{"id":5211,"date":"2020-05-08T09:29:12","date_gmt":"2020-05-08T16:29:12","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5211"},"modified":"2024-04-26T13:21:25","modified_gmt":"2024-04-26T20:21:25","slug":"webmonitor-rat-hidden-in-videoconferencing-software-installer","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/","title":{"rendered":"WebMonitor RAT Hidden in Videoconferencing Software Installer"},"content":{"rendered":"<p>On 29 April, Trend Micro reported a malicious campaign that used a booby-trapped installer for Zoom videoconferencing software to deliver the WebMonitor remote access trojan (RAT).<sup>1 <\/sup>WebMonitor is a RAT that can create and modify a victim\u2019s files, record audio, log keystrokes, access webcams, view a streaming video of the victim\u2019s screen, control system processes, and more.<\/p>\n<p>Due to the ongoing Coronavirus pandemic, many organizations are relying on communication software to maintain their operations, and Zoom is one of the most popular videoconferencing options available.<\/p>\n<p>While the report did not detail a specific distribution method, it did note that the malicious installer was not distributed through official sources such as Zoom\u2019s website, the Apple App Store, or the Google Play Store.<\/p>\n<p>Infoblox\u2019s full report on this campaign will be available soon on our <a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\">Threat Intelligence Reports<\/a> page.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On 29 April, Trend Micro reported a malicious campaign that used a booby-trapped installer for Zoom videoconferencing software to deliver the WebMonitor remote access trojan (RAT).1 WebMonitor is a RAT that can create and modify a victim\u2019s files, record audio, log keystrokes, access webcams, view a streaming video of the victim\u2019s screen, control system processes, [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":4034,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[15,40,282,275],"class_list":{"0":"post-5211","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-security","9":"tag-threat-intelligence","10":"tag-video-conferencing","11":"tag-zoom","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>WebMonitor RAT Hidden in Videoconferencing Software Installer<\/title>\n<meta name=\"description\" content=\"On 29 April, Trend Micro reported a malicious campaign that used a booby-trapped installer for Zoom videoconferencing software to deliver the WebMonitor remote access trojan (RAT).1 WebMonitor is a RAT that can create and modify a victim\u2019s files, record audio, log keystrokes, access webcams, view a streaming video of the victim\u2019s screen, control system processes, and more.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WebMonitor RAT Hidden in Videoconferencing Software Installer\" \/>\n<meta property=\"og:description\" content=\"On 29 April, Trend Micro reported a malicious campaign that used a booby-trapped installer for Zoom videoconferencing software to deliver the WebMonitor remote access trojan (RAT).1 WebMonitor is a RAT that can create and modify a victim\u2019s files, record audio, log keystrokes, access webcams, view a streaming video of the victim\u2019s screen, control system processes, and more.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-08T16:29:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:21:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/CDC-picture-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/webmonitor-rat-hidden-in-videoconferencing-software-installer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/webmonitor-rat-hidden-in-videoconferencing-software-installer\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"WebMonitor RAT Hidden in Videoconferencing Software Installer\",\"datePublished\":\"2020-05-08T16:29:12+00:00\",\"dateModified\":\"2024-04-26T20:21:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/webmonitor-rat-hidden-in-videoconferencing-software-installer\\\/\"},\"wordCount\":147,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/webmonitor-rat-hidden-in-videoconferencing-software-installer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/CDC-picture-4.jpg\",\"keywords\":[\"Security\",\"Threat Intelligence\",\"Video Conferencing\",\"Zoom\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/webmonitor-rat-hidden-in-videoconferencing-software-installer\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/webmonitor-rat-hidden-in-videoconferencing-software-installer\\\/\",\"name\":\"WebMonitor RAT Hidden in Videoconferencing Software Installer\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/webmonitor-rat-hidden-in-videoconferencing-software-installer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/webmonitor-rat-hidden-in-videoconferencing-software-installer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/CDC-picture-4.jpg\",\"datePublished\":\"2020-05-08T16:29:12+00:00\",\"dateModified\":\"2024-04-26T20:21:25+00:00\",\"description\":\"On 29 April, Trend Micro reported a malicious campaign that used a booby-trapped installer for Zoom videoconferencing software to deliver the WebMonitor remote access trojan (RAT).1 WebMonitor is a RAT that can create and modify a victim\u2019s files, record audio, log keystrokes, access webcams, view a streaming video of the victim\u2019s screen, control system processes, and more.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/webmonitor-rat-hidden-in-videoconferencing-software-installer\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/webmonitor-rat-hidden-in-videoconferencing-software-installer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/webmonitor-rat-hidden-in-videoconferencing-software-installer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/CDC-picture-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/CDC-picture-4.jpg\",\"width\":600,\"height\":400,\"caption\":\"Download the Software\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/webmonitor-rat-hidden-in-videoconferencing-software-installer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"WebMonitor RAT Hidden in Videoconferencing Software Installer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"WebMonitor RAT Hidden in Videoconferencing Software Installer","description":"On 29 April, Trend Micro reported a malicious campaign that used a booby-trapped installer for Zoom videoconferencing software to deliver the WebMonitor remote access trojan (RAT).1 WebMonitor is a RAT that can create and modify a victim\u2019s files, record audio, log keystrokes, access webcams, view a streaming video of the victim\u2019s screen, control system processes, and more.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/","og_locale":"en_US","og_type":"article","og_title":"WebMonitor RAT Hidden in Videoconferencing Software Installer","og_description":"On 29 April, Trend Micro reported a malicious campaign that used a booby-trapped installer for Zoom videoconferencing software to deliver the WebMonitor remote access trojan (RAT).1 WebMonitor is a RAT that can create and modify a victim\u2019s files, record audio, log keystrokes, access webcams, view a streaming video of the victim\u2019s screen, control system processes, and more.\u00a0","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/","og_site_name":"Infoblox Blog","article_published_time":"2020-05-08T16:29:12+00:00","article_modified_time":"2024-04-26T20:21:25+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/CDC-picture-4.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"WebMonitor RAT Hidden in Videoconferencing Software Installer","datePublished":"2020-05-08T16:29:12+00:00","dateModified":"2024-04-26T20:21:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/"},"wordCount":147,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/CDC-picture-4.jpg","keywords":["Security","Threat Intelligence","Video Conferencing","Zoom"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/","name":"WebMonitor RAT Hidden in Videoconferencing Software Installer","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/CDC-picture-4.jpg","datePublished":"2020-05-08T16:29:12+00:00","dateModified":"2024-04-26T20:21:25+00:00","description":"On 29 April, Trend Micro reported a malicious campaign that used a booby-trapped installer for Zoom videoconferencing software to deliver the WebMonitor remote access trojan (RAT).1 WebMonitor is a RAT that can create and modify a victim\u2019s files, record audio, log keystrokes, access webcams, view a streaming video of the victim\u2019s screen, control system processes, and more.\u00a0","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/CDC-picture-4.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/CDC-picture-4.jpg","width":600,"height":400,"caption":"Download the Software"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/webmonitor-rat-hidden-in-videoconferencing-software-installer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"WebMonitor RAT Hidden in Videoconferencing Software Installer"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5211"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5211\/revisions"}],"predecessor-version":[{"id":5213,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5211\/revisions\/5213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4034"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}