{"id":5735,"date":"2020-11-19T08:55:13","date_gmt":"2020-11-19T16:55:13","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5735"},"modified":"2024-04-26T13:21:05","modified_gmt":"2024-04-26T20:21:05","slug":"automotive-themed-malspam-delivers-adwind-rat","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/","title":{"rendered":"Automotive-Themed Malspam Delivers Adwind RAT"},"content":{"rendered":"<p>Author: Victor Sandin<\/p>\n<p>TLP:WHITE<\/p>\n<p>From 12 to 13 November, Infoblox observed a malicious email campaign distributing the Adwind remote access trojan<sup>1<\/sup> (RAT) via a spoofed O&#8217;Meara Auto Group invoice using Microsoft Excel spreadsheets (XLS) with malicious macros.<\/p>\n<p>Adwind, also known as AlienSpy, jRat, Sockrat, etc., is one of the most widely-used cross-platform Malware-as-a-Service (MaaS) packages that threat actors can purchase for a fee.<sup>2<\/sup> Adwind\u2019s capabilities include:<\/p>\n<ul>\n<li>Logging keystrokes,<\/li>\n<li>Collecting system information,<\/li>\n<li>Transferring data,<\/li>\n<li>Controlling the victim\u2019s webcam,<\/li>\n<li>Harvesting user credentials, and<\/li>\n<li>Recording sounds and taking screenshots.<\/li>\n<\/ul>\n<p>In the campaign we observed, the threat actors sent emails with a subject and an email body of <em>Your Order confirmation # &lt;XXXX&gt;, <\/em>where the Xs represent a varied number of random digits. The emails also included an attached XLS file named <em>INVOICE # SPLXXXX<\/em>.<\/p>\n<p>Infoblox\u2019s full report on this campaign will be available soon on our<a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\"> Threat Intelligence Reports<\/a> page.<\/p>\n<p><strong>Endnotes<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/securelist.com\/adwind-faq\/73660\/\">https:\/\/securelist.com\/adwind-faq\/73660\/<\/a><\/li>\n<li><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--34\">https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence&#8211;34<\/a><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Victor Sandin TLP:WHITE From 12 to 13 November, Infoblox observed a malicious email campaign distributing the Adwind remote access trojan1 (RAT) via a spoofed O&#8217;Meara Auto Group invoice using Microsoft Excel spreadsheets (XLS) with malicious macros. Adwind, also known as AlienSpy, jRat, Sockrat, etc., is one of the most widely-used cross-platform Malware-as-a-Service (MaaS) packages [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":2550,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[236,294,362],"class_list":{"0":"post-5735","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-cyberthreat","9":"tag-malspam","10":"tag-manufacturing","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Automotive-Themed Malspam Delivers Adwind RAT<\/title>\n<meta name=\"description\" content=\"From 12 to 13 November, Infoblox observed a malicious email campaign distributing the Adwind remote access trojan1 (RAT) via a spoofed O&#039;Meara Auto Group invoice using Microsoft Excel spreadsheets (XLS) with malicious macros.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automotive-Themed Malspam Delivers Adwind RAT\" \/>\n<meta property=\"og:description\" content=\"From 12 to 13 November, Infoblox observed a malicious email campaign distributing the Adwind remote access trojan1 (RAT) via a spoofed O&#039;Meara Auto Group invoice using Microsoft Excel spreadsheets (XLS) with malicious macros.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-19T16:55:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:21:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-12-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/automotive-themed-malspam-delivers-adwind-rat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/automotive-themed-malspam-delivers-adwind-rat\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Automotive-Themed Malspam Delivers Adwind RAT\",\"datePublished\":\"2020-11-19T16:55:13+00:00\",\"dateModified\":\"2024-04-26T20:21:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/automotive-themed-malspam-delivers-adwind-rat\\\/\"},\"wordCount\":168,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/automotive-themed-malspam-delivers-adwind-rat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-12-1.jpg\",\"keywords\":[\"Cyberthreat\",\"Malspam\",\"manufacturing\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/automotive-themed-malspam-delivers-adwind-rat\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/automotive-themed-malspam-delivers-adwind-rat\\\/\",\"name\":\"Automotive-Themed Malspam Delivers Adwind RAT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/automotive-themed-malspam-delivers-adwind-rat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/automotive-themed-malspam-delivers-adwind-rat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-12-1.jpg\",\"datePublished\":\"2020-11-19T16:55:13+00:00\",\"dateModified\":\"2024-04-26T20:21:05+00:00\",\"description\":\"From 12 to 13 November, Infoblox observed a malicious email campaign distributing the Adwind remote access trojan1 (RAT) via a spoofed O'Meara Auto Group invoice using Microsoft Excel spreadsheets (XLS) with malicious macros.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/automotive-themed-malspam-delivers-adwind-rat\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/automotive-themed-malspam-delivers-adwind-rat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/automotive-themed-malspam-delivers-adwind-rat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-12-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-12-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Performance Tune Your DDI Now with the Infoblox Under-the-Hood Program!\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/automotive-themed-malspam-delivers-adwind-rat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Automotive-Themed Malspam Delivers Adwind RAT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Automotive-Themed Malspam Delivers Adwind RAT","description":"From 12 to 13 November, Infoblox observed a malicious email campaign distributing the Adwind remote access trojan1 (RAT) via a spoofed O'Meara Auto Group invoice using Microsoft Excel spreadsheets (XLS) with malicious macros.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/","og_locale":"en_US","og_type":"article","og_title":"Automotive-Themed Malspam Delivers Adwind RAT","og_description":"From 12 to 13 November, Infoblox observed a malicious email campaign distributing the Adwind remote access trojan1 (RAT) via a spoofed O'Meara Auto Group invoice using Microsoft Excel spreadsheets (XLS) with malicious macros.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/","og_site_name":"Infoblox Blog","article_published_time":"2020-11-19T16:55:13+00:00","article_modified_time":"2024-04-26T20:21:05+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-12-1.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Automotive-Themed Malspam Delivers Adwind RAT","datePublished":"2020-11-19T16:55:13+00:00","dateModified":"2024-04-26T20:21:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/"},"wordCount":168,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-12-1.jpg","keywords":["Cyberthreat","Malspam","manufacturing"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/","name":"Automotive-Themed Malspam Delivers Adwind RAT","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-12-1.jpg","datePublished":"2020-11-19T16:55:13+00:00","dateModified":"2024-04-26T20:21:05+00:00","description":"From 12 to 13 November, Infoblox observed a malicious email campaign distributing the Adwind remote access trojan1 (RAT) via a spoofed O'Meara Auto Group invoice using Microsoft Excel spreadsheets (XLS) with malicious macros.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-12-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-12-1.jpg","width":660,"height":454,"caption":"Performance Tune Your DDI Now with the Infoblox Under-the-Hood Program!"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/automotive-themed-malspam-delivers-adwind-rat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Automotive-Themed Malspam Delivers Adwind RAT"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5735"}],"version-history":[{"count":8,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5735\/revisions"}],"predecessor-version":[{"id":5748,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5735\/revisions\/5748"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2550"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}