{"id":3492,"date":"2021-10-22T17:03:20","date_gmt":"2021-10-22T11:33:20","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=3492"},"modified":"2021-10-22T17:03:22","modified_gmt":"2021-10-22T11:33:22","slug":"enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/","title":{"rendered":"Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">Widespread malware operations are designing YouTube videos to administrate password-hijacking Trojans to unsuspecting viewers. Passwords hijacking Trojans are the Malware that slowly runs on a computer while hijacking credentials, screenshots of active Windows, cookies, credit cards stored in browsers, FTP credentials, and arbitrary files decided by the threat actors.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">When installed, the Trojan will communicate with a Command &amp; Control server, where it waits for commands to run by the threat actor, which could bring out the running of additional malware.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Malicious YouTube Videos Gone Wild<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Attackers have long utilized YouTube videos as a way to distribute malware through the embedded links in videos descriptions. However, this week has Cluster25 security researchers told our experts that there has been a significant uptick in Malware operations on YouTube inserting different credentials-hijacking Trojans.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Security researchers also told our experts that it is similarly two clusters of malicious activity being conducted simultaneously \u2013 one pushing the RedLine malware and the other pushing Racoon hijacker.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The investigator also said that thousands of videos and channels had been made as part of this enormous malware operation, with 100 new videos and 81 channels generated in just twenty minutes.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Also later explained that the threat actors utilize the Google accounts they hijack to launch new YouTube channels to spread malware, creating a never-ending and ever-growing cycle.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">&#8220;The threat actors have thousands of new channels available because they infect new clients every day. As part of these attacks, they steal victim&#8217;s Google credentials, which are then used to create new YouTube Videos to distribute the malware,&#8221; Frost told our experts.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The attacks start with the threat actors creating numerous YouTube channels filled with videos about software cracks, licenses, how-to guides, cryptocurrency, mining, game cheats, VPN software, and pretty much any other popular category.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"613\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image1-1024x613.jpg\" alt=\"Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image1\" class=\"wp-image-3494\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image1-1024x613.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image1-300x180.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image1-768x460.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image1.jpg 1410w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">All these videos contain content that explains how to perform a task using an exact program or service. Moreover, the YouTube video\u2019s description includes an asserted link to be associated tool utilized to distribute the malware.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"728\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image2-1024x728.jpg\" alt=\"Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image2\" class=\"wp-image-3495\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image2-1024x728.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image2-300x213.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image2-768x546.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image2.jpg 1511w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">If a video has a bit.ly link, then it will lead to another file-sharing site hosting the RedLine password-stealing malware infection. However, in case it includes an unshortened domain, it will redirect to a page on the tap link .cc domain to push Racoon Stealer, as given below:<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"798\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image3-1024x798.jpg\" alt=\"Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image3\" class=\"wp-image-3496\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image3-1024x798.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image3-300x234.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image3-768x598.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-image3.jpg 1447w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">Once a user is affected, the malware will process to scan all the installed browsers and the computer for cryptocurrency wallets, credit cards, credentials, and other information and upload it back to the threat actor.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Google told our experts that they are aware of the operation and are taking action to disrupt the activity.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">&#8220;We are aware of this campaign and are currently taking action to block activity by this threat actor and flagging all links to Safe Browsing. As always, we are continuously improving our detection methods and investing in new tools and features that automatically identify and stop threats like this one. It is also important that users remain aware of these types of threats and take appropriate action to further protect themselves.&#8221; &#8211; Google.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Google also revealed this week a phishing campaign that distributed passwords stealing Trojans utilized to hijack the accounts of YouTube Creators. These accounts were then sold on dark web markets or utilized to execute cryptocurrency scams.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Downloading Software can be Harmful<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">These operations show how essential it is not to download the program from the Internet unexpectedly, as sites like YouTube cannot effectively every link added by video publishers.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Therefore, a user should research a site before downloading and installing anything from it to know if they have a good character and can be trusted. Even then, it is always suggested that you initial upload the program to a site like VirusTotal to confirm if it is safe to execute.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">If you have mistakenly fallen for this attack and installed a program from the same link, it is strongly suggested that you scan your computer with an antivirus program. After you have removed any malware detected in the virus scan, you have to immediately change any passwords saved in your browsers.&nbsp;&nbsp;<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Widespread malware operations are designing YouTube videos to administrate password-hijacking Trojans to unsuspecting viewers. Passwords hijacking Trojans are the Malware that slowly runs on a computer while hijacking credentials, screenshots of active Windows, cookies, credit cards stored in browsers, FTP credentials, and arbitrary files decided by the threat actors. When installed, the Trojan will communicate [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3497,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Widespread malware operations are designing YouTube videos to administrate password-hijacking Trojans to unsuspecting viewers. Passwords hijacking Trojans are the Malware that slowly runs on a computer while hijacking credentials, screenshots of active Windows, cookies, credit cards stored in browsers, FTP credentials, and arbitrary files decided by the threat actors. When installed, the Trojan will communicate [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-22T11:33:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-22T11:33:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan\",\"datePublished\":\"2021-10-22T11:33:20+00:00\",\"dateModified\":\"2021-10-22T11:33:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/\"},\"wordCount\":687,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/\",\"url\":\"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/\",\"name\":\"Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-10-22T11:33:20+00:00\",\"dateModified\":\"2021-10-22T11:33:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/","og_locale":"en_US","og_type":"article","og_title":"Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan - Xiarch Solutions Private Limited","og_description":"Widespread malware operations are designing YouTube videos to administrate password-hijacking Trojans to unsuspecting viewers. Passwords hijacking Trojans are the Malware that slowly runs on a computer while hijacking credentials, screenshots of active Windows, cookies, credit cards stored in browsers, FTP credentials, and arbitrary files decided by the threat actors. When installed, the Trojan will communicate [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-10-22T11:33:20+00:00","article_modified_time":"2021-10-22T11:33:22+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/10\/Enormous-Operations-Utilize-YouTube-to-Inject-Password-Hijacking-Trojan-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan","datePublished":"2021-10-22T11:33:20+00:00","dateModified":"2021-10-22T11:33:22+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/"},"wordCount":687,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/","url":"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/","name":"Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-10-22T11:33:20+00:00","dateModified":"2021-10-22T11:33:22+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/enormous-operations-utilize-youtube-to-inject-password-hijacking-trojan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Enormous Operations Utilize YouTube to Inject Password-Hijacking Trojan"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/3492"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=3492"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/3492\/revisions"}],"predecessor-version":[{"id":3498,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/3492\/revisions\/3498"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/3497"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=3492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=3492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=3492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}