{"id":3557,"date":"2014-05-20T16:53:43","date_gmt":"2014-05-20T16:53:43","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3557"},"modified":"2020-05-06T10:31:34","modified_gmt":"2020-05-06T17:31:34","slug":"protecting-from-creepware-using-dns-firewall","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/","title":{"rendered":"Protecting from Creepware using DNS Firewall"},"content":{"rendered":"<p>Imagine that you\u2019ve discovered that your computer has been surreptitiously taking pictures of you at times when you thought the camera was off, and forwarding them to some stranger. Sound like your worst nightmare?\u00a0 In fact\u2014as Miss Teen USA\u00a0 recently discovered to her chagrin\u2014<a href=\"http:\/\/ac360.blogs.cnn.com\/2014\/05\/19\/miss-teen-usas-creepware-ordeal\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">she was the victim\u00a0<\/a>of the latest Internet malevolence, officially known as \u201cBlackshades\u201d but informally dubbed \u201cCreepware\u201d by victims and law-enforcers.<\/p>\n<p>So what exactly is Creepware?\u00a0 Think of it as a remote-access Trojan\u2014a mutated version of a family of software known as remote administration tool (RAT). \u00a0There are many RATs that are used for entirely legitimate purposes (LogmeIn, Microsoft RDP, VNC, etc.) for functions such as remote connectivity on the go or providing technical support.\u00a0 A remote-access trojan is kind of RAT that is installed without your knowledge or permission\u2014one that is designed to hand over control of your computer to a remote entity. And the neighborhood stalker is not the only creep who is friendly with RATs; international criminal gangs like them too, for seizing control of the finances of individuals and companies.<\/p>\n<p>One such RAT\u2014known as \u201cBlackshades\u201d and said to have affected over half a million people worldwide\u2014was taken down yesterday by law-enforcement authorities.<\/p>\n<p>Here is a partial list of Blackshades\u2019 RAT capabilities:<\/p>\n<ul>\n<li>Webcam control<\/li>\n<\/ul>\n<ul>\n<li>Screenshot\/Remote desktop<\/li>\n<\/ul>\n<ul>\n<li>Keylogger<\/li>\n<\/ul>\n<ul>\n<li>Proxy manager ( to redirect your computer\u2019s traffic)<\/li>\n<\/ul>\n<ul>\n<li>File download and execution<\/li>\n<\/ul>\n<ul>\n<li>URL redirection<\/li>\n<\/ul>\n<ul>\n<li>Reverse relay (The attacker sets the victim\u2019s browser to connect to the Internet, in order to hide his footprint.)<\/li>\n<\/ul>\n<p>Using these advanced techniques, criminals are able to steal sensitive information like bank passwords, social-security numbers, and credit card details\u2014and wreak havoc on unsuspecting victims.<\/p>\n<p>&nbsp;<\/p>\n<p>The takedown was the outcome of over two years of investigation and evidence gathering. It was a coordinated crackdown across\u00a0<a href=\"http:\/\/www.fbi.gov\/news\/stories\/2014\/may\/international-blackshades-malware-takedown\/international-blackshades-malware-takedown\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">19 countries and involving the FBI,\u00a0<\/a>\u00a0which systematically went after the creators of the Blackshades software and their global command-and-control (C&amp;C) infrastructure. (Incidentally, Blackshades was also the toolkit used\u00a0<a href=\"http:\/\/blog.malwarebytes.org\/intelligence\/2012\/06\/blackshades-in-syria\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">against Syrian political activists<\/a>.)<\/p>\n<p>While the news about Blackshades is only now going public, Infoblox DNS Firewall customers have been protected from this group for a long time. The RPZ subscription feed tracks known C&amp;C infrastructures across the Internet, and this include the ones operated by the Blackshades group, or their predecessor called DarkComet, for over two years. We have over 13,000 domains related to Blackshades in the DNS Firewall feed, and were already actively protecting our customers who had the subscription.<\/p>\n<p>This example serves to highlight the strength of the DNS Firewall solution in conjunction with its dynamic RPZ feed. Our approach of tracking domains or IP addresses of bad repute and enforcing at the DNS layer ensures a pervasive security blanket for customers. Thus\u2014be it DarkComet or BlackShades or ShadesRat or DarkMoon\u2014the bad guys tend to re-use existing infrastructure \u00a0and datacenters, and if they are in our feed, our customers are protected.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imagine that you\u2019ve discovered that your computer has been surreptitiously taking pictures of you at times when you thought the camera was off, and forwarding them to some stranger. Sound like your worst nightmare?\u00a0 In fact\u2014as Miss Teen USA\u00a0 recently discovered to her chagrin\u2014she was the victim\u00a0of the latest Internet malevolence, officially known as \u201cBlackshades\u201d [&hellip;]<\/p>\n","protected":false},"author":169,"featured_media":668,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[44,16,15],"class_list":{"0":"post-3557","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-dns-firewall","9":"tag-infoblox","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protecting from Creepware using DNS Firewall<\/title>\n<meta name=\"description\" content=\"Imagine that you\u2019ve discovered that your computer has been surreptitiously taking pictures of you at times when you thought the camera was off, and forwarding them to some stranger.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting from Creepware using DNS Firewall\" \/>\n<meta property=\"og:description\" content=\"Imagine that you\u2019ve discovered that your computer has been surreptitiously taking pictures of you at times when you thought the camera was off, and forwarding them to some stranger.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-20T16:53:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:31:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Balaji Prasad\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Balaji Prasad\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/protecting-from-creepware-using-dns-firewall\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/protecting-from-creepware-using-dns-firewall\\\/\"},\"author\":{\"name\":\"Balaji Prasad\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/293d5ecec5bb149ed8f4df35f98c1976\"},\"headline\":\"Protecting from Creepware using DNS Firewall\",\"datePublished\":\"2014-05-20T16:53:43+00:00\",\"dateModified\":\"2020-05-06T17:31:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/protecting-from-creepware-using-dns-firewall\\\/\"},\"wordCount\":495,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/protecting-from-creepware-using-dns-firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-3.jpg\",\"keywords\":[\"DNS Firewall\",\"Infoblox\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/protecting-from-creepware-using-dns-firewall\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/protecting-from-creepware-using-dns-firewall\\\/\",\"name\":\"Protecting from Creepware using DNS Firewall\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/protecting-from-creepware-using-dns-firewall\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/protecting-from-creepware-using-dns-firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-3.jpg\",\"datePublished\":\"2014-05-20T16:53:43+00:00\",\"dateModified\":\"2020-05-06T17:31:34+00:00\",\"description\":\"Imagine that you\u2019ve discovered that your computer has been surreptitiously taking pictures of you at times when you thought the camera was off, and forwarding them to some stranger.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/protecting-from-creepware-using-dns-firewall\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/protecting-from-creepware-using-dns-firewall\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/protecting-from-creepware-using-dns-firewall\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-3.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/protecting-from-creepware-using-dns-firewall\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protecting from Creepware using DNS Firewall\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/293d5ecec5bb149ed8f4df35f98c1976\",\"name\":\"Balaji Prasad\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6d4c2e405694d3f27bece2745064774edf10a86012ff3d5ef273d12257b2d47b?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6d4c2e405694d3f27bece2745064774edf10a86012ff3d5ef273d12257b2d47b?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6d4c2e405694d3f27bece2745064774edf10a86012ff3d5ef273d12257b2d47b?s=96&d=blank&r=g\",\"caption\":\"Balaji Prasad\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/balaji-prasad\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting from Creepware using DNS Firewall","description":"Imagine that you\u2019ve discovered that your computer has been surreptitiously taking pictures of you at times when you thought the camera was off, and forwarding them to some stranger.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/","og_locale":"en_US","og_type":"article","og_title":"Protecting from Creepware using DNS Firewall","og_description":"Imagine that you\u2019ve discovered that your computer has been surreptitiously taking pictures of you at times when you thought the camera was off, and forwarding them to some stranger.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/","og_site_name":"Infoblox Blog","article_published_time":"2014-05-20T16:53:43+00:00","article_modified_time":"2020-05-06T17:31:34+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-3.jpg","type":"image\/jpeg"}],"author":"Balaji Prasad","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Balaji Prasad","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/"},"author":{"name":"Balaji Prasad","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/293d5ecec5bb149ed8f4df35f98c1976"},"headline":"Protecting from Creepware using DNS Firewall","datePublished":"2014-05-20T16:53:43+00:00","dateModified":"2020-05-06T17:31:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/"},"wordCount":495,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-3.jpg","keywords":["DNS Firewall","Infoblox","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/","url":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/","name":"Protecting from Creepware using DNS Firewall","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-3.jpg","datePublished":"2014-05-20T16:53:43+00:00","dateModified":"2020-05-06T17:31:34+00:00","description":"Imagine that you\u2019ve discovered that your computer has been surreptitiously taking pictures of you at times when you thought the camera was off, and forwarding them to some stranger.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-3.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-3.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/protecting-from-creepware-using-dns-firewall\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Protecting from Creepware using DNS Firewall"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/293d5ecec5bb149ed8f4df35f98c1976","name":"Balaji Prasad","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6d4c2e405694d3f27bece2745064774edf10a86012ff3d5ef273d12257b2d47b?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6d4c2e405694d3f27bece2745064774edf10a86012ff3d5ef273d12257b2d47b?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d4c2e405694d3f27bece2745064774edf10a86012ff3d5ef273d12257b2d47b?s=96&d=blank&r=g","caption":"Balaji Prasad"},"url":"https:\/\/www.infoblox.com\/blog\/author\/balaji-prasad\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/169"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3557"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3557\/revisions"}],"predecessor-version":[{"id":3558,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3557\/revisions\/3558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/668"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}