{"id":2006,"date":"2017-07-03T11:17:56","date_gmt":"2017-07-03T11:17:56","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=2006"},"modified":"2020-08-18T23:02:19","modified_gmt":"2020-08-18T17:32:19","slug":"data-destroying-notpetya-masquerades-ransomware","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/","title":{"rendered":"Data Destroying &#8220;NotPetya&#8221; Masquerades as Ransomware"},"content":{"rendered":"<p><strong>Did the NotPetya Ransomware Have More Ulterior Motives?<\/strong><\/p>\n<p>Is the &#8220;NotPetya Ransomware&#8221; much more than a deadly ransomware? Also being called as Petya, ExPetr, SortaPetya, Petrwrap, Goldeneye, Nyetya, &#8220;WannaCry&#8217;s bad cousin&#8221;, etc&#8230;, this global attack has led to shutting down of machines, offices, firms, factories and ports in many countries. Cyber security experts suggest that the <a title=\"\u201dWhat is Ransomware?\" href=\"https:\/\/enterprise.comodo.com\/ransomware-attacks.php\" target=\"_blank\" rel=\"noopener\">&#8220;ransomware&#8221;<\/a> disguise could have been to mislead organizations, cyber security experts, the press and public until a considerable amount of data had been destroyed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2723\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/07\/notpetya-masquerades-ransomware.png\" alt=\"antivirus protection\" width=\"650\" height=\"300\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/07\/notpetya-masquerades-ransomware.png 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/07\/notpetya-masquerades-ransomware-300x138.png 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/07\/notpetya-masquerades-ransomware-225x104.png 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p><strong>A Wiper Rather Than a Ransomware<\/strong><\/p>\n<p>Cyber security analysts poring over its code and how it works inferred that the ransomware threat was just an eyewash. The malware code has &#8220;discrepancies&#8221; (intentional or otherwise) that would prevent decryption of the encrypted data even if the key was available. NotPetya seems to be a &#8220;wiper&#8221; \u2013 a destroyer of data, having no idea of allowing any recovery of data. So, even if a victim was willing to pay the demanded ransom, there was no way of recovering the data. Only solution: Recover from backup.<\/p>\n<p>The NotPetya Ransomware spread worldwide at an alarming rate. Initially, it was believed to be a sophisticated strain of the <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/wannacry-what-it-is-and-how-to-safe-from-all-ransomware\/\" target=\"_blank\" rel=\"noopener\">WannaCry ransomware<\/a> outbreak that had earlier inflicted significant damage affecting networks and systems all over the globe. The reason: NotPetya exploited the same vulnerability in Microsoft Windows operating systems. Later observations, however, revealed that this attack could be a new strain of the Petya encrypting ransomware that had first been detected in 2016.<\/p>\n<p><strong>The NotPetya Strain<\/strong><\/p>\n<p>Once the NotPetya malware enters a system\/machine, it waits for a certain period of time during which period it is believed to be stealing credentials (administrative passwords), studying the network and spreading to other computer systems. Then it restarts the infected computer and during the booting process, it displays a screen that &#8211; &#8220;CHKDSK is running&#8221; -, while actually, it is replacing the computer\u2019s Master Boot Record to prevent the user from accessing the operating system, and then encrypting the Master File Table. NotPetya then goes on to encrypt all data on the disk.<\/p>\n<p><strong>The Capabilities of NotPetya<\/strong><\/p>\n<ul>\n<li>NotPetya has worm capabilities that enable it to spread to other networks utilizing the EternalBlue SMB exploit and EternalRomance exploit.<\/li>\n<li>It can steal administrative passwords using Mimikatz<\/li>\n<li>It can spread within a compromised network through WMIC and PSExec, and<\/li>\n<li>It can encrypt data<\/li>\n<\/ul>\n<p><strong>How the NotPetya Infection was initialized<\/strong><\/p>\n<p>The NotPetya outbreak was initially observed in Ukraine from where it rapidly spread across Europe and then to other continents. Organizations and businesses that have to collaborate with the Ukranian <a href=\"https:\/\/www.comodo.com\/landing\/secure-government-institutions\/\" target=\"_blank\" rel=\"noopener\">government<\/a> have to use an accounting program called \u2013 MEDoc. Preliminary reports state that the attackers injected the malware through MEDoc software&#8217;s update mechanism. Possibly, the attackers had breached the update servers of MEDoc. As the <strong>NotPetya malware<\/strong> had the traits of a worm it spread rapidly across systems connected to the network through corporate VPN. The perpetrators also spread the malware through drive-by download by compromising a Ukrainian government website. The multiple vectors of infection prove the sophistication of the attack.<\/p>\n<p><strong>Prominent Organizations\/Businesses Affected<\/strong><\/p>\n<p>The attackers seem to have targeted enterprises worldwide and more than 65 countries including Ukraine, Russia, U.S., India, and Western Europe have been affected. Prominent victims include the Ukrainian central bank, Ukrainian power companies, Rosneft \u2013 the Russian oil producer, A.P. Moller-Maersk \u2013 the Danish transport and energy company, Borispol Airport, SaintGobain, Merck \u2013 the pharma giant, the DLA Piper law firm in the U.S. and WPP, the world&#8217;s largest advertising company, and others.<\/p>\n<p><strong>The Purpose of the Outbreak<\/strong><\/p>\n<p>There are multiple theories for the purpose of this attack:<\/p>\n<ul>\n<li>Financial gain through ransom<\/li>\n<li>Financial gain through manipulating the bitcoin market<\/li>\n<li>Destroying data<\/li>\n<li>Cyber war \u2013 a nation state-sponsored attack on Ukranian organizations and businesses to destroy data on their computer systems.<\/li>\n<\/ul>\n<p><strong>Ignorance of Patch Updates<\/strong><\/p>\n<p>In March 2017, Microsoft had released the MS17-010 patch update, and many organizations that did not apply those <a href=\"https:\/\/www.itarian.com\/patch-management.php?af=9356\" target=\"_blank\" rel=\"noopener\">software patches<\/a> had been routed by the <strong>WannaCry<a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/petya-ransomware-latest-rival-uncovered\/\" target=\"_blank\" rel=\"noopener\"> ransomware<\/a> attacks<\/strong>. Organizations that have applied this update are quite safe. This attack utilized a modified version of the EternalBlue SMB exploit that was effectively used by WannaCry to spread to other machines. Applying the MS17-010 patch would block the attack.<\/p>\n<p><strong>Preventive Solutions and Vaccine<\/strong><\/p>\n<p>If you have not yet been infected, but suspect\/fear that you may, then<\/p>\n<p>1. Keep your operating system updated<br \/>\n2. Update all applications<br \/>\n3. Back-up your data and store it off-line<br \/>\n4. Try to avoid using high-privilege accounts<br \/>\n5. Educate employees on not to click on attachments<br \/>\n6. Install an <a title=\"Comodo Endpoint Security\" href=\"https:\/\/www.comodo.com\/endpoint-protection\/endpoint-security.php\" target=\"_blank\" rel=\"noopener\">endpoint security solution<\/a> that effectively monitors real-time behavior.<br \/>\n7. Install the vaccine \u2013 create a file named &#8220;perfc&#8221; in the C:\\Windows folder and provide read-only permissions to the file. The malware seems to check for the existence of this file, and if it does then it does not infect that computer.<\/p>\n<p><strong>Effective Long-term Solutions against NotPetya Ransomware<\/strong><\/p>\n<p>Petya, NotPetya, WannaCry, or whatever \u2013 whether it is a wiper, <a href=\"https:\/\/www.comodo.com\/landing\/wannacry-ransomware-endpoints-protection\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a> or any other malware \u2013 an effective preventive solution is needed against existing, evolving and emerging threats. Comodo provides one-of-a-kind robust endpoint security solutions that stop not only the likes of NotPetya or WannaCry but any <a title=\"The Threat Report\" href=\"https:\/\/www.thethreatreport.com\/\" target=\"_blank\" rel=\"noopener\">threat<\/a> through its advanced default-deny and auto-containment technologies.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources<\/strong><br \/>\n<a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-android.php\" target=\"blank\">Antivirus for Android<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Did the NotPetya Ransomware Have More Ulterior Motives? Is the &#8220;NotPetya Ransomware&#8221; much more than a deadly ransomware? Also being called as Petya, ExPetr, SortaPetya, Petrwrap, Goldeneye, Nyetya, &#8220;WannaCry&#8217;s bad cousin&#8221;, etc&#8230;, this global attack has led to shutting down of machines, offices, firms, factories and ports in many countries. Cyber security experts suggest that [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":2724,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[115,109],"class_list":["post-2006","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comodo-news","tag-notpetya-ransomware","tag-ransomware-attack"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Destroying &quot;NotPetya&quot; Masquerades as Ransomware<\/title>\n<meta name=\"description\" content=\"NotPetya seems to be a destroyer of data. This global attack has led to shutting down of machines, firms, factories and ports in many countries. Know more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Destroying &quot;NotPetya&quot; Masquerades as Ransomware\" \/>\n<meta property=\"og:description\" content=\"NotPetya seems to be a destroyer of data. This global attack has led to shutting down of machines, firms, factories and ports in many countries. Know more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-03T11:17:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-18T17:32:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/07\/notpetya.png\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/\",\"name\":\"Data Destroying \\\"NotPetya\\\" Masquerades as Ransomware\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/07\/notpetya.png\",\"datePublished\":\"2017-07-03T11:17:56+00:00\",\"dateModified\":\"2020-08-18T17:32:19+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"NotPetya seems to be a destroyer of data. This global attack has led to shutting down of machines, firms, factories and ports in many countries. Know more!\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/07\/notpetya.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/07\/notpetya.png\",\"width\":225,\"height\":170},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Destroying &#8220;NotPetya&#8221; Masquerades as Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Destroying \"NotPetya\" Masquerades as Ransomware","description":"NotPetya seems to be a destroyer of data. This global attack has led to shutting down of machines, firms, factories and ports in many countries. Know more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Data Destroying \"NotPetya\" Masquerades as Ransomware","og_description":"NotPetya seems to be a destroyer of data. This global attack has led to shutting down of machines, firms, factories and ports in many countries. Know more!","og_url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2017-07-03T11:17:56+00:00","article_modified_time":"2020-08-18T17:32:19+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/07\/notpetya.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/","url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/","name":"Data Destroying \"NotPetya\" Masquerades as Ransomware","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/07\/notpetya.png","datePublished":"2017-07-03T11:17:56+00:00","dateModified":"2020-08-18T17:32:19+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"NotPetya seems to be a destroyer of data. This global attack has led to shutting down of machines, firms, factories and ports in many countries. Know more!","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/07\/notpetya.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/07\/notpetya.png","width":225,"height":170},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/data-destroying-notpetya-masquerades-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Destroying &#8220;NotPetya&#8221; Masquerades as Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/2006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=2006"}],"version-history":[{"count":33,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/2006\/revisions"}],"predecessor-version":[{"id":15000,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/2006\/revisions\/15000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/2724"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=2006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=2006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=2006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}