{"id":59598,"date":"2018-09-18T13:48:58","date_gmt":"2018-09-18T18:48:58","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=59598"},"modified":"2018-09-18T13:51:00","modified_gmt":"2018-09-18T18:51:00","slug":"kraken-ransomware-disguises-itself","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/","title":{"rendered":"Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software"},"content":{"rendered":"<p>Everything isn&#8217;t always what we seem.\u00a0 This is something we have come to know and accept.\u00a0 However, when we download a program that is supposed to protect us, that is what we expect it to do.\u00a0 Apple users were recently duped with Adware Doctor, which positioned itself as an adware prevention tool, but actually was spying on user behavior.\u00a0 Now, hackers have used the name and logo of the SuperAntiSpyware, an anti-malware tool, to trick users into downloading the ransomware deemed <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/kraken-cryptor-ransomware-masquerading-as-superantispyware-security-program\/\">Kraken<\/a>.<\/p>\n<h4>Kraken Uses Security Program Name and Logo to Spread to Unknowing Victims<\/h4>\n<p>To be clear, SuperAntiSpyware is a legitimate anti-malware tool.\u00a0 However, Kraken stole the company&#8217;s logo and name to target users.\u00a0 The only difference between the Kacken and the legitimate program executable files are one letter in the file name.\u00a0 SuperAntiSpyware uses SUPERAntiSpyware.exe, while Kraken uses SUPERAntiSpywares.exe.\u00a0 Now, for those users who downloaded the legitimate program, you would not be impacted by this.\u00a0 However, those who downloaded the malicious file would experience encryption of various files.<\/p>\n<p>Once a user opts to download SUPERAntiSpywares.exe, the malicious executable begins to run.\u00a0 The only time this will be blocked from running would be if the user was employing a security solution that was using an<a href=\"http:\/\/www.pcmatic.com\/whitelist\"> application whitelist<\/a>.\u00a0 Or, if blacklist antivirus companies are updating the blacklist to include SUPERAntiSpywares.exe.<\/p>\n<p>If the file is allowed to run, it will first ensure the location of the device is not in a certain geographical area.\u00a0 For instance, if the device is in Iran or Brazil, the ransomware will not execute.\u00a0 Assuming you are in a location they have deemed acceptable to encrypt, the malware will scan the device for files with a variety of file extensions, including .jpeg, .doc, .zip, etc.\u00a0 Once these files are recognized, they are renamed with the file name\u00a000000000-Lock.onion and encrypted.<\/p>\n<p>At this time, there is no free option for decrypting files that have been locked by the Kraken ransomware.\u00a0 The only way users can restore locked files would be through their backup files.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Everything isn&#8217;t always what we seem.\u00a0 This is something we have come to know and accept.\u00a0 However, when we download a program that is supposed to protect us, that is what we expect it to do.\u00a0 Apple users were recently duped with Adware Doctor, which positioned itself as an adware prevention tool, but actually was [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55582,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,4949,5000,183],"tags":[5557,4363,5112,5558],"class_list":["post-59598","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-ransomware","category-ransomwarewar","category-tips","tag-kraken","tag-ransomware","tag-ransomware-attacks","tag-superantispyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software<\/title>\n<meta name=\"description\" content=\"A newly released ransomware variant, deemed Kraken, has been portraying a legitimate anti-spyware solution, targeting unknowning victims...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software\" \/>\n<meta property=\"og:description\" content=\"A newly released ransomware variant, deemed Kraken, has been portraying a legitimate anti-spyware solution, targeting unknowning victims...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-18T18:48:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-09-18T18:51:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"740\" \/>\n\t<meta property=\"og:image:height\" content=\"416\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software\",\"datePublished\":\"2018-09-18T18:48:58+00:00\",\"dateModified\":\"2018-09-18T18:51:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/\"},\"wordCount\":351,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-2.jpg\",\"keywords\":[\"Kraken\",\"ransomware\",\"ransomware attacks\",\"SUPERAntiSpyware\"],\"articleSection\":[\"Newsletter\",\"Ransomware\",\"RansomwareWar\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/\",\"name\":\"Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-2.jpg\",\"datePublished\":\"2018-09-18T18:48:58+00:00\",\"dateModified\":\"2018-09-18T18:51:00+00:00\",\"description\":\"A newly released ransomware variant, deemed Kraken, has been portraying a legitimate anti-spyware solution, targeting unknowning victims...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-2.jpg\",\"width\":740,\"height\":416,\"caption\":\"Ransomware Attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/kraken-ransomware-disguises-itself\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software","description":"A newly released ransomware variant, deemed Kraken, has been portraying a legitimate anti-spyware solution, targeting unknowning victims...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/","og_locale":"en_US","og_type":"article","og_title":"Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software","og_description":"A newly released ransomware variant, deemed Kraken, has been portraying a legitimate anti-spyware solution, targeting unknowning victims...","og_url":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-09-18T18:48:58+00:00","article_modified_time":"2018-09-18T18:51:00+00:00","og_image":[{"width":740,"height":416,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software","datePublished":"2018-09-18T18:48:58+00:00","dateModified":"2018-09-18T18:51:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/"},"wordCount":351,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","keywords":["Kraken","ransomware","ransomware attacks","SUPERAntiSpyware"],"articleSection":["Newsletter","Ransomware","RansomwareWar","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/","url":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/","name":"Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","datePublished":"2018-09-18T18:48:58+00:00","dateModified":"2018-09-18T18:51:00+00:00","description":"A newly released ransomware variant, deemed Kraken, has been portraying a legitimate anti-spyware solution, targeting unknowning victims...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-2.jpg","width":740,"height":416,"caption":"Ransomware Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/kraken-ransomware-disguises-itself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Kraken Ransomware Disguises Itself As Legitimate Anti-Spyware Software"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=59598"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59598\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55582"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=59598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=59598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=59598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}