{"id":1986,"date":"2017-05-08T16:03:29","date_gmt":"2017-05-08T16:03:29","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1986"},"modified":"2020-05-06T10:28:00","modified_gmt":"2020-05-06T17:28:00","slug":"defending-against-rats-on-your-network","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/","title":{"rendered":"Defending Against RATs on Your Network"},"content":{"rendered":"<p>Recently security researchers have discovered a new malware threat called<a href=\"https:\/\/threatpost.com\/new-fileless-attack-using-dns-queries-to-carry-out-powershell-commands\/124078\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\u00a0DNSMessenger<\/a>, a Remote Access Trojan (RAT) that opens a backdoor so that hackers can control the compromised machine remotely. These controlled machines then form a botnet which can be used to perform DDoS attacks or to steal data, among other malicious activities.<\/p>\n<p>DNSMessenger is an extremely sophisticated malware that is 1) fileless, 2) uses Windows PowerShell and 3) uses DNS to communicate with Command-and-Control (C&amp;C) servers. Being fileless, DNSMessenger can remain undetected &#8211; even if the host machine has traditional antivirus products installed.<\/p>\n<p>The attack employs PowerShell because it offers greater power than what traditional Windows shell commands provide (sounds obvious, right?). But more importantly, the malware uses DNS as its communication channel with its control center, so to speak\u2014or C&amp;C server\u2014to deliver PowerShell binaries into the host machine and to send data out from the compromised host.<\/p>\n<p><strong>Anti-virus Systems on Endpoints may not catch RATs<\/strong><\/p>\n<p>Traditional security systems, including those running at endpoints (for example, antivirus systems) and those deployed at the network perimeter (for example, firewalls) may have a hard time detecting DNSMessenger. As mentioned, being fileless, this particular malware attack can evade detection by antivirus systems. Moreover, perimeter security systems typically do not monitor or filter DNS traffic since DNS is a critical network infrastructure, and DNS traffic is usually regarded as safe\u2014meaning DNSMessenger can remain under stealth.<\/p>\n<p><strong>Need to up Threat Dection at the Core<\/strong><\/p>\n<p>However, next-generation security solutions such as those employing threat intelligence and machine learning analytics may have better results protecting users from sophisticated malware threats like DNSMessenger. Indicators of Compromises can be used to help block a malware attack\u2019s communication with C2 servers so hackers have to change their servers\u2019 IP address or domain name every so often to avoid being cut off from the botnet. Machine learning analytics solutions can compare the suspicious network traffic (DNS traffic in the case of DNSMessenger) against normal traffic to detect those odd behaviors from the malware. Working in tandem with traditional methods, these solutions can provide a layered defense-in-depth approach to organizations who have valuable data inside their network.<\/p>\n<p>Infoblox offers a suite of security solutions including signature-based\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/advanced-dns-protection\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Advanced DNS Protection<\/a>,\u00a0advanced\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/threat-insight\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Threat Intelligence\u00a0<\/a>as part of\u00a0ActiveTrust\u00a0and\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/activetrust-cloud\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ActiveTrust Cloud<\/a>,\u00a0\u00a0and a machine learning behavior analytics solution called Threat Insight,\u00a0also\u00a0as part of Active Trust Cloud.\u00a0Together, they monitor DNS traffic at different check points and disrupt malware communications.\u00a0ActiveTrust Cloud can also now protect against DNSMessenger by using a combination of the techniques mentioned above.\u00a0For more information, please visit\u00a0<a href=\"http:\/\/infoblox.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">infoblox.com<\/a>.<\/p>\n<p><strong>Watch the Video<\/strong><\/p>\n<p>I recently had a chance to host a Facebook Live Session with my colleague, Srikrupa (Krupa) Srivatsan on this topic. You may want to watch to get additional perspectives.<\/p>\n<p><a href=\"https:\/\/www.facebook.com\/Infobloxinc\/videos\/1676412115708259\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">https:\/\/www.facebook.com\/Infobloxinc\/videos\/1676412115708259\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently security researchers have discovered a new malware threat called\u00a0DNSMessenger, a Remote Access Trojan (RAT) that opens a backdoor so that hackers can control the compromised machine remotely. These controlled machines then form a botnet which can be used to perform DDoS attacks or to steal data, among other malicious activities. DNSMessenger is an extremely [&hellip;]<\/p>\n","protected":false},"author":249,"featured_media":1669,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16,15],"class_list":{"0":"post-1986","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Defending Against RATs on Your Network<\/title>\n<meta name=\"description\" content=\"Recently security researchers have discovered a new malware threat called\u00a0DNSMessenger, a Remote Access Trojan (RAT) that opens a backdoor so that hackers can control the compromised machine remotely.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defending Against RATs on Your Network\" \/>\n<meta property=\"og:description\" content=\"Recently security researchers have discovered a new malware threat called\u00a0DNSMessenger, a Remote Access Trojan (RAT) that opens a backdoor so that hackers can control the compromised machine remotely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-08T16:03:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-13.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Philip Quian\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Philip Quian\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/defending-against-rats-on-your-network\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/defending-against-rats-on-your-network\\\/\"},\"author\":{\"name\":\"Philip Quian\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/6a924a7ce4c0b4614b9b69fdeaea7cab\"},\"headline\":\"Defending Against RATs on Your Network\",\"datePublished\":\"2017-05-08T16:03:29+00:00\",\"dateModified\":\"2020-05-06T17:28:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/defending-against-rats-on-your-network\\\/\"},\"wordCount\":480,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/defending-against-rats-on-your-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-13.jpg\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/defending-against-rats-on-your-network\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/defending-against-rats-on-your-network\\\/\",\"name\":\"Defending Against RATs on Your Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/defending-against-rats-on-your-network\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/defending-against-rats-on-your-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-13.jpg\",\"datePublished\":\"2017-05-08T16:03:29+00:00\",\"dateModified\":\"2020-05-06T17:28:00+00:00\",\"description\":\"Recently security researchers have discovered a new malware threat called\u00a0DNSMessenger, a Remote Access Trojan (RAT) that opens a backdoor so that hackers can control the compromised machine remotely.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/defending-against-rats-on-your-network\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/defending-against-rats-on-your-network\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/defending-against-rats-on-your-network\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-13.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-13.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/defending-against-rats-on-your-network\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Defending Against RATs on Your Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/6a924a7ce4c0b4614b9b69fdeaea7cab\",\"name\":\"Philip Quian\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_249_1571768621-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_249_1571768621-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_249_1571768621-96x96.jpg\",\"caption\":\"Philip Quian\"},\"description\":\"Philip Qian is currently a senior product manager in security at Infoblox, Inc. where he manages analytics-based threat detection products. He has more than 15 years of experience in the network security industry, having worked at McAfee and HP ArcSight. He earned a Master of Science degree in Computer Science from University of North Carolina at Chapel Hill.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/philip-quian\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Defending Against RATs on Your Network","description":"Recently security researchers have discovered a new malware threat called\u00a0DNSMessenger, a Remote Access Trojan (RAT) that opens a backdoor so that hackers can control the compromised machine remotely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/","og_locale":"en_US","og_type":"article","og_title":"Defending Against RATs on Your Network","og_description":"Recently security researchers have discovered a new malware threat called\u00a0DNSMessenger, a Remote Access Trojan (RAT) that opens a backdoor so that hackers can control the compromised machine remotely.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/","og_site_name":"Infoblox Blog","article_published_time":"2017-05-08T16:03:29+00:00","article_modified_time":"2020-05-06T17:28:00+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-13.jpg","type":"image\/jpeg"}],"author":"Philip Quian","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Philip Quian","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/"},"author":{"name":"Philip Quian","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/6a924a7ce4c0b4614b9b69fdeaea7cab"},"headline":"Defending Against RATs on Your Network","datePublished":"2017-05-08T16:03:29+00:00","dateModified":"2020-05-06T17:28:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/"},"wordCount":480,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-13.jpg","keywords":["Infoblox","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/","url":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/","name":"Defending Against RATs on Your Network","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-13.jpg","datePublished":"2017-05-08T16:03:29+00:00","dateModified":"2020-05-06T17:28:00+00:00","description":"Recently security researchers have discovered a new malware threat called\u00a0DNSMessenger, a Remote Access Trojan (RAT) that opens a backdoor so that hackers can control the compromised machine remotely.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-13.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-13.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/defending-against-rats-on-your-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Defending Against RATs on Your Network"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/6a924a7ce4c0b4614b9b69fdeaea7cab","name":"Philip Quian","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_249_1571768621-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_249_1571768621-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_249_1571768621-96x96.jpg","caption":"Philip Quian"},"description":"Philip Qian is currently a senior product manager in security at Infoblox, Inc. where he manages analytics-based threat detection products. He has more than 15 years of experience in the network security industry, having worked at McAfee and HP ArcSight. He earned a Master of Science degree in Computer Science from University of North Carolina at Chapel Hill.","url":"https:\/\/www.infoblox.com\/blog\/author\/philip-quian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/249"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1986"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1986\/revisions"}],"predecessor-version":[{"id":1987,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1986\/revisions\/1987"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1669"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}