{"id":2170,"date":"2015-11-18T18:52:10","date_gmt":"2015-11-18T18:52:10","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2170"},"modified":"2020-05-06T10:30:07","modified_gmt":"2020-05-06T17:30:07","slug":"exploit-kits-the-automation-of-cybercrime","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/","title":{"rendered":"Exploit Kits &#8211; The Automation of Cybercrime"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2173\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/anglerfishdimensions.jpg\" alt=\"\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/anglerfishdimensions.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/anglerfishdimensions-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>Today, we\u2019re unveiling the Infoblox DNS Threat Index &#8211;\u00a0<a href=\"http:\/\/www.infoblox.com\/dns-threat-index?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.infoblox.com\/dns-threat-index<\/a>, powered by IID, for the third quarter of 2015. The most alarming statistic in this quarter\u2019s report is a surge in creation of Domain Name System (DNS) infrastructure for exploit kits \u2013 up 75 percent from the same period a year ago.<\/p>\n<p>Exploit kits are such a big concern because they represent the automation of cybercrime. These pre-packaged collections of malware can be created by sophisticated hackers and then sold or rented out to petty criminals who want can use them to attack businesses, schools or government agencies \u2013 with little experience required.<\/p>\n<p>The main function of exploit kits is delivering a malicious payload onto a computer or mobile device. The payload can encrypt a device\u2019s data to hold it for ransom, quietly exfiltrate data, crash networks, and unleash other forms of mayhem.<\/p>\n<p>Exploit kits are tough to stop because they often take advantage of zero-day vulnerabilities, as well as security holes in popular operating systems or software. Users are lured through phishing emails or malicious advertising to visit a compromised website. When a user \u201cdrives by\u201d this site, the payload is delivered.<\/p>\n<p>According to the Infoblox DNS Threat Index, Angler is the most widely used exploit kit. Recently, a major British newspaper, which has hundreds of millions of monthly visits to its website, was hit with Angler.\u00a0This attack resulted in malicious ads being displayed for a period of four to five days, exposing visitors to infection if they clicked on those ads.<\/p>\n<p>Last month, Cisco&#8217;s Talos security group reported disrupting a major part of the Angler network infrastructure, including the servers of a targeted service provider, as described in this\u00a0<a href=\"http:\/\/blogs.cisco.com\/security\/talos\/angler-exposed\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">blog<\/a>. The malicious operation generated an estimated $30 million annually for the perpetrators \u2013 proof that cybercrime pays, at least in short bursts. Although the exploit kit infrastructure was disrupted, it is likely just a matter of time before hackers rebuild and resume operations.<\/p>\n<p>Protecting your applications and data from exploit kits requires proper security training for employees along with processes for risk management and mitigation. Employees need to know what traps to avoid, such as emails that don\u2019t seem quite right and dodgy websites. Networking and security teams need to go beyond traditional perimeter defenses to address what happens once malware gets inside the network.<\/p>\n<p>DNS is an essential protocol for cybercriminals who build exploit kits, but can also be a powerful point of control for blocking attacks. Monitoring DNS queries for traffic to known malicious destinations, combined with analytics to recognize suspicious behavior, can give an early warning when exploit kits and other threats have breached an organization\u2019s firewall.<\/p>\n<p>We invite you to visit\u00a0<a href=\"http:\/\/www.infoblox.com\/dns-threat-index?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.infoblox.com\/dns-threat-index<\/a>\u00a0to view the full report \u2013 no registration required \u2013 and to learn more about securing DNS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, we\u2019re unveiling the Infoblox DNS Threat Index &#8211;\u00a0www.infoblox.com\/dns-threat-index, powered by IID, for the third quarter of 2015. The most alarming statistic in this quarter\u2019s report is a surge in creation of Domain Name System (DNS) infrastructure for exploit kits \u2013 up 75 percent from the same period a year ago. Exploit kits are such [&hellip;]<\/p>\n","protected":false},"author":177,"featured_media":2173,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16,15],"class_list":{"0":"post-2170","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-infoblox","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Exploit Kits - The Automation of Cybercrime<\/title>\n<meta name=\"description\" content=\"Today, we\u2019re unveiling the Infoblox DNS Threat Index -\u00a0www.infoblox.com\/dns-threat-index, powered by IID, for the third quarter of 2015.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploit Kits - The Automation of Cybercrime\" \/>\n<meta property=\"og:description\" content=\"Today, we\u2019re unveiling the Infoblox DNS Threat Index -\u00a0www.infoblox.com\/dns-threat-index, powered by IID, for the third quarter of 2015.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-18T18:52:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/anglerfishdimensions.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Craig Sanderson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Sanderson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/exploit-kits-the-automation-of-cybercrime\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/exploit-kits-the-automation-of-cybercrime\\\/\"},\"author\":{\"name\":\"Craig Sanderson\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\"},\"headline\":\"Exploit Kits &#8211; The Automation of Cybercrime\",\"datePublished\":\"2015-11-18T18:52:10+00:00\",\"dateModified\":\"2020-05-06T17:30:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/exploit-kits-the-automation-of-cybercrime\\\/\"},\"wordCount\":477,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/exploit-kits-the-automation-of-cybercrime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/anglerfishdimensions.jpg\",\"keywords\":[\"Infoblox\",\"Security\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/exploit-kits-the-automation-of-cybercrime\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/exploit-kits-the-automation-of-cybercrime\\\/\",\"name\":\"Exploit Kits - The Automation of Cybercrime\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/exploit-kits-the-automation-of-cybercrime\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/exploit-kits-the-automation-of-cybercrime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/anglerfishdimensions.jpg\",\"datePublished\":\"2015-11-18T18:52:10+00:00\",\"dateModified\":\"2020-05-06T17:30:07+00:00\",\"description\":\"Today, we\u2019re unveiling the Infoblox DNS Threat Index -\u00a0www.infoblox.com\\\/dns-threat-index, powered by IID, for the third quarter of 2015.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/exploit-kits-the-automation-of-cybercrime\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/exploit-kits-the-automation-of-cybercrime\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/exploit-kits-the-automation-of-cybercrime\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/anglerfishdimensions.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/anglerfishdimensions.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/exploit-kits-the-automation-of-cybercrime\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Exploit Kits &#8211; The Automation of Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/01dc95aed5cb12cffacb64848b7f24ca\",\"name\":\"Craig Sanderson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_177_1571767316-96x96.jpg\",\"caption\":\"Craig Sanderson\"},\"description\":\"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/craig-sanderson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Exploit Kits - The Automation of Cybercrime","description":"Today, we\u2019re unveiling the Infoblox DNS Threat Index -\u00a0www.infoblox.com\/dns-threat-index, powered by IID, for the third quarter of 2015.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"Exploit Kits - The Automation of Cybercrime","og_description":"Today, we\u2019re unveiling the Infoblox DNS Threat Index -\u00a0www.infoblox.com\/dns-threat-index, powered by IID, for the third quarter of 2015.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/","og_site_name":"Infoblox Blog","article_published_time":"2015-11-18T18:52:10+00:00","article_modified_time":"2020-05-06T17:30:07+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/anglerfishdimensions.jpg","type":"image\/jpeg"}],"author":"Craig Sanderson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Craig Sanderson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/"},"author":{"name":"Craig Sanderson","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca"},"headline":"Exploit Kits &#8211; The Automation of Cybercrime","datePublished":"2015-11-18T18:52:10+00:00","dateModified":"2020-05-06T17:30:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/"},"wordCount":477,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/anglerfishdimensions.jpg","keywords":["Infoblox","Security"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/","url":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/","name":"Exploit Kits - The Automation of Cybercrime","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/anglerfishdimensions.jpg","datePublished":"2015-11-18T18:52:10+00:00","dateModified":"2020-05-06T17:30:07+00:00","description":"Today, we\u2019re unveiling the Infoblox DNS Threat Index -\u00a0www.infoblox.com\/dns-threat-index, powered by IID, for the third quarter of 2015.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/anglerfishdimensions.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/anglerfishdimensions.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/exploit-kits-the-automation-of-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Exploit Kits &#8211; The Automation of Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/01dc95aed5cb12cffacb64848b7f24ca","name":"Craig Sanderson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_177_1571767316-96x96.jpg","caption":"Craig Sanderson"},"description":"Craig Sanderson is the Principal Cyber Security Strategist at Infoblox. Craig has over 25 years of experience in the CyberSecurity industry with a broad array of roles ranging from consultancy, security architecture, business development and product management. Over the last seven years, Craig has been responsible for creating the vision, strategy and delivered the execution of the Infoblox BloxOne Threat Defense solution. He continues to be passionate about the role that DNS can play in delivering world class cyber security with a particular emphasis on how DNS can become the foundation for national and governmental Protective DNS solutions","url":"https:\/\/www.infoblox.com\/blog\/author\/craig-sanderson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2170"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2170\/revisions"}],"predecessor-version":[{"id":2176,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2170\/revisions\/2176"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2173"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}