{"id":50585,"date":"2015-04-07T19:02:01","date_gmt":"2015-04-07T19:02:01","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=50585"},"modified":"2015-04-09T19:35:22","modified_gmt":"2015-04-09T19:35:22","slug":"spear-phishing-malware-a-lethal-combination","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/","title":{"rendered":"Spear Phishing &#038; Malware &#8211; A Lethal Combination"},"content":{"rendered":"<p><\/br><\/p>\n<p><i><font SIZE=\"2\">Recent cyber attacks on corporations are displaying a frightening level of sophistication that combines spear phishing, social engineering &#038; malware.&#8211;PC Pitstop<\/i><\/font><\/p>\n<h4>Spear Phishing &#038; Malware &#8211; A Lethal Combination<\/h4>\n<p>By Stu Sjouwerman, for KnowBe4.com Security Awareness Training<\/p>\n<p><strong>A Combo of Spear Phishing, Social Engineering and DDoS Attacks<\/strong><\/p>\n<p>IBM reported that the last 12 months, spear phishing campaigns were used to initially infect employee workstations with the Upatre downloader. Once infected, this pulls down the Dyre Trojan which starts monitoring the machine and records which bank sites are accessed. As part of the installation, the <a href=\"http:\/\/blog.knowbe4.com\/ibm-dyre-wolf-cyber-gang-uses-spear-phishing-for-1-million-cyberheists\" target=\"_blank\">Dyre malware<\/a> establishes persistence by creating a service innocuously named \u201cGoogle Update Service\u201d. This service is set to run automatically each time the system restarts.  <\/p>\n<p>Once one of the hundreds of bank sites that Dyre was built to exploit comes up, Dyre creates a fake screen that tells the user that the bank&#8217;s site is having problems and to call a certain number. The employee who calls the number is connected to an English-speaking criminal operator who already knows what bank the users think they are contacting.<\/p>\n<p>The operator then social engineers the user and gets their banking details. Immediately after, large wire transfers are made out of the compromised account. The wires are then rapidly moved over a series of international banks until they are cashed out by money mules.  In one instance, IBM said, the gang hit the victim company with a denial of service attack \u2014 essentially bringing down their Web capabilities \u2014 so it would not discover the theft until much later.<\/p>\n<p>&#8220;What&#8217;s very different in this case, is we saw a pivot of the attackers to use a set of social engineering techniques that I think are unprecedented,&#8221; said Caleb Barlow, vice president of IBM Security. &#8220;The focus on wire transfers of large sums of money really got our attention.&#8221; <\/p>\n<p><b><a href=\"http:\/\/blog.knowbe4.com\/ibm-dyre-wolf-cyber-gang-uses-spear-phishing-for-1-million-cyberheists\" target=\"_blank\"><strong>What To Do About It<\/strong>&#8211;Article Continued Here<\/a><\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent cyber attacks on corporations are displaying a frightening level of sophistication that combines spear phishing, social engineering &#038; malware.<\/p>\n","protected":false},"author":40,"featured_media":41739,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4352],"tags":[484],"class_list":["post-50585","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowbe4-com","tag-spear-phishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spear Phishing &amp; Malware - A Lethal Combination<\/title>\n<meta name=\"description\" content=\"Spear Phishing &amp; Malware - A Lethal Combination - Recent cyber attacks on corporations are displaying a frightening level of sophistication that combines spear phishing, social engineering &amp; malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spear Phishing &amp; Malware - A Lethal Combination\" \/>\n<meta property=\"og:description\" content=\"Spear Phishing &amp; Malware - A Lethal Combination - Recent cyber attacks on corporations are displaying a frightening level of sophistication that combines spear phishing, social engineering &amp; malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-07T19:02:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-04-09T19:35:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/spearphishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"knowbe4.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"knowbe4.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/\"},\"author\":{\"name\":\"knowbe4.com\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/02162494533603435e72f7f0cfc7dfd0\"},\"headline\":\"Spear Phishing &#038; Malware &#8211; A Lethal Combination\",\"datePublished\":\"2015-04-07T19:02:01+00:00\",\"dateModified\":\"2015-04-09T19:35:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/\"},\"wordCount\":322,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/spearphishing.jpg\",\"keywords\":[\"spear phishing\"],\"articleSection\":[\"knowbe4.com\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/\",\"name\":\"Spear Phishing & Malware - A Lethal Combination\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/spearphishing.jpg\",\"datePublished\":\"2015-04-07T19:02:01+00:00\",\"dateModified\":\"2015-04-09T19:35:22+00:00\",\"description\":\"Spear Phishing & Malware - A Lethal Combination - Recent cyber attacks on corporations are displaying a frightening level of sophistication that combines spear phishing, social engineering & malware.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/spearphishing.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/spearphishing.jpg\",\"width\":150,\"height\":150},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/spear-phishing-malware-a-lethal-combination\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spear Phishing &#038; Malware &#8211; A Lethal Combination\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/02162494533603435e72f7f0cfc7dfd0\",\"name\":\"knowbe4.com\",\"description\":\"KnowBe4 delivers next-generation security awareness training and testing, security consulting \\\/ penetration testing and innovative security software products addressing the needs of business owners, IT, HR, and end-users.\",\"sameAs\":[\"http:\\\/\\\/knowbe4.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/knowbe4-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spear Phishing & Malware - A Lethal Combination","description":"Spear Phishing & Malware - A Lethal Combination - Recent cyber attacks on corporations are displaying a frightening level of sophistication that combines spear phishing, social engineering & malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/","og_locale":"en_US","og_type":"article","og_title":"Spear Phishing & Malware - A Lethal Combination","og_description":"Spear Phishing & Malware - A Lethal Combination - Recent cyber attacks on corporations are displaying a frightening level of sophistication that combines spear phishing, social engineering & malware.","og_url":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2015-04-07T19:02:01+00:00","article_modified_time":"2015-04-09T19:35:22+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/spearphishing.jpg","type":"image\/jpeg"}],"author":"knowbe4.com","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"knowbe4.com","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/"},"author":{"name":"knowbe4.com","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/02162494533603435e72f7f0cfc7dfd0"},"headline":"Spear Phishing &#038; Malware &#8211; A Lethal Combination","datePublished":"2015-04-07T19:02:01+00:00","dateModified":"2015-04-09T19:35:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/"},"wordCount":322,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/spearphishing.jpg","keywords":["spear phishing"],"articleSection":["knowbe4.com"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/","url":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/","name":"Spear Phishing & Malware - A Lethal Combination","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/spearphishing.jpg","datePublished":"2015-04-07T19:02:01+00:00","dateModified":"2015-04-09T19:35:22+00:00","description":"Spear Phishing & Malware - A Lethal Combination - Recent cyber attacks on corporations are displaying a frightening level of sophistication that combines spear phishing, social engineering & malware.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/spearphishing.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/spearphishing.jpg","width":150,"height":150},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/spear-phishing-malware-a-lethal-combination\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Spear Phishing &#038; Malware &#8211; A Lethal Combination"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/02162494533603435e72f7f0cfc7dfd0","name":"knowbe4.com","description":"KnowBe4 delivers next-generation security awareness training and testing, security consulting \/ penetration testing and innovative security software products addressing the needs of business owners, IT, HR, and end-users.","sameAs":["http:\/\/knowbe4.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/knowbe4-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/50585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=50585"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/50585\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/41739"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=50585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=50585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=50585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}