{"id":1006,"date":"2018-06-05T16:03:48","date_gmt":"2018-06-05T16:03:48","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1006"},"modified":"2020-05-06T10:27:05","modified_gmt":"2020-05-06T17:27:05","slug":"hidden-cobra-attacks-again-using-rat-and-smb-malware","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/","title":{"rendered":"Hidden Cobra Attacks Again using RAT and SMB Malware"},"content":{"rendered":"<p>On May 29th, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published two\u00a0<a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-149A\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">joint technical alerts<\/a>\u00a0(JTAs) disclosing and describing threat indicators associated with the Joanap remote access tool (RAT) and the Brambul Server Message Block (SMB) worm. The alert attributes use of these malwares to the North Korean government (PRK) and Hidden Cobra activity. Hidden Cobra is a North Korean state sponsored cyber unit that has been targeting several industries using various sophisticated attacks. This investigation revealed 87 compromised network nodes across 17 countries, and the FBI reports a high level of confidence that compromised devices operating from the IP addresses mentioned in the report are used in ongoing HIDDEN COBRA campaigns.<\/p>\n<p>According to the report, HIDDEN COBRA actors have likely used Joanap and Brambul malware since at least 2009, to target multiple victims including several from the media, aerospace, financial, and critical infrastructure sectors in the United States and globally. Additionally, DHS and the FBI recommend reviewing information related to Joanap and Brambul from the\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.operationblockbuster.com\/wp-content\/uploads\/2016\/02\/Operation-Blockbuster-Destructive-Malware-Report.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Operation Blockbuster Destructive Malware Report<\/a>.<\/p>\n<p><strong>Joanap Remote Access Trojan<\/strong><\/p>\n<p>The Joanap Trojan Backdoor is a remote access tool (RAT) which targets computers running Microsoft Windows operating systems. It has features for peer-to-peer communication, data exfiltration, proxying network traffic, and downloading and executing additional malware which could extend the attackers capabilities. The Joanap RAT is typically downloaded without the system owner\u2019s knowledge as a secondary infection.\u00a0 HIDDEN COBRA and other threat actors often compromise legitimate domains in order to infect systems visiting the site as well as distribute the malware through email.<\/p>\n<p>Notable functions for Joanap include:<\/p>\n<ul>\n<li>its ability to perform process and file management and to coordinate with other nodes<\/li>\n<li>encrypting communication using Rivest Cipher 4.<\/li>\n<li>creating a file at infection stage named mssscardprv.axlog inside the Windows \u201cSystem\u201d directory which it uses to store information including victim host IP address and hostname<\/li>\n<\/ul>\n<p><strong>Brambul SMB Malware<\/strong><\/p>\n<p>Brambul is a Server Message Block (SMB) malware which propagates through brute-force username and password guessing attacks against unsecure SMB shares using a list of predetermined credentials. Dropper malware is typically used to deliver it to the victim\u2019s network in the form of a Portable Executable (PE) file or Dynamic Link Library (DLL.)\u00a0 Upon activation, it attempts contact with victims\u2019 systems on the local subnet and launches the brute-force attack against SMB ports TCP 139 and TCP 445.\u00a0 Brambul is known to have remote control capabilities for command-line input, network propagation, harvesting system information and sending it via email.\u00a0 It may also attempt to determine whether the Remote Desktop Protocol (RDP) is enabled on port TCP 3389 and report this to the attacker via email.<\/p>\n<p><strong>Recommendations and Mitigation<\/strong><\/p>\n<p>DHS and the FBI state that a successful HIDDEN COBRA intrusion could have severe impacts including data breaches, network service disruption, and damage to an organization\u2019s reputation.\u00a0 Security teams and network administrators should use the indicators provided by DHS and the FBI to identify related activity within their own network or their perimeter.\u00a0 When reviewing network activity, organizations may find potentially malicious connections as well as legitimate or benign interactions.<\/p>\n<p>Recommended mitigations include<\/p>\n<ul>\n<li><strong>Stronger access security<\/strong>\u00a0&#8211; Using strong user passwords and limiting user permission to least privileged access<\/li>\n<li><strong>Timely patching<\/strong>\u00a0&#8211; Maintaining up-to-date antivirus signatures, system and software patches from trusted sources<\/li>\n<li>Email filtering &#8211; filtering suspicious or malicious email and attachments<\/li>\n<\/ul>\n<ul>\n<li><strong>DNS Response Policy Zone (RPZ) capability<\/strong>:\u00a0Using RPZ capability on the DNS server to monitor and block any DNS queries to domains known to be part of the attackers\u2019 infrastructure, and readily identify infected systems<\/li>\n<li><strong>Up-to- date threat intelligence<\/strong>\u00a0\u2013 Using aggregated, curated and timely threat intelligence across the entire security infrastructure to maximize protection<\/li>\n<\/ul>\n<p>Infoblox\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/activetrust-suite\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ActiveTrust<\/a>\u00a0protects against cyberattacks using threat intelligence feeds that are proactively curated and contain indicators on evolving threats including ones attributed to Hidden Cobra attacks.<\/p>\n<p><a href=\"http:\/\/info.infoblox.com\/resources-evaluations-activetrust-bundles?utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ActiveTrust<\/a>\u00a0or\u00a0<a href=\"http:\/\/info.infoblox.com\/activetrustcloud?utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ActiveTrust Cloud<\/a>\u00a0free evaluations provide an easy way to try the full featured DNS security solution, either deployed on-premises or delivered as a cloud service.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On May 29th, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published two\u00a0joint technical alerts\u00a0(JTAs) disclosing and describing threat indicators associated with the Joanap remote access tool (RAT) and the Brambul Server Message Block (SMB) worm. The alert attributes use of these malwares to the North Korean government (PRK) and [&hellip;]<\/p>\n","protected":false},"author":262,"featured_media":837,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,32,15,36],"class_list":{"0":"post-1006","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-malware","10":"tag-security","11":"tag-threats","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hidden Cobra Attacks Again using RAT and SMB Malware<\/title>\n<meta name=\"description\" content=\"On May 29th, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published two joint technical alerts (JTAs) disclosing and describing threat indicators associated with the Joanap remote access tool (RAT) and the Brambul Server Message Block (SMB) worm.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hidden Cobra Attacks Again using RAT and SMB Malware\" \/>\n<meta property=\"og:description\" content=\"On May 29th, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published two joint technical alerts (JTAs) disclosing and describing threat indicators associated with the Joanap remote access tool (RAT) and the Brambul Server Message Block (SMB) worm.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-05T16:03:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-511475207.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sean Tierney\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Tierney\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hidden-cobra-attacks-again-using-rat-and-smb-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hidden-cobra-attacks-again-using-rat-and-smb-malware\\\/\"},\"author\":{\"name\":\"Sean Tierney\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/55f054bbb353d75a5e0efe8dc92b284e\"},\"headline\":\"Hidden Cobra Attacks Again using RAT and SMB Malware\",\"datePublished\":\"2018-06-05T16:03:48+00:00\",\"dateModified\":\"2020-05-06T17:27:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hidden-cobra-attacks-again-using-rat-and-smb-malware\\\/\"},\"wordCount\":671,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hidden-cobra-attacks-again-using-rat-and-smb-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-511475207.jpg\",\"keywords\":[\"Infoblox\",\"Malware\",\"Security\",\"Threats\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hidden-cobra-attacks-again-using-rat-and-smb-malware\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hidden-cobra-attacks-again-using-rat-and-smb-malware\\\/\",\"name\":\"Hidden Cobra Attacks Again using RAT and SMB Malware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hidden-cobra-attacks-again-using-rat-and-smb-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hidden-cobra-attacks-again-using-rat-and-smb-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-511475207.jpg\",\"datePublished\":\"2018-06-05T16:03:48+00:00\",\"dateModified\":\"2020-05-06T17:27:05+00:00\",\"description\":\"On May 29th, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published two joint technical alerts (JTAs) disclosing and describing threat indicators associated with the Joanap remote access tool (RAT) and the Brambul Server Message Block (SMB) worm.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hidden-cobra-attacks-again-using-rat-and-smb-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hidden-cobra-attacks-again-using-rat-and-smb-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hidden-cobra-attacks-again-using-rat-and-smb-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-511475207.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-511475207.jpg\",\"width\":660,\"height\":454,\"caption\":\"Would you Buy a Car without Seat Belts?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hidden-cobra-attacks-again-using-rat-and-smb-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hidden Cobra Attacks Again using RAT and SMB Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/55f054bbb353d75a5e0efe8dc92b284e\",\"name\":\"Sean Tierney\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g\",\"caption\":\"Sean Tierney\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/sean-tierney\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hidden Cobra Attacks Again using RAT and SMB Malware","description":"On May 29th, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published two joint technical alerts (JTAs) disclosing and describing threat indicators associated with the Joanap remote access tool (RAT) and the Brambul Server Message Block (SMB) worm.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/","og_locale":"en_US","og_type":"article","og_title":"Hidden Cobra Attacks Again using RAT and SMB Malware","og_description":"On May 29th, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published two joint technical alerts (JTAs) disclosing and describing threat indicators associated with the Joanap remote access tool (RAT) and the Brambul Server Message Block (SMB) worm.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/","og_site_name":"Infoblox Blog","article_published_time":"2018-06-05T16:03:48+00:00","article_modified_time":"2020-05-06T17:27:05+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-511475207.jpg","type":"image\/jpeg"}],"author":"Sean Tierney","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sean Tierney","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/"},"author":{"name":"Sean Tierney","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/55f054bbb353d75a5e0efe8dc92b284e"},"headline":"Hidden Cobra Attacks Again using RAT and SMB Malware","datePublished":"2018-06-05T16:03:48+00:00","dateModified":"2020-05-06T17:27:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/"},"wordCount":671,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-511475207.jpg","keywords":["Infoblox","Malware","Security","Threats"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/","url":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/","name":"Hidden Cobra Attacks Again using RAT and SMB Malware","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-511475207.jpg","datePublished":"2018-06-05T16:03:48+00:00","dateModified":"2020-05-06T17:27:05+00:00","description":"On May 29th, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published two joint technical alerts (JTAs) disclosing and describing threat indicators associated with the Joanap remote access tool (RAT) and the Brambul Server Message Block (SMB) worm.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-511475207.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-511475207.jpg","width":660,"height":454,"caption":"Would you Buy a Car without Seat Belts?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/hidden-cobra-attacks-again-using-rat-and-smb-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Hidden Cobra Attacks Again using RAT and SMB Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/55f054bbb353d75a5e0efe8dc92b284e","name":"Sean Tierney","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g","caption":"Sean Tierney"},"url":"https:\/\/www.infoblox.com\/blog\/author\/sean-tierney\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/262"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1006"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1006\/revisions"}],"predecessor-version":[{"id":1007,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1006\/revisions\/1007"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/837"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}