rendered":"Security Week 34: One cannot simply patch\u2026"},"content":{"rendered":"<p>What a dreadful week this one has been for the infosec industry, my friends. Following an amusing week of <a href=\"https:\/\/www.kaspersky.com.au\/blog\/tag\/blackhat\/\" target=\"_blank\" rel=\"noopener\">discovering bugs<\/a>, zero-days and <a href=\"https:\/\/www.kaspersky.com.au\/blog\/tag\/def-con\/\" target=\"_blank\" rel=\"noopener\">other researcher-coveted curios<\/a>, here comes the painful hangover of seeing all of this infiltrate into the vulnerable software. This is important, but often boredom inducing. Every time our news blog, <a href=\"http:\/\/www.threatpost.com\" target=\"_blank\" rel=\"noopener nofollow\">Threatpost<\/a>, feeds me the freshly baked digest of infosec news with three headlining articles telling stuff about patching, this digest is pretty hard to digest.<\/p>\n<p>Well \u2013 anyway, this stuff is important! One cannot simply find a vulnerability, they say, but what is more difficult is patching it without wrecking it all. One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.<\/p>\n<p>Today\u2019s hit parade features three stories covering bugs which remain woefully unpatched. Once, again, the rules of the road: every week Threatpost\u2019s team hand-picks three important news which I would restlessly comment. All previous editions can be found <a href=\"https:\/\/www.kaspersky.com.au\/blog\/tag\/security-week\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<h3>Another Android bug, now in Google Admin<\/h3>\n<p><a href=\"https:\/\/threatpost.com\/zero-day-in-android-admin-app-can-bypass-sandbox\/114274\" target=\"_blank\" rel=\"noopener nofollow\">The Threatpost story<\/a>. <a href=\"https:\/\/labs.mwrinfosecurity.com\/advisories\/2015\/08\/13\/sandbox-bypass-through-google-admin-webview\/\" target=\"_blank\" rel=\"noopener nofollow\">Research<\/a> by MWR.<\/p>\n<p><em>What was found?<\/em><\/p>\n<p>Have you ever noticed those love letters from bugs are delivered in piles lately? Gee, <a href=\"https:\/\/www.kaspersky.com.au\/blog\/blackhat-jeep-cherokee-hack-explained\/\" target=\"_blank\" rel=\"noopener\">a car got hacked<\/a>? Let\u2019s find <a href=\"https:\/\/www.kaspersky.com.au\/blog\/tesla-s-hacked-and-patched\/\" target=\"_blank\" rel=\"noopener\">a dozen more holes in cars<\/a>! The same pattern is easily noticeable with regard to the latest news around Android. First Stagefright, then a couple of smaller bugs, now this Google Admin and <del>Shawshank redemption<\/del> an escape from sandbox.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/08\/06024309\/security-week-34-kid.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9641\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/08\/06024309\/security-week-34-kid.jpg\" alt=\"Security Week 34: new unpatched vulnerabilities in Android, Mac OS X, Schneider Electric SCADA and more\" width=\"1280\" height=\"853\"><\/a><\/p>\n<p>Google Admin, one of Android\u2019s system-level apps, may accept URLs from other apps and, as it turned to be, any URLs would be fine, even those starting with \u2018file:\/\/\u2019. As a result, a simple networking stuff like downloading web pages starts to evolve into a whole file manager kind of thing. Aren\u2019t all Android apps isolated from each other? Heck no, Google Admin enjoys higher privileges, and by luring it into reading some rogue URL, an app can escape sandbox and access private data.<\/p>\n<p><em>How was that patched?<\/em><\/p>\n<p>First, allow me to brief you on the way independent researched disclosed the vulnerability. It was discovered as far back as March, with a corresponding report submitted to Goggle. Five months later, the researchers once again checked out what was going on only to find the bug remained unpatched. On the 13th of August the information on the bug was publicly disclosed, prompting Google to finally issue the patch.<\/p>\n<p>By the way, Google does have an in-house research team that devotes time and effort to hunting bugs everywhere, not limited to its own software. Google <a href=\"http:\/\/googleprojectzero.blogspot.ru\/\" target=\"_blank\" rel=\"noopener nofollow\">Project Zero<\/a> usually allows for 90 days before going public with the bug, which makes one wonder whether Google is able to patch itself in 90-days\u2019 time, after all.<\/p>\n<p>But with Google Admin, something went terribly wrong: first, something, indeed, was definitely wrong; second, we all know that patching would not necessarily solve the issue on all vulnerable Android devices. <a href=\"https:\/\/threatpost.com\/google-plans-monthly-security-updates-for-nexus-phones\/114148\" target=\"_blank\" rel=\"noopener nofollow\">Monthly security updates<\/a>, you say? How about working on a patch for half-year, heh? Hear, hear.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/08\/06024306\/security-week-34-kitten.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9642\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/08\/06024306\/security-week-34-kitten.jpg\" alt=\"Security Week 34: new unpatched vulnerabilities in Android, Mac OS X, Schneider Electric SCADA and more\" width=\"1280\" height=\"1280\"><\/a><\/p>\n<h3>Open vulnerability in Schneider Electric\u2019s SCADA<\/h3>\n<p><a href=\"https:\/\/threatpost.com\/risky-schneider-electric-scada-vulnerabilities-remain-unpatched\/\" target=\"_blank\" rel=\"noopener nofollow\">The Threatpost story<\/a>. <a href=\"https:\/\/ics-cert.us-cert.gov\/alerts\/ics-alert-15-224-02\" target=\"_blank\" rel=\"noopener nofollow\">ICS-CERT Advisory<\/a>.<\/p>\n<p>Welcome to the fascinating world of critical infrastructure! Please be seated, make yourself comfortable, don\u2019t touch that scary red switch and hands off those wires weirdly sticking out of that thing. Yes, they are meant to stick out. That\u2019s fine. Yep. They\u2019ve been like that for ages. Once you touch them, we are all screwed.<\/p>\n<p>SCADA systems are a part of critical infrastructures that are responsible for handling important stuff like boilers in your apartment building or even nuclear plants. Such systems are not meant to be tampered with, switched off, or reset. Don\u2019t horse around with any parameters, simply, don\u2019t you touch anything!<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Security Week 34: new unpatched #vulnerabilities in #Android, Mac #OSX, Schneider Electric #SCADA and more<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FLW49&amp;text=%23Security+Week+34%3A+new+unpatched+%23vulnerabilities+in+%23Android%2C+Mac+%23OSX%2C+Schneider+Electric+%23SCADA+and+more\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Should you have questions, God forbid to try it on your own, better read <a href=\"https:\/\/securelist.com\/analysis\/publications\/36594\/securing-critical-information-infrastructure-trusted-computing-base\/\" target=\"_blank\" rel=\"noopener\">our article on this topic<\/a>. Meanwhile, let us just admit that, despite of those systems being uber-critical, quite frequently are they deployed on regular PCs running good old Windows. Unlike typical enterprises, which update or replace their hardware and software at least once in five years or so, some industrial facility robot or centrifuge that serves to keep some deadly chemicals apart, might operate 24\/7 for decades on the same hardware.<\/p>\n<p><em>What was found?<\/em><\/p>\n<p>Well, a pile of bugs was found in one of such systems \u2014 Schneider Electric\u2019s <a href=\"http:\/\/www.schneider-electric.com\/en\/product-range\/1468-modicon-m340\/\" target=\"_blank\" rel=\"noopener nofollow\">Modicon M340<\/a> (ah, so romantic!) PLC Station P34 CPU. In a nutshell, this series of vulnerabilities would allow an outsider to gain control over\u2026 well, basically, anything the system would be governing. A quite mainstream flaw was found there (by the way, it is frequently found in a number of routers and IoT stuff), which we call hard-coder credentials.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Risky Schneider Electric SCADA Vulnerabilities Remain Unpatched <a href=\"https:\/\/t.co\/2oGDTbr7qE\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/2oGDTbr7qE<\/a> via <a href=\"https:\/\/twitter.com\/threatpost?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@threatpost<\/a> <a href=\"http:\/\/t.co\/eyPAY6Aikn\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/eyPAY6Aikn<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/633365728075378688?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 17, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Whatever was hard-coded in the industrial SCADA system, remains secret (for obvious reasons, though), but we\u2019d make a brave assumption it was a default login credentials which a vendor provides in order to simplify servicing, or a vendor might have simply forgotten to take a test password out from the code. Or whatever other excuse you want to add.<\/p>\n<p><em>How was it patched?<\/em><\/p>\n<p>It wasn\u2019t. Two solid weeks has gone by since the researcher Aditya Sood presented the vulnerability at <a href=\"https:\/\/www.kaspersky.com.au\/blog\/tag\/def-con\/\" target=\"_blank\" rel=\"noopener\">DEF CON<\/a>, yet the patch is nowhere near. It\u2019s quite understandable: a vendor faces a very uneasy task, since a challenging job of patching vulnerable software becomes even more challenging due to the fact that a customer would be up for significant losses any down time would mean, and at times downtime is simply not possible.<\/p>\n<p>So, how much time would the deployment of the patch take? For how long would the operations be suspended? Will it work then, anyway? Were all the peculiarities of end-point devices taken into consideration? All in all, that\u2019s a royal pain, which, nevertheless, is a lame excuse for not patching the bugs. It was proven a bunch of times that disconnecting critical infrastructure from Internet or protecting it by means of a firewall <a href=\"https:\/\/www.kaspersky.com.au\/blog\/when-going-offline-doesnt-help\/9078\/\" target=\"_blank\" rel=\"noopener\">is not a solution<\/a>.<\/p>\n<div id=\"attachment_9640\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/08\/06024310\/security-week-34-keynote.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-9640\" class=\"size-full wp-image-9640\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/08\/06024310\/security-week-34-keynote.jpg\" alt=\"Security Week 34: new unpatched vulnerabilities in Android, Mac OS X, Schneider Electric SCADA and more\" width=\"640\" height=\"480\"><\/a><p id=\"caption-attachment-9640\" class=\"wp-caption-text\">Developers at the disclosure presentation<\/p><\/div>\n<h3>An unpatched bug in Mac OS X<\/h3>\n<p><a href=\"https:\/\/threatpost.com\/inside-the-unpatched-os-x-vulnerabilities\/114344\" target=\"_blank\" rel=\"noopener nofollow\">The Threatpost story<\/a>.<\/p>\n<p>Once again we are touching upon the subject of responsible disclosure. Talking about the Google bug, the researchers were on a stand-by for five months before going public, even though Google itself limits this time to 90 days. How long should one wait, anyway? How much time would one spare to the developer to close an eye-watering hole?<\/p>\n<p>Wouldn\u2019t sufficient amount of time soften up the developers, so they keep postponing the patch for whatever time necessary? Wouldn\u2019t the immediate publication of the vulnerability motivate the developer to be swift with the patch? Anyway, there is no standard lead-in time, yet everyone agrees that going public with a bug without prior notice to the developer sucks.<\/p>\n<p><em>What was found?<\/em><\/p>\n<p>Here\u2019s one good example of the case when the developer was whether notified, or not, or was, after all, but with a too short notice, so they had no proper time to react\u2026. An 18-year old researcher Luca Todesco published details of a serious vulnerability in Mac OS X Yosemite and Mavericks (10.9.5 \u2014 10.10.5), which allows an attacker to gain root privileges on the exposed machine.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Inside the unpatched OS X vulnerabilities <a href=\"https:\/\/t.co\/4mUVYrtVwa\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/4mUVYrtVwa<\/a><\/p>\n<p>\u2014 Eugene Kaspersky (@e_kaspersky) <a href=\"https:\/\/twitter.com\/e_kaspersky\/status\/634056512868978688?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 19, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The bug is not exploitable remotely: the culprit should lure the user to download and execute an exploit \u2014 something they definitely would be able to succeed at. There\u2019s also a proof of concept available \u2014 just take it and use it.<\/p>\n<p><em>How was it patched?<\/em><\/p>\n<p>Well, it wasn\u2019t yet. According to the researcher, he got no feedback from Apple, hard as he tried many times. The fact of going public with such vulnerability does not worry him: as he says, he just explored a new way of jailbreaking, and that\u2019s it. Not a big deal.<\/p>\n<p>Well, that\u2019s a lousy comparison: jailbreak is something users, who are aware of what exactly they are doing, are voluntarily signing up for. One cannot simply make an iPhone user jailbreak their device, unless the user wants to. As for Todesco\u2019s bug, that\u2019s not always the case. No wonder he was under harsh criticism from his peers:<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Developer reveals Mac security hole without telling Apple <a href=\"http:\/\/t.co\/siVCVIP3Ff\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/siVCVIP3Ff<\/a> <a href=\"http:\/\/t.co\/UUrECGbwJu\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/UUrECGbwJu<\/a><\/p>\n<p>\u2014 Engadget (@engadget) <a href=\"https:\/\/twitter.com\/engadget\/status\/633385331476287489?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 17, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>It remains unclear whether the newly discovered bug affects the new Mac OS X El Capitan. I\u2019m looking forward to the patch.<\/p>\n<h3>What else?<\/h3>\n<p>Microsoft <a href=\"https:\/\/threatpost.com\/emergency-ie-patch-fixes-vulnerability-under-attack\/\" target=\"_blank\" rel=\"noopener nofollow\">patched a bug in Internet Explorer<\/a> (well, at least someone patched something) by issuing an urgent out-of-band patch, the second in this month.<\/p>\n<p>Private data of the Ashley Madison matching website for married people, previously <a href=\"https:\/\/www.kaspersky.com.au\/blog\/cheating-website-hacked\/\" target=\"_blank\" rel=\"noopener\">stolen by hackers<\/a>, now are <a href=\"https:\/\/www.kaspersky.com.au\/blog\/ashley-madison-data-finally-leaked\/\" target=\"_blank\" rel=\"noopener\">online<\/a>, as promised by the group who claimed responsibility for the breach.<\/p>\n<p>https:\/\/twitter.com\/kaspersky\/status\/634349398198218752<\/p>\n<p>Kaspersky Lab <a href=\"https:\/\/securelist.com\/blog\/research\/71876\/new-activity-of-the-blue-termite-apt\/\" target=\"_blank\" rel=\"noopener\">discovered Blue Termite<\/a>, a major cyberintelligence campaign that already claimed a number of victims in Japan. It does not go unnoticed that the cyberspies who have been in action for over two years suddenly intensified their activities this summer as soon as they could lay hands on a Flash exploit which had been leaked as part of a data dump <a href=\"https:\/\/threatpost.com\/apt-group-exploiting-hacking-team-flash-zero-day\/\" target=\"_blank\" rel=\"noopener nofollow\">stolen from The Hacking Team<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"fr\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/BlueTermite?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#BlueTermite<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/APT?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#APT<\/a> exploits <a href=\"https:\/\/twitter.com\/hashtag\/Flash?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Flash<\/a> CVE-2015-5119 exploit to further infection <a href=\"https:\/\/t.co\/Fj0eAJkCTH\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/Fj0eAJkCTH<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/634387066684600320?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 20, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Oldies:<\/h3>\n<p>\u201cJustice\u201d<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/08\/06024345\/infosec-digest-32-book1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-9594 size-medium\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2015\/08\/06024345\/infosec-digest-32-book1-234x300.jpg\" alt=\"Security Week: Doors without locks, invulnerable Microsoft, disassembler and pain\" width=\"234\" height=\"300\"><\/a><\/p>\n<p>Quite dangerous; affects .COM files when called by DOS 43h, 4Bh, 3Dh, 56h functions. The malware is written at the end of the files and alters 5 bytes in the beginning (NOP; NOP; JMP Loc_Virus). The process of compromising COMMAND.COM uses the same method as in the Lehigh virus. Regularly snatches data written on the drive, writing it onto a different sector. Contains the text: \u201cAND JUSTICE FOR ALL\u201d. Hijacks int 13h and int 21h.<\/p>\n<p><em>Quoted from \u201cComputer viruses in MS-DOS\u201d by Eugene Kaspersky, 1992. Page 72.<\/em><\/p>\n<p><em>Disclaimer: this column reflects only the personal opinion of the author. It may coincide with Kaspersky Lab position, or it may not. Depends on luck.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.<\/p>\n","protected":false},"author":53,"featured_media":9639,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2646],"tags":[105,14,882,1213,1191,22,114,398,1212,1211,97,1203,268],"class_list":{"0":"post-9637","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-android","10":"tag-apple","11":"tag-bugs","12":"tag-def-com","13":"tag-defcon23","14":"tag-google","15":"tag-os-x","16":"tag-patches","17":"tag-scada","18":"tag-schneider-electric","19":"tag-security-2","20":"tag-security-week","21":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-week-34\/9637\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security-week-34\/5862\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security-week-34\/6149\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/security-week-34\/6011\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/security-week-34\/6665\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/security-week-34\/6526\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/security-week-34\/8644\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-week-34\/9637\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/security-week-34\/4813\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/security-week-34\/6005\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/security-week-34\/8687\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/security-week-34\/8644\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-week-34\/9637\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/9637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=9637"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/9637\/revisions"}],"predecessor-version":[{"id":24696,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/9637\/revisions\/24696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/9639"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=9637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=9637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=9637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}