{"id":6628,"date":"2021-07-20T14:58:36","date_gmt":"2021-07-20T21:58:36","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6628"},"modified":"2024-08-07T12:20:45","modified_gmt":"2024-08-07T19:20:45","slug":"cyber-threat-advisory-apt40-ttps-and-trends","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/","title":{"rendered":"Cyber Threat Advisory: APT40 TTPs and Trends"},"content":{"rendered":"<h3>Author: Christopher Kim<\/h3>\n<h3>TLP: WHITE<\/h3>\n<p>&nbsp;<\/p>\n<h3>1. Executive Summary<\/h3>\n<p>On 19 July, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) published a joint advisory on a Chinese Advanced Persistent Threat (APT) APT40, also known as BRONZE MOHAWK, FEVERDREAM, and MUDCARP. The advisory provided information about the APT\u2019s tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and mitigation recommendations.<a href=\"#dmrwqz5vvj6r\"><sup>1<\/sup><\/a> On this same day, the FBI, CISA, and National Security Agency (NSA) published a joint advisory on trends in cyber espionage activity that they observed across various Chinese state\u2013sponsored actors.<a href=\"#p05mc1t4mip\"><sup>2<\/sup><\/a> These advisories coincide with the White House\u2019s July statement accusing the People\u2019s Republic of China (PRC) of hiring malicious actors to conduct, in early March 2021, cyber espionage operations that exploit zero-day vulnerabilities in Microsoft Exchange Servers.<a href=\"#fuf52i8xg7rq\"><sup>3<\/sup><\/a><\/p>\n<h3>2. Analysis<\/h3>\n<h4 style=\"padding-left: 40px;\">2.1.\u00a0 APT40<\/h4>\n<p style=\"padding-left: 40px;\">The group known as APT40 has been active since at least 2009 and runs its operations from Haikou, Hainan Province, PRC. The group has targeted governmental organizations, companies, and universities in various industries, including biomedical, robotics, and maritime research, as well as targeted industries included in China\u2019s Belt and Road Initiative. With locations in the United States, Canada, Europe, the Middle East, and the South China Sea area, these targets are well distributed across the world.<\/p>\n<p style=\"padding-left: 40px;\">On July 19, the U.S. Department of Justice (DOJ) indicted four APT40 members for secretly carrying out malicious computer network exploitation (CNE) activities via a front company called Hainan Xiandun Technology Development Company (Hainan Xiandun). The company\u2019s employee Wu Shurong received orders from RC Ministry of State Security (MSS) Hainan State Security Department (HSSD) intelligence officers Ding Xiaoyang, Zhu Yunmin, and Cheng Qingmin to steal trade secrets, intellectual property, and other high-value information from companies and government organizations worldwide.<\/p>\n<p style=\"padding-left: 40px;\">APT40 employs various TTPs, custom attack tools, and open-source resources to gain a foothold in target networks by using stolen credentials, to laterally move across a network, and to perform data exfiltration. CISA researchers have observed the same custom attack-tools as those used in operations associated with other suspected Chinese state\u2013sponsored actors. The CISA AA21-200A advisory contains a table that describes APT40\u2019s TTPs based on the MITRE ATT&amp;CK framework.<a href=\"#2jozdv9y4wbv\"><sup>4<\/sup><\/a><\/p>\n<h4 style=\"padding-left: 40px;\">\u00a02.1.1.\u00a0 Mitigation<\/h4>\n<p style=\"padding-left: 40px;\">To combat APT40 activities, CISA AA21-200A recommends that organizations incorporate network monitoring and hygiene solutions in their defense strategy, as well as follow best security practices, such as implementing strong password management solutions and diligently updating software patches for security vulnerabilities. The advisory specifically recommends the following measures:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Patch and Vulnerability Management<\/strong>\n<ul>\n<li>Install vendor-provided and verified patches on all systems for critical vulnerabilities, prioritizing timely patching of internet-connected servers and software processing internet data\u2014such as web browsers, browser plugins, and document readers.<\/li>\n<li>Ensure proper migrating steps or compensating controls are implemented for vulnerabilities that cannot be patched in a timely manner.<\/li>\n<li>Maintain up-to-date antivirus signatures and engines.<\/li>\n<li>Routinely audit configuration and patch management programs to ensure the ability to track and mitigate emerging threats. Implementing a rigorous configuration and patch management program will hamper sophisticated cyber threat actors\u2019 operations and protect resources and information systems.<\/li>\n<li>Review the articles in the References section<a href=\"#79a0acsuvjju\"><sup>5<\/sup><\/a> for more information on Chinese APT exploitation of common vulnerabilities.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Protect Credentials<\/strong>\n<ul>\n<li>Strengthen credential requirements, regularly change passwords, and implement multi-factor authentication to protect individual accounts, particularly for webmail and VPN access and for accounts that access critical systems. Do not reuse passwords for multiple accounts.<\/li>\n<li>Audit all remote authentications from trusted networks or service providers.<\/li>\n<li>Detect mismatches by correlating credentials used within internal networks with those employed on external-facing systems.<\/li>\n<li>Log use of system administrator commands such as net, ipconfig, and ping.<\/li>\n<li>Enforce principle of least privilege.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Network Hygiene and Monitoring<\/strong>\n<ul>\n<li>Actively scan and monitor internet-accessible applications for unauthorized access, modification, and anomalous activities.<\/li>\n<li>Actively monitor server disk use and audit for significant changes.<\/li>\n<li>Log Domain Name Service (DNS) queries and consider blocking all outbound DNS requests that do not originate from approved DNS servers. Monitor DNS queries for C2 over DNS.<\/li>\n<li>Develop and monitor the network and system baselines to allow for the identification of anomalous activity. Audit logs for suspicious behavior.<\/li>\n<li>Identify and suspend access of users exhibiting unusual activity.<\/li>\n<li>Use allowlist or baseline comparison to monitor Windows event logs and network traffic to detect when a user maps a privileged administrative share on a Windows system.<\/li>\n<li>Leverage multi-sourced threat-reputation services for files, DNS, URLs, IP addresses, and email addresses.<\/li>\n<li>Network device management interfaces\u2014such as Telnet, Secure Shell (SSH), Winbox, and HTTP\u2014should be turned off for wide area network (WAN) interfaces and secured with strong passwords and encryption when enabled.<\/li>\n<li>When possible, segment critical information on air-gapped systems. Use strict access control measures for critical data.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4 style=\"padding-left: 40px;\">2.2. Trends in Chinese State-Sponsored Activities<\/h4>\n<p style=\"padding-left: 40px;\">According to the AA21-200B advisory, the NSA, CISA, and FBI have observed Chinese state\u2013sponsored actors use sophisticated methods to target U.S. political, economic, military, educational, and critical infrastructure (CI) personnel and organizations. The NSA, CISA, and FBI have identified the following trends across Chinese cyber espionage activities:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Masking Identity<\/strong>\n<ul>\n<li>Chinese state-sponsored actors covertly run cyber operations by using open-source and commercial penetration tools, as well as rotating virtual private servers (VPSs).<\/li>\n<li>Chinese state-sponsored actors employ VPSs, as well as small office and home office (SOHO) devices as intermediary nodes for operation to hide their main infrastructure.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Exploitation of Public Vulnerabilities<\/strong>\n<ul>\n<li>When Chinese state-sponsored actors obtain new software vulnerability information, they quickly scan the internet for public-facing devices that show the vulnerability.<\/li>\n<li>Typically, Chinese state-sponsored actors exploit widely used applications, such as Pulse Secure, Apache, F5 Big-IP, and Microsoft products. Read the following reports for information on Common Vulnerabilities and Exposures (CVEs) that have been exploited by Chinese cyber espionage:\n<ul>\n<li>CISA-FBI Joint CSA AA20-133A<a href=\"#kkg8zsv8e6cl\"><sup>6<\/sup><\/a><\/li>\n<li>CISA Activity Alert: AA20-275A<a href=\"#3yjis4a02yzo\"><sup>7<\/sup><\/a><\/li>\n<li>NSA CSA U\/OO\/179811-20<a href=\"#rkceg4l6rd0a\"><sup>8<\/sup><\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h5 style=\"padding-left: 80px;\">2.2.1. TTPs<\/h5>\n<p style=\"padding-left: 80px;\">Chinese state\u2013sponsored actors have used a wide range of TTPs to infiltrate victim networks and steal sensitive information related to critical industries and government entities. Appendices A and B of the AA21-200B advisory contain MITRE ATT&amp;CK TTP information related to Chinese state\u2013sponsored attack operations. The downloadable (JSON file) version of this information is also available on the NSA Cybersecurity Github page.<a href=\"#c2k11cow7hnr\"><sup>9<\/sup><\/a><\/p>\n<h5 style=\"padding-left: 80px;\">2.2.2. Mitigations<\/h5>\n<p style=\"padding-left: 80px;\">The NSA, CISA, and FBI strongly recommend that federal and SLTT governments, CI, DIB, and private industry organizations follow best security practices and monitor network traffic to identify suspicious and focused activities. We are providing all of their recommendations below:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Patch systems and equipment promptly and diligently<\/strong>\n<ul>\n<li>Focus on patching critical and high vulnerabilities that allow for remote code execution or denial-of-service on externally facing equipment and CVEs known to be exploited by Chinese state-sponsored cyber actors. Consider implementing a patch management program that enables a timely and thorough patching cycle.<\/li>\n<li>Note: for more information on CVEs routinely exploited by Chinese state-sponsored cyber actors refer to the resources listed in the Trends in Chinese State-Sponsored Cyber Operations section.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Enhance monitoring of network traffic, email, and endpoint systems<\/strong>\n<ul>\n<li>Review network signatures and indicators for focused activities, monitor for new phishing themes, and adjust email rules accordingly.<\/li>\n<li>Follow the best practices of restricting attachments via email and blocking URLs and domains based upon reputation.<\/li>\n<li>Ensure that log information is aggregated and correlated to enable maximum detection capabilities, with a focus on monitoring for account misuse.<\/li>\n<li>Monitor common ports and protocols for command and control (C2) activity.<\/li>\n<li>SSL\/TLS inspection can be used to see the contents of encrypted sessions to look for network-based indicators of malware communication protocols.<\/li>\n<li>Implement and enhance network and endpoint event analysis and detection capabilities to identify initial infections, compromised credentials, and the manipulation of endpoint processes and files.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Use protection capabilities to stop malicious activity<\/strong>\n<ul>\n<li>Implement anti-virus software and other endpoint protection capabilities to automatically detect and prevent malicious files from executing.<\/li>\n<li>Use a network intrusion detection and prevention system to identify and prevent commonly employed adversarial malware and limit nefarious data transfers.<\/li>\n<li>Use a domain reputation service to detect suspicious or malicious domains.<\/li>\n<li>Use strong credentials for service accounts and multi-factor authentication (MFA) for remote access to mitigate an adversary&#8217;s ability to leverage stolen credentials, but be aware of MFA interception techniques for some MFA implementations.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>3. Indicators of Compromise<\/h3>\n<p>The table below contains a sample of IOCs related to the attacks discussed in this article. The full list is available with the joint advisory.<\/p>\n<table width=\"672\">\n<tbody>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\"><strong>Indicator<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"147\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"525\">Engaction[.]com<\/p>\n<p>Soure7788.chickenkiller[.]com<\/p>\n<p>airbusocean[.]com<\/p>\n<p>cargillnotice[.]com<\/p>\n<p>ccidmeekparry[.]info<\/p>\n<p>ccvzvhjhdf[.]website<\/p>\n<p>cdigroups[.]com<\/p>\n<p>checkecc[.]com<\/p>\n<p>chemscalere[.]com<\/p>\n<p>cnnzapmeta[.]com<\/p>\n<p>corycs[.]com<\/p>\n<p>deltektimes[.]com<\/p>\n<p>ens-smithjonathan.rhcloud[.]com<\/p>\n<p>fishgatesite.wordpress[.]com<\/p>\n<p>goo2k88yyh2.chickenkiller[.]com<\/p>\n<p>gttdoskip[.]com<\/p>\n<p>huntingtomingalls[.]com<\/p>\n<p>indiadigest[.]in<\/p>\n<p>jack-newnb[.]com<\/p>\n<p>kAty197.chickenkiller[.]com<\/p>\n<p>louisdreyfu[.]com<\/p>\n<p>mail2.ignorelist[.]com<\/p>\n<p>masterroot[.]pw<\/p>\n<p>microsql-update[.]info<\/p>\n<p>mihybb[.]com<\/p>\n<p>mlcdailynews[.]com<\/p>\n<p>movyaction[.]net<\/p>\n<p>msusanode[.]com<\/p>\n<p>newbb-news[.]com<\/p>\n<p>nfmybb[.]com<\/p>\n<p>nobug[.]uk.to<\/p>\n<p>notesof992.wordpress[.]com<\/p>\n<p>onlinenewspapers[.]club<\/p>\n<p>onlineobl[.]com<\/p>\n<p>oyukg43t[.]website<\/p>\n<p>pacifichydrologic[.]org<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\">APT40 domains<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\">http:\/\/gkimertds.wordpress[.]com\/feed\/<\/p>\n<p style=\"text-align: center;\">http:\/\/stackoverflow[.]com\/users\/3627469\/angle-swift<\/p>\n<p style=\"text-align: center;\">http:\/\/stackoverflow[.]com\/users\/3804206\/swiftr-angle<\/p>\n<p style=\"text-align: center;\">http:\/\/stackoverflow[.]com\/users\/3863346\/gkimertdssdads<\/p>\n<p style=\"text-align: center;\">https:\/\/github[.]com\/slotz\/sharp-loader\/commit\/f9de338fb474fd970a7375030642d04179b9245d<\/p>\n<p style=\"text-align: center;\">https:\/\/pastebin[.]com\/p1mktQpD<\/p>\n<p style=\"text-align: center;\">https:\/\/pastebin[.]com\/vfb5mbbu<\/p>\n<p style=\"text-align: center;\">www.yorkshire-espana-sa[.]com\/english\/servicios\/<\/p>\n<p style=\"text-align: center;\">nmw4xhipveaca7hm[.]onion.link\/en_US\/all.js<\/p>\n<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\">APT40 urls<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\">01234c0e41fc23bb5e1946f69e6c6221<\/p>\n<p style=\"text-align: center;\">018d3c34a296edd32e1b39b7276dcf7f<\/p>\n<p style=\"text-align: center;\">019b68e26df8750e2f9f580b150b7293<\/p>\n<p style=\"text-align: center;\">01fa52a4f9268948b6c508fef0377299<\/p>\n<p style=\"text-align: center;\">022bd2040ec0476d8eb80d1d9dc5cc92<\/p>\n<p style=\"text-align: center;\">039d9ca446e79f2f4310dc7dcc60ec55<\/p>\n<p style=\"text-align: center;\">043f6cdca33ce68b1ebe0fd79e4685af<\/p>\n<p style=\"text-align: center;\">04918772a2a6ccd049e42be16bcbee39<\/p>\n<p style=\"text-align: center;\">04dc4ca70f788b10f496a404c4903ac6<\/p>\n<p style=\"text-align: center;\">060067666435370e0289d4add7a07c3b<\/p>\n<p style=\"text-align: center;\">062c759d04106e46e027bbe3b93f33ef<\/p>\n<p style=\"text-align: center;\">07083008885d2d0b31b137e896c7266c<\/p>\n<p style=\"text-align: center;\">079068181a728d0d603fe72ebfc7e910<\/p>\n<p style=\"text-align: center;\">0803f8c5ee4a152f2108e64c1e7f0233<\/p>\n<p style=\"text-align: center;\">09143a14272a29c56ff32df160dfdb30<\/p>\n<p style=\"text-align: center;\">0985f757b1b51533b6c5cf9b1467f388<\/p>\n<p style=\"text-align: center;\">09aab083fb399527f8ff3065f7796443<\/p>\n<p style=\"text-align: center;\">0b7bb3e23a1be2f26b9adf7004fc6b52<\/p>\n<p style=\"text-align: center;\">0b9a614a2bbc64c1f32b95988e5a3359<\/p>\n<p style=\"text-align: center;\">0bbe092a2120b1be699387be16b5f8fb<\/p>\n<p style=\"text-align: center;\">0bbe769505ca3db6016da400539f77aa<\/p>\n<p style=\"text-align: center;\">0c3c00c01f4c4bad92b5ba56bd5a9598<\/p>\n<p style=\"text-align: center;\">0c4fa4dfbe0b07d3425fea3efe60be1c<\/p>\n<p style=\"text-align: center;\">0ca936a564508a1f9c91cb7943e07c30<\/p>\n<p style=\"text-align: center;\">0d69eefede612493afd16a7541415b95<\/p>\n<p style=\"text-align: center;\">0da08b4bfe84eacc9a1d9642046c3b3c<\/p>\n<p style=\"text-align: center;\">0dd7f10fdf60fc36d81558e0c4930984<\/p>\n<p style=\"text-align: center;\">0e01ec14c25f9732cc47cf6344107672<\/p>\n<p style=\"text-align: center;\">10191b6ce29b4e2bddb9e57d99e6c471<\/p>\n<p style=\"text-align: center;\">105757d1499f3790e69fb1a41e372fd9<\/p>\n<p style=\"text-align: center;\">11166f8319c08c70fc886433a7dac92d<\/p>\n<p style=\"text-align: center;\">1223302912ec70c7c8350268a13ad226<\/p>\n<p style=\"text-align: center;\">139e071dd83304cdcfd5280022a0f958<\/p>\n<p style=\"text-align: center;\">13c93dc9186258d6c335b16dc7bb3c8c<\/p>\n<p style=\"text-align: center;\">14e2b0e47887c3bfbddb3b66012cb6e8<\/p>\n<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\">APT40 MD5 hashes<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1><\/h1>\n<h3>Endnotes<\/h3>\n<ol>\n<li>CISA AA21-200A: <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-200a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-200a<\/a><\/li>\n<li>CISA AA21-200B: <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-200b\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-200b<\/a><\/li>\n<li>The White House Statement on PRC Malicious Cyber Activities: <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/07\/19\/the-united-states-joined-by-allies-and-partners-attributes-malicious-cyber-activity-and-irresponsible-state-behavior-to-the-peoples-republic-of-china\/\">https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/07\/19\/the-united-states-joined-by-allies-and-partners-attributes-malicious-cyber-activity-and-irresponsible-state-behavior-to-the-peoples-republic-of-china\/<\/a><\/li>\n<li>MITRE ATT&amp;CK Framework: <a href=\"https:\/\/attack.mitre.org\/matrices\/enterprise\/\">https:\/\/attack.mitre.org\/matrices\/enterprise\/<\/a><\/li>\n<li>CISA AA21-200A APT20 References: <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-200a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-200a<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-133a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-133a<\/a><\/li>\n<li><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-275a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-275a<\/a><\/li>\n<li><a href=\"https:\/\/media.defense.gov\/2020\/Oct\/20\/2002519884\/-1\/-1\/0\/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF\">https:\/\/media.defense.gov\/2020\/Oct\/20\/2002519884\/-1\/-1\/0\/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/nsacyber\/chinese-state-sponsored-cyber-operations-observed-ttps\">https:\/\/github.com\/nsacyber\/chinese-state-sponsored-cyber-operations-observed-ttps<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Author: Christopher Kim TLP: WHITE &nbsp; 1. Executive Summary On 19 July, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) published a joint advisory on a Chinese Advanced Persistent Threat (APT) APT40, also known as BRONZE MOHAWK, FEVERDREAM, and MUDCARP. The advisory provided information about the APT\u2019s tactics, techniques, [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":3324,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[529,332,189],"class_list":{"0":"post-6628","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-apt40","9":"tag-china","10":"tag-cybersecurity","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Advisory: APT40 TTPs and Trends<\/title>\n<meta name=\"description\" content=\"Cyber Threat Advisory: APT40 TTPs and Trends. On 19 July, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) published a joint advisory on a Chinese Advanced Persistent Threat (APT) APT40, also known as BRONZE MOHAWK, FEVERDREAM, and MUDCARP. The advisory provided information about the APT\u2019s tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and mitigation recommendations.1 On this same day, the FBI, CISA, and National Security Agency (NSA) published a joint advisory on trends in cyber espionage activity that they observed across various Chinese state\u2013sponsored actors.2 These advisories coincide with the White House\u2019s July statement accusing the People\u2019s Republic of China (PRC) of hiring malicious actors to conduct, in early March 2021, cyber espionage operations that exploit zero-day vulnerabilities in Microsoft Exchange Servers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Advisory: APT40 TTPs and Trends\" \/>\n<meta property=\"og:description\" content=\"Cyber Threat Advisory: APT40 TTPs and Trends. On 19 July, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) published a joint advisory on a Chinese Advanced Persistent Threat (APT) APT40, also known as BRONZE MOHAWK, FEVERDREAM, and MUDCARP. The advisory provided information about the APT\u2019s tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and mitigation recommendations.1 On this same day, the FBI, CISA, and National Security Agency (NSA) published a joint advisory on trends in cyber espionage activity that they observed across various Chinese state\u2013sponsored actors.2 These advisories coincide with the White House\u2019s July statement accusing the People\u2019s Republic of China (PRC) of hiring malicious actors to conduct, in early March 2021, cyber espionage operations that exploit zero-day vulnerabilities in Microsoft Exchange Servers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-20T21:58:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T19:20:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/top-10-dns-attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-apt40-ttps-and-trends\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-apt40-ttps-and-trends\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Cyber Threat Advisory: APT40 TTPs and Trends\",\"datePublished\":\"2021-07-20T21:58:36+00:00\",\"dateModified\":\"2024-08-07T19:20:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-apt40-ttps-and-trends\\\/\"},\"wordCount\":1919,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-apt40-ttps-and-trends\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/top-10-dns-attacks.jpg\",\"keywords\":[\"APT40\",\"china\",\"Cybersecurity\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-apt40-ttps-and-trends\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-apt40-ttps-and-trends\\\/\",\"name\":\"Cyber Threat Advisory: APT40 TTPs and Trends\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-apt40-ttps-and-trends\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-apt40-ttps-and-trends\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/top-10-dns-attacks.jpg\",\"datePublished\":\"2021-07-20T21:58:36+00:00\",\"dateModified\":\"2024-08-07T19:20:45+00:00\",\"description\":\"Cyber Threat Advisory: APT40 TTPs and Trends. On 19 July, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) published a joint advisory on a Chinese Advanced Persistent Threat (APT) APT40, also known as BRONZE MOHAWK, FEVERDREAM, and MUDCARP. The advisory provided information about the APT\u2019s tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and mitigation recommendations.1 On this same day, the FBI, CISA, and National Security Agency (NSA) published a joint advisory on trends in cyber espionage activity that they observed across various Chinese state\u2013sponsored actors.2 These advisories coincide with the White House\u2019s July statement accusing the People\u2019s Republic of China (PRC) of hiring malicious actors to conduct, in early March 2021, cyber espionage operations that exploit zero-day vulnerabilities in Microsoft Exchange Servers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-apt40-ttps-and-trends\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-apt40-ttps-and-trends\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-apt40-ttps-and-trends\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/top-10-dns-attacks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/top-10-dns-attacks.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-apt40-ttps-and-trends\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Advisory: APT40 TTPs and Trends\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Advisory: APT40 TTPs and Trends","description":"Cyber Threat Advisory: APT40 TTPs and Trends. On 19 July, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) published a joint advisory on a Chinese Advanced Persistent Threat (APT) APT40, also known as BRONZE MOHAWK, FEVERDREAM, and MUDCARP. The advisory provided information about the APT\u2019s tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and mitigation recommendations.1 On this same day, the FBI, CISA, and National Security Agency (NSA) published a joint advisory on trends in cyber espionage activity that they observed across various Chinese state\u2013sponsored actors.2 These advisories coincide with the White House\u2019s July statement accusing the People\u2019s Republic of China (PRC) of hiring malicious actors to conduct, in early March 2021, cyber espionage operations that exploit zero-day vulnerabilities in Microsoft Exchange Servers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Advisory: APT40 TTPs and Trends","og_description":"Cyber Threat Advisory: APT40 TTPs and Trends. On 19 July, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) published a joint advisory on a Chinese Advanced Persistent Threat (APT) APT40, also known as BRONZE MOHAWK, FEVERDREAM, and MUDCARP. The advisory provided information about the APT\u2019s tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and mitigation recommendations.1 On this same day, the FBI, CISA, and National Security Agency (NSA) published a joint advisory on trends in cyber espionage activity that they observed across various Chinese state\u2013sponsored actors.2 These advisories coincide with the White House\u2019s July statement accusing the People\u2019s Republic of China (PRC) of hiring malicious actors to conduct, in early March 2021, cyber espionage operations that exploit zero-day vulnerabilities in Microsoft Exchange Servers.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/","og_site_name":"Infoblox Blog","article_published_time":"2021-07-20T21:58:36+00:00","article_modified_time":"2024-08-07T19:20:45+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/top-10-dns-attacks.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Cyber Threat Advisory: APT40 TTPs and Trends","datePublished":"2021-07-20T21:58:36+00:00","dateModified":"2024-08-07T19:20:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/"},"wordCount":1919,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/top-10-dns-attacks.jpg","keywords":["APT40","china","Cybersecurity"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/","name":"Cyber Threat Advisory: APT40 TTPs and Trends","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/top-10-dns-attacks.jpg","datePublished":"2021-07-20T21:58:36+00:00","dateModified":"2024-08-07T19:20:45+00:00","description":"Cyber Threat Advisory: APT40 TTPs and Trends. On 19 July, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) published a joint advisory on a Chinese Advanced Persistent Threat (APT) APT40, also known as BRONZE MOHAWK, FEVERDREAM, and MUDCARP. The advisory provided information about the APT\u2019s tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and mitigation recommendations.1 On this same day, the FBI, CISA, and National Security Agency (NSA) published a joint advisory on trends in cyber espionage activity that they observed across various Chinese state\u2013sponsored actors.2 These advisories coincide with the White House\u2019s July statement accusing the People\u2019s Republic of China (PRC) of hiring malicious actors to conduct, in early March 2021, cyber espionage operations that exploit zero-day vulnerabilities in Microsoft Exchange Servers.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/top-10-dns-attacks.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/top-10-dns-attacks.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-apt40-ttps-and-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Advisory: APT40 TTPs and Trends"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6628"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6628\/revisions"}],"predecessor-version":[{"id":6640,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6628\/revisions\/6640"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3324"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}