{"id":73496,"date":"2022-11-17T09:54:40","date_gmt":"2022-11-17T01:54:40","guid":{"rendered":"https:\/\/x-phy.com\/?p=73496"},"modified":"2025-10-10T07:09:15","modified_gmt":"2025-10-10T07:09:15","slug":"hellokitty-ransomware-prevention-with-x-phy-ssd","status":"publish","type":"post","link":"https:\/\/x-phy.com\/hellokitty-ransomware-prevention-with-x-phy-ssd\/","title":{"rendered":"HelloKitty Ransomware Prevention with X-PHY SSD"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"73496\" class=\"elementor elementor-73496\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8cb3ca e-flex e-con-boxed e-con e-parent\" data-id=\"e8cb3ca\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-762422e4 elementor-widget elementor-widget-text-editor\" data-id=\"762422e4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The HelloKitty ransomware (aka FiveHands), has its earliest traces from November 2020, discovered by FBI in January 2021, and has potential ties with the DeathRansom. This\u00a0<a href=\"https:\/\/x-phy.com\/can-the-us-led-multinational-counterattack-stop-ransomwares-gold-rush\/\" target=\"_blank\" rel=\"noopener\">Ransomware<\/a>\u00a0was highly active in December 2020, targeting organizations across multiple industries and countries. The ransomware demands a bitcoin payment written in a ransom note after\u00a0<a href=\"https:\/\/x-phy.com\/encryption-in-nand-storage-devices-data-safety\/\" target=\"_blank\" rel=\"noopener\">encrypting files<\/a>\u00a0on a system. It too uses the trending double extortion technique of threatening data destruction and confidentiality breach, extended to DDoS attacks on public facing assets in some cases. It means that upon failure to acquire a ransom payment, the victim\u2019s data will either be published on the Babuk site payload.bin or would be sold to a third-party data broker.<\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Hello-Kitty-2.jpg\" sizes=\"(max-width: 900px) 100vw, 900px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Hello-Kitty-2.jpg 900w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Hello-Kitty-2-300x169.jpg 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Hello-Kitty-2-768x432.jpg 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Hello-Kitty-2-450x253.jpg 450w\" alt=\"\" width=\"900\" height=\"506\" \/><\/p><h3>Attack Vectors<\/h3><p>How does the HelloKitty ransomware gain access to the victims? Well, it uses a number of attack vectors like using compromised credentials and recently patched security flaws in <a href=\"https:\/\/www.sonicwall.com\/\" target=\"_blank\" rel=\"noopener\">SonicWall<\/a> products (CVE-2021-20016, CVE-2021-20021, CVE-2021-20022, CVE-2021-2002). It may also use phishing emails or cause secondary infection from an initial malware attack. After initial access, HelloKitty operators use some common red team penetration tools like Cobalt Strike, Mandiant\u2019s Commando, or PowerShell Empire preloaded with tools like Bloodhound and Mimikatz. Using these for reconnaissance and data collection, they first map the network and escalate privileges before exfiltration and encryption.<\/p><h3>Attack Victims<\/h3><h5>Video Game Manufacturing &#8211; Poland<\/h5><p>The most well-known attack by HelloKitty was on the systems of\u00a0<a href=\"https:\/\/www.cdprojektred.com\/\" target=\"_blank\" rel=\"noopener\">CD Projekt Red<\/a>\u00a0in February 2021, that claimed to have stolen Cyberpunk 2077, Witcher 3, Gwent, and other games&#8217; source code. It later claimed having sold the sensitive files to another threat actor. Below is the ransom note it left for CD Projekt Red on its encrypted machines:<\/p><p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Hello-Kitty-3.jpg\" sizes=\"(max-width: 1600px) 100vw, 1600px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Hello-Kitty-3.jpg 1600w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Hello-Kitty-3-300x78.jpg 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Hello-Kitty-3-1024x266.jpg 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Hello-Kitty-3-768x199.jpg 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Hello-Kitty-3-1536x398.jpg 1536w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Hello-Kitty-3-450x117.jpg 450w\" alt=\"\" width=\"1600\" height=\"415\" \/><\/p><h5>CEMIG Powerplant &#8211; Brazil<\/h5><p>A Brazilian electric power company called\u00a0<a href=\"https:\/\/www.cemig.com.br\/\" target=\"_blank\" rel=\"noopener\">CEMIG<\/a>\u00a0(Companhia Energ\u00e9tica de Minas Gerais) announced falling victim to a cyber attack in December 2020. HelloKitty ransomware was involved as revealed later, and stole a huge volume of data from the company, causing suspension of the company\u2019s WhatsApp, SMS channels, and online app service.<\/p><p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/KItty4.jpg\" sizes=\"(max-width: 1030px) 100vw, 1030px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/KItty4.jpg 1030w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/KItty4-300x129.jpg 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/KItty4-1024x439.jpg 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/KItty4-768x330.jpg 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/KItty4-450x193.jpg 450w\" alt=\"\" width=\"1030\" height=\"442\" \/><\/p><h5>Healthcare Service &#8211; UK<\/h5><p>Another HelloKitty attack targeted a UK Healthcare organisation earlier in January 2021. Below is the ransom note found on encrypted computers of the facility. The organization\u2019s name has been omitted.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-5.png\" sizes=\"(max-width: 1030px) 100vw, 1030px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-5.png 1030w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-5-300x169.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-5-1024x577.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-5-768x432.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-5-450x253.png 450w\" alt=\"\" width=\"1030\" height=\"580\" \/><\/p><h5>IT Service &#8211; France<\/h5><p>Another French IT service was attacked around Christmas 2020, leaving another HelloKitty ransom note.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-6.png\" sizes=\"(max-width: 1030px) 100vw, 1030px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-6.png 1030w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-6-300x150.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-6-1024x512.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-6-768x384.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-6-450x225.png 450w\" alt=\"\" width=\"1030\" height=\"515\" \/><\/p><p>In July 2021, the ransomware operators introduced a Linux variant for targeting VMware ESXi virtual machine platform, and its activity went up since July. Targeting enterprise virtual machines, the threat actors could encrypt multiple servers simultaneously, with a single command, saving time and effort.<\/p><p>The FBI also shared an extensive collection of <a href=\"https:\/\/www.ic3.gov\/Media\/News\/2021\/211029.pdf\" target=\"_blank\" rel=\"noopener\">indicators of compromise (IOCs)<\/a>, as usually happens in case of any cyber attack chain.<\/p><h3>Attack Workflow<\/h3><p>Once the ransomware is sent to the victim\u2019s computer via malspam campaigns, fake software updating tools, untrusted download sources, unofficial (third party) software activation tools and Trojans, the .exe file is executed on the system and the below workflow begins to unfold.<\/p><h5>1. Termination of processes and Windows services.<\/h5><p>HelloKitty upon execution begins to terminate all processes and windows services that may interrupt its infection. These are usually associated with security, backup or accounting softwares, as well as email and database servers.<\/p><h5>\u00a02. Encryption of files with .KITTY or .CRYPTED file extensions.<\/h5><p>On Windows systems, HelloKitty ransomware uses a combination of AES-128 + NTRU encryption. On Linux systems, it uses the combination AES-256 + ECDH. It appends the extension .kitty or .crypted to locked file names.<\/p><h5>3. Ransom note.<\/h5><p>After encryption of files, it leaves a plain text ransom note on the desktop of victim machines. It addresses the victim, demands a ransom amount in BTC and gives further directions or bitcoin address. It usually contains a .onion URL that the victim can open using the Tor browser.<\/p><h5>4. Deletion of shadow copies.<\/h5><p>After successful encryption, HelloKitty deletes shadow copies and backups of encrypted files from the affected systems. This is to make sure no data is retrieved from backups.<\/p><h3>HelloKitty; A Sample<\/h3><p>Hundreds of Indicators of Compromise are circulating on threat forums to enable security teams to secure their assets based on signature-based detection. This means that firms reliant on IoCs may fall victim to new variants and only known IoCs can be blocked. Below is just one sample of the ransomware in SHA-256 algorithm.<\/p><p>9a7daafc56300bd94ceef23eac56a0735b63ec6b9a7a409fb5a9b63efe1aa0b0<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-7.jpg\" sizes=\"(max-width: 1097px) 100vw, 1097px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-7.jpg 1097w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-7-300x60.jpg 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-7-1024x205.jpg 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-7-768x154.jpg 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-7-450x90.jpg 450w\" alt=\"\" width=\"1097\" height=\"220\" \/><\/p><p>This particular sample was detected as malicious by 58 out of 69 detection tools. It targets Intel 386 or later processors and compatible processors.<\/p><h3>Protection from HelloKitty Ransomware using X-Phy Cybersecurity SSD Protection<\/h3><p>X-Phy AI-embedded cyber secure SSD is protected by all known and unknown cyber threats. It is designed to thwart all cyber attacks without signature-based detections. The SSD detects a malware or cyber attack in a matter of seconds and securely locks the device before attackers can access any data.<\/p><p>Flexxon tested the HelloKitty ransomware on a X-PHY<sup>\u00ae<\/sup> SSD and a normal SSD to see the responses. In less than 5 seconds, X-PHY<sup>\u00ae<\/sup> stopped the attack dead in its tracks, locked all data keeping it untouched, and immediately notified the user via email and OTP.<\/p><h3>Testing with the normal SSD\/without the X-PHY<\/h3><p>1<\/p><figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-8.png\" sizes=\"(max-width: 1125px) 100vw, 1125px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-8.png 1125w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-8-300x169.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-8-1024x577.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-8-768x433.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-8-450x254.png 450w\" alt=\"\" width=\"1125\" height=\"634\" \/><figcaption>The HelloKitty ransomware is added to the device.<\/figcaption><\/figure><p>2<\/p><figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-9.png\" sizes=\"(max-width: 1600px) 100vw, 1600px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-9.png 1600w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-9-300x169.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-9-1024x576.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-9-768x432.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-9-1536x864.png 1536w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-9-450x253.png 450w\" alt=\"\" width=\"1600\" height=\"900\" \/><figcaption>The Hello Kitty ransomware is executed.<\/figcaption><\/figure><p>3<\/p><figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-10.png\" sizes=\"(max-width: 983px) 100vw, 983px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-10.png 983w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-10-300x144.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-10-768x370.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-10-450x217.png 450w\" alt=\"\" width=\"983\" height=\"473\" \/><figcaption>After executing the HelloKitty ransomware, all the files are encrypted. The infected file names are ending with the extension .crypted.<\/figcaption><\/figure><h3>Testing with the X-PHY<sup>\u00ae<\/sup> SSD<\/h3><figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-11.png\" sizes=\"(max-width: 1600px) 100vw, 1600px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-11.png 1600w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-11-300x159.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-11-1024x543.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-11-768x408.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-11-1536x815.png 1536w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-11-450x239.png 450w\" alt=\"\" width=\"1600\" height=\"849\" \/><figcaption>To protect from the ransomware attack, go to the X-PHY tool\u2019s configuration and enable the ransomware protection feature as well as the email alert.<\/figcaption><\/figure><figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-12.jpg\" sizes=\"(max-width: 1600px) 100vw, 1600px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-12.jpg 1600w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-12-300x169.jpg 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-12-1024x576.jpg 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-12-768x432.jpg 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-12-1536x864.jpg 1536w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Kitty-12-450x253.jpg 450w\" alt=\"\" width=\"1600\" height=\"900\" \/><figcaption>After executing the Hi_Kitty_2 file, HelloKitty ransomware is detected and the X-PHY drive is locked, the device is shut down immediately to stop the ransomware\u2019s execution.<\/figcaption><\/figure><p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/KItty-13.png\" sizes=\"(max-width: 1082px) 100vw, 1082px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/KItty-13.png 1082w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/KItty-13-300x203.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/KItty-13-1024x694.png 1024w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/KItty-13-768x520.png 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/KItty-13-450x305.png 450w\" alt=\"\" width=\"1082\" height=\"733\" \/><\/p><p>To unlock X-PHY<sup>\u00ae<\/sup>, the user will have to use connected duo authentication to unlock X-PHY<sup>\u00ae<\/sup>, otherwise, it remains locked. After unlocking, X-PHY\u00ae will have recorded all events in the event log, and the user can now access data in a normal way.<\/p><p>As attackers utilise more sophisticated attack techniques, it is becoming harder and harder for companies to stay ahead of the attacker\u2019s techniques and keep their data secure from cyberattacks. That\u2019s why we brought X-PHY<sup>\u00ae<\/sup> to you, it automatically detects suspicious behavior since it is highly trained with huge databases of malware to understand all possible behavior for malware.<\/p><p>X-PHY<sup>\u00ae<\/sup> AI core is placed closest to your data and is highly trained to protect you from any threat that can touch your data.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/12\/Active-detective.jpg\" sizes=\"(max-width: 866px) 100vw, 866px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/12\/Active-detective.jpg 866w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/12\/Active-detective-300x160.jpg 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/12\/Active-detective-768x410.jpg 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/12\/Active-detective-450x240.jpg 450w\" alt=\"\" width=\"866\" height=\"462\" \/><\/p><h3>X-PHY<sup>\u00ae<\/sup> Response Flow<\/h3><ul><li style=\"font-weight: 400;\" aria-level=\"1\">XPHY FORENSIC<sup>TM<\/sup> AGENT features ACTIVE DETECTIVE and DEEP INVESTIGATION introduce extra file protection features by preventing any illegal data modifications. They also record all activities and their application, making it easy for X-PHY<sup>\u00ae<\/sup> to identify suspicious actors.<\/li><li style=\"font-weight: 400;\" aria-level=\"1\">XPHY GUARD<sup>TM<\/sup> THREAT LOCK features SECURITY SCOUT and GUARDIAN PRO-X work together to stop any attempt by the ransomware to breach or clone your sensitive data.<\/li><li style=\"font-weight: 400;\" aria-level=\"1\">After noticing suspicious activity to breach and\/or to encrypt user data, it will trigger XPHY FACTOR ENCRYPTION<sup>TM<\/sup> LOCK. KEYCODE 2-FACTOR feature within XPHY FACTOR ENCRYPTION<sup>TM<\/sup> LOCK locks down all the data in X-PHY<sup>\u00ae<\/sup> making it inaccessible to the ransomware.<\/li><li style=\"font-weight: 400;\" aria-level=\"1\">X-PHY<sup>\u00ae<\/sup> SSD sends notification to the user in their computer showing that ransomware has been detected. An email notification is also sent to the user simultaneously through the user\u2019s registered email. The user will require OTP to unlock the SSD.<\/li><li style=\"font-weight: 400;\" aria-level=\"1\">X-PHY<sup>\u00ae<\/sup> records the attack activity in the event log, and will automatically stop any action with the same behavior in the future.<\/li><li style=\"font-weight: 400;\" aria-level=\"1\">To unlock X-PHY<sup>\u00ae<\/sup>, the user will have to use connected duo authentication to unlock X-PHY<sup>\u00ae<\/sup>, otherwise, it remains locked. After unlocking, X-PHY<sup>\u00ae<\/sup> will have recorded all events in the event log, and the user can now access data in a normal way.<\/li><\/ul><h3>Conclusion<\/h3><p>As cyberattacks grow in number and malware variants are introduced every single day,\u00a0<a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/xphyguard\/\" target=\"_blank\" rel=\"noopener\">cybersecurity solutions<\/a>\u00a0reliant on IoCs are at a high risk of falling victim to a new malware. The consequences in case of ransomware attack include data deletion, loss of backup, extortion, confidentiality breach, etc. Therefore it is advisable that firms should switch to protection at the firmware level, the x-phy SSD that does not allow any unauthorized access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The HelloKitty ransomware (aka FiveHands), has its earliest traces from November 2020, discovered by FBI in January 2021, and has potential ties with the DeathRansom. This\u00a0Ransomware\u00a0was highly active in December [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":91667,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[24,25],"class_list":["post-73496","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-use-cases","tag-hello-kitty-cyber","tag-hellokitty-ransomware-protection"],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/73496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=73496"}],"version-history":[{"count":1,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/73496\/revisions"}],"predecessor-version":[{"id":110534,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/73496\/revisions\/110534"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media\/91667"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=73496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/categories?post=73496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/tags?post=73496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}