{"id":8210,"date":"2019-06-21T16:00:18","date_gmt":"2019-06-21T10:30:18","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=8210"},"modified":"2020-09-23T13:25:57","modified_gmt":"2020-09-23T07:55:57","slug":"ryuk-ransomware","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/","title":{"rendered":"Ryuk Ransomware"},"content":{"rendered":"<div itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n<meta itemprop=\"name\" content=\"Ryuk Ransomware\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8212\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/06\/ryuk-ransomware.png\" alt=\"Ryuk Ransomware\" width=\"650\" height=\"300\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/06\/ryuk-ransomware.png 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/06\/ryuk-ransomware-300x138.png 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/06\/ryuk-ransomware-225x104.png 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><br \/>\n<meta itemprop=\"datePublished\" content=\"2020-05-29\"><br \/>\n<meta itemprop=\"description\" content=\"Ryuk ransomware gets into a network and spreads from node to node, PC to PC.\">\n<\/div>\n<p><span style=\"color: #000000;\">Ryuk ransomware, a malware program believed to have been utilized in a hijack for a bitcoin-mining botnet that attacked enterprises worldwide is a complex twist on a corrupt and classic malware.<\/span><\/p>\n<p><span style=\"color: #000000;\">Once Ryuk ransomware gets into a network, it automatically spreads from node to node, PC to PC, encrypting significant files along the way with an unbreakable code. Try to access the encoded information, and the Ryuk ransomware presents a ransom note: <\/span><\/p>\n<p><span style=\"color: #000000;\">\u201cStore bitcoin into an anonymous wallet and get a key to decrypt your whole system. Decline to pay, and the files remain locked for good.\u201d<\/span><\/p>\n<p><span style=\"color: #000000;\">The name of Ryuk <a href=\"https:\/\/enterprise.comodo.com\/ransomware-attacks.php\" target=\"_blank\" title=\"Ransomware\">ransomware<\/a> seems to be a reference to a character in the well-known manga and anime series \u201cDeath Note.\u201d In the comics, Ryuk is an evil spirit who, bored with his immortality, chooses to bring into the world a journal that enables its discoverer to kill anybody by writing their name.<\/span><\/p>\n<p><span style=\"color: #000000;\">Most ransomware attacks originate from programs that target countless individuals with infected links or attachments and then request for a little amount of money to open the PCs.<\/span><\/p>\n<h2><span style=\"color: #000000;\">How Ryuk Is Similar To Hermes?<\/span><\/h2>\n<p><span style=\"color: #000000;\">The Ryuk Ransomware hasn&#8217;t been broadly distributed, showing that cautious planning is behind attacks against specific organizations.<\/span><\/p>\n<p><span style=\"color: #000000;\">But while the Ryuk ransomware campaign is new, analysts have found that the code is actually the same as another type of ransomware, the Hermes ransomware.<\/span><\/p>\n<p><span style=\"color: #000000;\">Hermes ransomware has been associated with attacks directed by the North Korean Lazarus hacking group, including when it was used as a diversion for a $60m cyberheist against the Far Eastern International Bank in Taiwan.<\/span><\/p>\n<p><span style=\"color: #000000;\">Analysts inspecting Ryuk ransomware&#8217;s encryption logic have discovered it looks like Hermes to such a degree that it still references Hermes inside the code and that the various instructions and standards are the same in both types of malware, showing identical source codes.<\/span><\/p>\n<p><span style=\"color: #000000;\">That&#8217; s drove us to two potential conclusions: Ryuk Ransomware is crafted by a cybercriminal who has some way or another accessed the Hermes source code, or Ryuk Ransomware might be a case of North Korean programmers re-using code to lead a new campaign.<\/span><\/p>\n<p><span style=\"color: #000000;\">In either case, the specifically targeted attacks and the reconnaissance required in order to conduct them recommends that those behind Ryuk ransomware have sufficient time and assets important to do the campaign. Analysts warn that more attacks will come.<\/span><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<h3><span style=\"color: #000000;\">How Ryuk Ransomware Infects?<\/span><\/h3>\n<p><span style=\"color: #000000;\">The <a href=\"https:\/\/360.comodo.com\/blog\/what-is-ryuk-ransomware\/\" rel=\"noopener\" target=\"_blank\">Ryuk Ransomware infects large enterprises<\/a> after they were recently tainted by discrete malware.<\/span><\/p>\n<p><span style=\"color: #000000;\">In most cases, enterprises are first infected with a powerful trojan called Trickbot. However, smaller enterprises infected by Trickbot rarely suffer as much as their bigger counterparts.<\/span><\/p>\n<p><span style=\"color: #000000;\">Security firms call the methodology used by Ryuk ransomware as \u201cbig-game hunting\u201d and so far its strategies have allowed cybercriminals to generate $3.7m worth of Bitcoin from 52 transactions.<\/span><\/p>\n<p><span style=\"color: #000000;\">What sets Ryuk Ransomware apart from different strains of ransomware is its dwell time. During the period between the installation and the initial contamination of the Ryuk ransomware, cybercriminals have a lot of time to perform reconnaissance inside an infected network which lets them boost the damage done by targeting critical systems after first getting their passwords.<\/span><\/p>\n<h3><span style=\"color: #000000;\">How to be Protected from Ryuk Ransomware Attack?<\/span><\/h3>\n<p><span style=\"color: #000000;\">To secure your enterprise, consider these means: <\/span><\/p>\n<ol>\n<li><span style=\"color: #000000;\">Disable Remote Desktop on each PC on your network. <\/span><\/li>\n<li><span style=\"color: #000000;\">Where you can\u2019t remove Remote Desktop Protocol, replace it with a safe third-party version that gives two-factor authentication. <\/span><\/li>\n<li><span style=\"color: #000000;\">Require two-factor authentication for any progressions to your network devices. Impose a password management approach on your network. <\/span><\/li>\n<li><span style=\"color: #000000;\">Ensure your backups don\u2019t use disk letters or whatever other technique that permits access through the OS.<\/span><\/li>\n<li><span style=\"color: #000000;\">Finally, test the capacity to recover your files to confirm that you have a backup you can use. At that point, store those backups off-site in a physical vault or in a cloud location.<\/span><\/li>\n<\/ol>\n<p><span style=\"color: #000000;\"><a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"_blank\" rel=\"noopener\">Antivirus software<\/a> and different virus protection are both core parts enterprises should be using to secure themselves, but they\u2019re not impenetrable. Ryuk ransomware is capable of filtering for and crippling an assortment of antivirus software. To combat that risk, you should guarantee you\u2019re utilizing antivirus and other tools that furnish you with clear visibility into your networks and can advise you with alerts when suspicious activity is in progress. <\/span><\/p>\n<p><span style=\"color: #000000;\">Ryuk ransomware is a case of its developing prominence with cybercriminals. Security firms expect that these activities will keep on picking up because of the achievement these intrusion operators have had in blackmailing large sums from victim enterprises.<\/span><\/p>\n<p><span style=\"color: #000000;\"><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><br \/>\n<\/span><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" rel=\"noopener\" target=\"_blank\">Website Status<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-checker.php\" rel=\"noopener\" target=\"_blank\">Website Checker<\/a><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener\" target=\"_blank\">Website Backup<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ryuk ransomware, a malware program believed to have been utilized in a hijack for a bitcoin-mining botnet that attacked enterprises worldwide is a complex twist on a corrupt and classic malware. Once Ryuk ransomware gets into a network, it automatically spreads from node to node, PC to PC, encrypting significant files along the way with [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":8211,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[47,356],"class_list":["post-8210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","tag-ransomware","tag-ryuk-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ryuk Ransomware | How to Prevent Ryuk Ransomware Attack?<\/title>\n<meta name=\"description\" content=\"Ryuk ransomware gets into a network and spreads from node to node, PC to PC, encrypting files in the network. Learn the ways to stop ryuk ransomware attack\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ryuk Ransomware | How to Prevent Ryuk Ransomware Attack?\" \/>\n<meta property=\"og:description\" content=\"Ryuk ransomware gets into a network and spreads from node to node, PC to PC, encrypting files in the network. Learn the ways to stop ryuk ransomware attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-21T10:30:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-23T07:55:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/06\/What-is-ryuk-ransomware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/\",\"name\":\"Ryuk Ransomware | How to Prevent Ryuk Ransomware Attack?\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/06\/What-is-ryuk-ransomware.png\",\"datePublished\":\"2019-06-21T10:30:18+00:00\",\"dateModified\":\"2020-09-23T07:55:57+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Ryuk ransomware gets into a network and spreads from node to node, PC to PC, encrypting files in the network. Learn the ways to stop ryuk ransomware attack\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/06\/What-is-ryuk-ransomware.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/06\/What-is-ryuk-ransomware.png\",\"width\":225,\"height\":170,\"caption\":\"What is Ryuk Ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ryuk Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ryuk Ransomware | How to Prevent Ryuk Ransomware Attack?","description":"Ryuk ransomware gets into a network and spreads from node to node, PC to PC, encrypting files in the network. Learn the ways to stop ryuk ransomware attack","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Ryuk Ransomware | How to Prevent Ryuk Ransomware Attack?","og_description":"Ryuk ransomware gets into a network and spreads from node to node, PC to PC, encrypting files in the network. Learn the ways to stop ryuk ransomware attack","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2019-06-21T10:30:18+00:00","article_modified_time":"2020-09-23T07:55:57+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/06\/What-is-ryuk-ransomware.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/","name":"Ryuk Ransomware | How to Prevent Ryuk Ransomware Attack?","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/06\/What-is-ryuk-ransomware.png","datePublished":"2019-06-21T10:30:18+00:00","dateModified":"2020-09-23T07:55:57+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Ryuk ransomware gets into a network and spreads from node to node, PC to PC, encrypting files in the network. Learn the ways to stop ryuk ransomware attack","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/06\/What-is-ryuk-ransomware.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/06\/What-is-ryuk-ransomware.png","width":225,"height":170,"caption":"What is Ryuk Ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/ryuk-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ryuk Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/8210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=8210"}],"version-history":[{"count":20,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/8210\/revisions"}],"predecessor-version":[{"id":15502,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/8210\/revisions\/15502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/8211"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=8210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=8210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=8210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}