{"id":8012,"date":"2019-05-31T16:00:56","date_gmt":"2019-05-31T10:30:56","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=8012"},"modified":"2020-08-26T15:22:03","modified_gmt":"2020-08-26T09:52:03","slug":"dridex-malware","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/","title":{"rendered":"What Is Dridex Malware?"},"content":{"rendered":"<div><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8025\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/05\/dridex.png\" alt=\"Dridex Malware\" width=\"650\" height=\"300\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/05\/dridex.png 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/05\/dridex-300x138.png 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/05\/dridex-225x104.png 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/div>\n<p><span style=\"color: #000000;\">Dridex is an online banking malware used by hackers to steal personal data via HTML injections. Using this malware, hackers steal financial data and other identifiers for users. Dridex malware generally appears as a spam email with a Microsoft Word document attached to it.<\/span><\/p>\n<p><span style=\"color: #000000;\">According to cybersecurity experts, Dridex malware originated from a previous product known as Zeus Trojan Horse. A <a href=\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/\" rel=\"noopener\" target=\"_blank\">trojan horse virus<\/a> looks like a safe product or application but inflicts havoc when it gets downloaded or included in the system, mostly without the end user\u2019s knowledge. Zeus Trojan Horse evolved into Cridex malware, a type of banking malware containing backdoor entry points that is self-replicating and makes room for the entry of other malware products. Dridex epitomizes the evolution into an email spam-carried malware product.<\/span><br \/>\n<span style=\"color: #000000;\">Dridex enters a PC via source programs that carry a trojan payload that you mistakenly install.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Common sources of such programs include:<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\">Mounting infected external drives.<\/span><\/li>\n<li><span style=\"color: #000000;\">Email attachments.<\/span><\/li>\n<li><span style=\"color: #000000;\">Peer-to-peer software sharing.<\/span><\/li>\n<li><span style=\"color: #000000;\">Free illegal software download links.<\/span><\/li>\n<li><span style=\"color: #000000;\">Accidental clicks on suspicious ads.<\/span><\/li>\n<li><span style=\"color: #000000;\">Malicious websites specifically designed to inject Trojan.<\/span><\/li>\n<\/ul>\n<h2><span style=\"color: #000000;\">Symptoms of Dridex Malware<\/span><\/h2>\n<p><span style=\"color: #000000;\">The key symptoms of Dridex malware infection in a PC include:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\"><strong>Registry modifications<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Trojan-Dridex tries to add new registry entries and alter existing ones. Due to this, the victim will gradually notice their computer behaving in an unusual manner.<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Abnormal network activities<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">A Dridex malware infection victim may experience abnormal network activities and slow internet speed because this trojan malware tries to access the victim\u2019s network in order to download other malicious programs.<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Slow computer<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Unknown startup programs downloaded by Dridex malware will cause the victim\u2019s computer to boot up slowly.<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Change in browser settings<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Dridex malware installs malicious files, particularly those that can alter your browser proxy-related settings. This will result in the slowing down of your internet access and the loading of unwanted websites directly in the active browser window or through pop-ups.<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<h2><span style=\"color: #000000;\">How Does Dridex Malware Enter a PC?<\/span><\/h2>\n<p><span style=\"color: #000000;\">In a Dridex malware attack, the victim receives an email that contains an attachment in the form of an Excel document or a Microsoft Word document. This document comes with a payload that downloads the Dridex malware, which is specifically designed for targeting the victim\u2019s online banking details. In these attacks, the victim gets tempted into opening the attachment by using the names of valid companies. Some of these emails may also have an attached invoice indicating that it has come from an online retailer, bank, or a software company.<\/span><\/p>\n<p><span style=\"color: #000000;\">Dridex malware gets installed immediately after the victim opens the attachment that is sent via an email. After getting successfully installed, the attacker goes ahead and executes the following actions:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\">Execute files.<\/span><\/li>\n<li><span style=\"color: #000000;\">Upload files.<\/span><\/li>\n<li><span style=\"color: #000000;\">Download files.<\/span><\/li>\n<li><span style=\"color: #000000;\">Monitor network traffic.<\/span><\/li>\n<li><span style=\"color: #000000;\">Take browser screenshots.<\/span><\/li>\n<li><span style=\"color: #000000;\">Add the compromised computer to a botnet.<\/span><\/li>\n<li><span style=\"color: #000000;\">Download and execute additional files.<\/span><\/li>\n<li><span style=\"color: #000000;\">Download and execute additional modules.<\/span><\/li>\n<li><span style=\"color: #000000;\">Communicate with other peer nodes via the peer-to-peer (P2P) protocol to recover configuration details.<\/span><\/li>\n<li><span style=\"color: #000000;\">Inject self into browser processes for Chrome, Firefox, and Internet Explorer in order to monitor communications and steal data.<\/span><\/li>\n<\/ul>\n<h2><span style=\"color: #000000;\">How to Remove Dridex Malware<\/span><\/h2>\n<p><span style=\"color: #000000;\">It is difficult to manually detect and remove Dridex malware. However, most antivirus programs are capable of doing so. Scanning your computer with antivirus software like Comodo Antivirus software will help remove the Dridex malware and all files infected by it.<\/span><\/p>\n<p><span style=\"color: #000000;\">If your computer is infected with Trojan-Dridex, install <a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"_blank\" rel=\"noopener\">Comodo Antivirus<\/a> to scan and remove the threat. We recommend this antivirus software from Comodo, as it comes along with unique security features that make it one of the <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"_blank\" rel=\"noopener\">best antivirus<\/a> software in the IT security industry. This Comodo virus removal software guarantees complete protection against trojans like Dridex, including viruses, adware, rootkits, backdoors, spyware, <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/\" title=\"Worms\" rel=\"noopener\" target=\"_blank\">worms<\/a>, zero-day threats, and other malware infections.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Key Security Features Offered by Comodo Antivirus include:<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\"><strong>Default Deny Approach<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">This unique approach adopted by Comodo by default prevents all files from entering the PC until they successfully prove themselves to be harmless.<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Containment<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">This technology offered by Comodo backs the default deny approach by \u201crestraining\u201d or \u201ccontaining\u201d files and then running them in a separate environment until they prove themselves to be harmless.<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>VirusScope<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">This technology helps PC users to undo malicious-looking changes that a PC might have recorded due to malicious actors.<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Whitelisting<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">This feature will mark particular files as trustworthy and grant them default access.<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Cloud-Based Behavior Analysis \u2014 Valkyrie<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">This cloud-based behavior analysis system has the potential to keep up with the latest malware.<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Host Intrusion Prevention System (HIPS)<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">HIPS will be able to comprehensively monitor your PC and prevent the entry of malicious attacks. It executes the search by employing a set of behavior analyzers.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\"><strong>Save yourself from Dridex malware, and download Comodo Antivirus today!<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\"><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><br \/>\n<\/span><br \/>\n<br \/>\n<strong><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" rel=\"noopener\" target=\"_blank\"> Website Status <\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/webinspector.com\/blog\/malware-scan\/what-is-website-malware\/\" rel=\"noopener\" target=\"_blank\" Title=\"Website Malware\"> Website malware <\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dridex is an online banking malware used by hackers to steal personal data via HTML injections. Using this malware, hackers steal financial data and other identifiers for users. Dridex malware generally appears as a spam email with a Microsoft Word document attached to it. According to cybersecurity experts, Dridex malware originated from a previous product [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":8020,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[345,344,346],"class_list":["post-8012","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","tag-dridex-banking-trojan","tag-dridex-malware","tag-dridex-malware-removal"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Dridex Malware? | How does Dridex Malware Infect Devices?<\/title>\n<meta name=\"description\" content=\"Dridex Malware is a banking trojan used by hackers to gain control over personal data by using HTML Injections. Prevent Dridex Malware using antivirus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Dridex Malware? | How does Dridex Malware Infect Devices?\" \/>\n<meta property=\"og:description\" content=\"Dridex Malware is a banking trojan used by hackers to gain control over personal data by using HTML Injections. Prevent Dridex Malware using antivirus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-31T10:30:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-26T09:52:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/05\/what-is-dridex.png\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/\",\"name\":\"What is Dridex Malware? | How does Dridex Malware Infect Devices?\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/05\/what-is-dridex.png\",\"datePublished\":\"2019-05-31T10:30:56+00:00\",\"dateModified\":\"2020-08-26T09:52:03+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Dridex Malware is a banking trojan used by hackers to gain control over personal data by using HTML Injections. Prevent Dridex Malware using antivirus.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/05\/what-is-dridex.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/05\/what-is-dridex.png\",\"width\":225,\"height\":170,\"caption\":\"What is Dridex\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Dridex Malware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Dridex Malware? | How does Dridex Malware Infect Devices?","description":"Dridex Malware is a banking trojan used by hackers to gain control over personal data by using HTML Injections. Prevent Dridex Malware using antivirus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/","og_locale":"en_US","og_type":"article","og_title":"What is Dridex Malware? | How does Dridex Malware Infect Devices?","og_description":"Dridex Malware is a banking trojan used by hackers to gain control over personal data by using HTML Injections. Prevent Dridex Malware using antivirus.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2019-05-31T10:30:56+00:00","article_modified_time":"2020-08-26T09:52:03+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/05\/what-is-dridex.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/","name":"What is Dridex Malware? | How does Dridex Malware Infect Devices?","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/05\/what-is-dridex.png","datePublished":"2019-05-31T10:30:56+00:00","dateModified":"2020-08-26T09:52:03+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Dridex Malware is a banking trojan used by hackers to gain control over personal data by using HTML Injections. Prevent Dridex Malware using antivirus.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/05\/what-is-dridex.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/05\/what-is-dridex.png","width":225,"height":170,"caption":"What is Dridex"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/dridex-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is Dridex Malware?"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/8012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=8012"}],"version-history":[{"count":27,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/8012\/revisions"}],"predecessor-version":[{"id":15235,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/8012\/revisions\/15235"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/8020"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=8012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=8012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=8012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}