{"id":5401,"date":"2020-07-22T07:49:50","date_gmt":"2020-07-22T14:49:50","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5401"},"modified":"2024-04-26T13:21:20","modified_gmt":"2024-04-26T20:21:20","slug":"vidar-infostealer","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/","title":{"rendered":"Vidar InfoStealer"},"content":{"rendered":"<p>From 25 to 30 June, we observed a malicious spam (malspam) email campaign distributing the Vidar information stealer (infostealer), which is a variant of the Arkei infostealer.<sup> 1<\/sup><\/p>\n<p>Threat actors can reportedly purchase Vidar in online forums for $250.<sup>2<\/sup> It has the ability to steal credit cards, usernames, passwords, and files, as well as take screenshots of the user\u2019s desktop.<sup>3<\/sup> It can also steal wallets for cryptocurrencies such as Bitcoin and Ethereum.<\/p>\n<p>Two-factor authentication (2FA) is an additional security layer for user accounts, typically requiring a one-time use code in addition to a password to sign in to an account. Vidar specifically targets the 2FA software Authy in order to bypass this added hurdle for gaining access to an account.<sup>4<\/sup><\/p>\n<p>In this campaign, the threat actor sent emails with multiple subjects referencing a successful payment, such as \u201cConfirmation of Payment\u201d and \u201cYour Transaction was Approved.\u201d Each email had a generic message body that resembled an invoice, with \u201cPayment receipt attached\u201d at the end. Unlike typical malspam attacks, wherein the malware runs when the user opens the file, Vidar does not execute until the user closes the file.<\/p>\n<p>Infoblox\u2019s full report on this instance of the malware will be available soon on our <a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\">Threat Intelligence Reports<\/a> page.<\/p>\n<h3><strong>Endnotes<\/strong><\/h3>\n<ol>\n<li>https:\/\/any.run\/malware-trends\/vidar<\/li>\n<li>https:\/\/fumik0.com\/2018\/12\/24\/lets-dig-into-vidar-an-arkei-copycat-forked-stealer-in-depth-analysis\/<\/li>\n<li>https:\/\/isc.sans.edu\/forums\/diary\/What+data+does+Vidar+malware+steal+from+an+infected+host\/25398\/<\/li>\n<li>https:\/\/fumik0.com\/2018\/12\/24\/lets-dig-into-vidar-an-arkei-copycat-forked-stealer-in-depth-analysis\/&nbsp;<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>From 25 to 30 June, we observed a malicious spam (malspam) email campaign distributing the Vidar information stealer (infostealer), which is a variant of the Arkei infostealer. 1 Threat actors can reportedly purchase Vidar in online forums for $250.2 It has the ability to steal credit cards, usernames, passwords, and files, as well as take [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":3599,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[299,294,32,48,40,298],"class_list":{"0":"post-5401","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-infostealer","9":"tag-malspam","10":"tag-malware","11":"tag-threat","12":"tag-threat-intelligence","13":"tag-vidar","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Vidar InfoStealer<\/title>\n<meta name=\"description\" content=\"From 25 to 30 June, we observed a malicious spam (malspam) email campaign distributing the Vidar information stealer (infostealer), which is a variant of the Arkei infostealer. 1\u00a0Threat actors can reportedly purchase Vidar in online forums for $250.2 It has the ability to steal credit cards, usernames, passwords, and files, as well as take screenshots of the user\u2019s desktop.3 It can also steal wallets for cryptocurrencies such as Bitcoin and Ethereum.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vidar InfoStealer\" \/>\n<meta property=\"og:description\" content=\"From 25 to 30 June, we observed a malicious spam (malspam) email campaign distributing the Vidar information stealer (infostealer), which is a variant of the Arkei infostealer. 1\u00a0Threat actors can reportedly purchase Vidar in online forums for $250.2 It has the ability to steal credit cards, usernames, passwords, and files, as well as take screenshots of the user\u2019s desktop.3 It can also steal wallets for cryptocurrencies such as Bitcoin and Ethereum.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-22T14:49:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:21:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vidar-infostealer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vidar-infostealer\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Vidar InfoStealer\",\"datePublished\":\"2020-07-22T14:49:50+00:00\",\"dateModified\":\"2024-04-26T20:21:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vidar-infostealer\\\/\"},\"wordCount\":237,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vidar-infostealer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1-1.jpg\",\"keywords\":[\"infostealer\",\"Malspam\",\"Malware\",\"Threat\",\"Threat Intelligence\",\"Vidar\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vidar-infostealer\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vidar-infostealer\\\/\",\"name\":\"Vidar InfoStealer\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vidar-infostealer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vidar-infostealer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1-1.jpg\",\"datePublished\":\"2020-07-22T14:49:50+00:00\",\"dateModified\":\"2024-04-26T20:21:20+00:00\",\"description\":\"From 25 to 30 June, we observed a malicious spam (malspam) email campaign distributing the Vidar information stealer (infostealer), which is a variant of the Arkei infostealer. 1\u00a0Threat actors can reportedly purchase Vidar in online forums for $250.2 It has the ability to steal credit cards, usernames, passwords, and files, as well as take screenshots of the user\u2019s desktop.3 It can also steal wallets for cryptocurrencies such as Bitcoin and Ethereum.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vidar-infostealer\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vidar-infostealer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vidar-infostealer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Enhanced IPAM with Network Insight\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/vidar-infostealer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Vidar InfoStealer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Vidar InfoStealer","description":"From 25 to 30 June, we observed a malicious spam (malspam) email campaign distributing the Vidar information stealer (infostealer), which is a variant of the Arkei infostealer. 1\u00a0Threat actors can reportedly purchase Vidar in online forums for $250.2 It has the ability to steal credit cards, usernames, passwords, and files, as well as take screenshots of the user\u2019s desktop.3 It can also steal wallets for cryptocurrencies such as Bitcoin and Ethereum.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/","og_locale":"en_US","og_type":"article","og_title":"Vidar InfoStealer","og_description":"From 25 to 30 June, we observed a malicious spam (malspam) email campaign distributing the Vidar information stealer (infostealer), which is a variant of the Arkei infostealer. 1\u00a0Threat actors can reportedly purchase Vidar in online forums for $250.2 It has the ability to steal credit cards, usernames, passwords, and files, as well as take screenshots of the user\u2019s desktop.3 It can also steal wallets for cryptocurrencies such as Bitcoin and Ethereum.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/","og_site_name":"Infoblox Blog","article_published_time":"2020-07-22T14:49:50+00:00","article_modified_time":"2024-04-26T20:21:20+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Vidar InfoStealer","datePublished":"2020-07-22T14:49:50+00:00","dateModified":"2024-04-26T20:21:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/"},"wordCount":237,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","keywords":["infostealer","Malspam","Malware","Threat","Threat Intelligence","Vidar"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/","name":"Vidar InfoStealer","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","datePublished":"2020-07-22T14:49:50+00:00","dateModified":"2024-04-26T20:21:20+00:00","description":"From 25 to 30 June, we observed a malicious spam (malspam) email campaign distributing the Vidar information stealer (infostealer), which is a variant of the Arkei infostealer. 1\u00a0Threat actors can reportedly purchase Vidar in online forums for $250.2 It has the ability to steal credit cards, usernames, passwords, and files, as well as take screenshots of the user\u2019s desktop.3 It can also steal wallets for cryptocurrencies such as Bitcoin and Ethereum.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","width":660,"height":454,"caption":"Enhanced IPAM with Network Insight"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/vidar-infostealer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Vidar InfoStealer"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5401"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5401\/revisions"}],"predecessor-version":[{"id":5406,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5401\/revisions\/5406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3599"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}