{"id":98695,"date":"2019-05-23T06:00:24","date_gmt":"2019-05-23T13:00:24","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=98695"},"modified":"2019-05-22T15:27:48","modified_gmt":"2019-05-22T22:27:48","slug":"xdr-tales-from-the-soc-hunting-for-persistent-malware","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/05\/xdr-tales-from-the-soc-hunting-for-persistent-malware\/","title":{"rendered":"Tales From the SOC: Hunting for Persistent Malware"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\"  class=\"size-full wp-image-98696 alignright lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/control-room-1.jpg\" alt=\"\" width=\"440\" height=\"280\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/control-room-1.jpg 440w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/control-room-1-230x146.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/control-room-1-63x40.jpg 63w\" sizes=\"auto, (max-width: 440px) 100vw, 440px\" \/><\/p>\n<p><em><span style=\"font-weight: 400;\">At <\/span><a href=\"https:\/\/bit.ly\/2UE5Wz1\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Ignite '19<\/span><\/a><span style=\"font-weight: 400;\">, Vidya Gopalakrishnan, SOC Engineer, and Matt Mellen, Sr. SOC Manager, will be giving attendees a rare glimpse into the Palo Alto Networks Security Operations Center (SOC). They\u2019ll shed light on our overall strategy as well as how <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/products\/xdr\"><span style=\"font-weight: 400;\">Cortex XDR<\/span><\/a><span style=\"font-weight: 400;\"> has helped automate and enhance a tier-less security operating model. Palo Alto Networks has the benefit of being our own \"customer zero\" for all new Palo Alto Networks products, allowing us to make product improvements and develop best practices while keeping our security team on the cutting edge of technology. While Cortex XDR adds intelligence and efficiency into all three key functions of security operations \u2013 alert triage, incident investigation\/response, and threat hunting \u2013 Vidya and Matt will be focusing specifically on how they have been using it for threat hunting, the area in which companies usually have the fewest available resources. <\/span><\/em><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s an exclusive preview of how we\u2019ve used Cortex XDR to hunt, identify, and remediate a piece of persistent malware.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>How to hunt for persistent malware<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The Mitre Att&amp;ck framework describes \u201cpersistence\u201d as an action or config change that allows an adversary to maintain access to a system despite restarts, credential loss, or other interruptions. There are many techniques by which malware can achieve persistence; one common tactic is to change registry \u201crun\u201d keys, which causes a program to be executed every time a user logs in. Sounds relatively simple to identify, right? But capturing the different techniques without getting tripped up by false positives is not an easy feat without the right tools and processes.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Step 1: Search<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cortex XDR comes pre-configured with an array of known behavior-based indicators of compromise (BIOCs). These BIOCs are rules that identify interesting or malicious behaviors based on tactics, techniques and procedures \u2013 rather than the easily evaded artifacts typically used in IOC hunting. The first step is to search for alerts with the category of \u201cPersistence,\u201d and set the alert source as \u201c<a href=\"https:\/\/www.darkreading.com\/endpoint\/secdo-announces-behavioral-based-indicators-of-compromise-automated-response-center\/d\/d-id\/1330265\" rel=\"nofollow,noopener\" >BIOCs<\/a>.\u201d In this case, we\u2019re targeting BIOCs that accompany typical persistence behavior, such as registry keys that have been written over or added to the registry by an unsigned process.<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.22.04-AM.png\"><div style=\"max-width:100%\" data-width=\"1964\"><span class=\"ar-custom\" style=\"padding-bottom:12.53%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-98860 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.22.04-AM.png\" alt=\"\" width=\"1964\" height=\"246\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.22.04-AM.png 1964w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.22.04-AM-230x29.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.22.04-AM-768x96.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.22.04-AM-500x63.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.22.04-AM-510x64.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.22.04-AM-240x30.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.22.04-AM-650x81.png 650w\" sizes=\"auto, (max-width: 1964px) 100vw, 1964px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><b>Step 2: Find what stands out<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The search generates a list of events. Duplicate results from a large number of hosts generally indicates normal behavior; they can be removed. Several, however, show an executable from a suspicious path. C:\/Google is definitely not a normal folder path, and the filename (oMO.exe) is also unusual. <\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.10.51-AM.png\"><div style=\"max-width:100%\" data-width=\"1756\"><span class=\"ar-custom\" style=\"padding-bottom:34.85%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-98846 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.10.51-AM.png\" alt=\"\" width=\"1756\" height=\"612\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.10.51-AM.png 1756w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.10.51-AM-230x80.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.10.51-AM-768x268.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.10.51-AM-500x174.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.10.51-AM-510x178.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.10.51-AM-115x40.png 115w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.10.51-AM-650x227.png 650w\" sizes=\"auto, (max-width: 1756px) 100vw, 1756px\" \/><\/span><\/div><\/a><\/p>\n<p><b>Step 3: Triage and Validate<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Selecting any one of these events, we click \u201cAnalyze\u201d to see the chain of events (or causality). We can see that Cortex XDR identifies the root cause as cmd.exe from which everything was spawned. In the below screenshot, oMO.exe is identified as malware, which is why it shows up in red. If needed, additional information can be obtained from knowledge bases such as <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/autofocus\"><span style=\"font-weight: 400;\">AutoFocus<\/span><\/a><span style=\"font-weight: 400;\"> and VirusTotal with a simple right-click. The number of BIOC alerts (16) indicates that this event requires further investigation using the EDR events collected for omO.exe and the rest of the causality.<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-3.png\"><div style=\"max-width:100%\" data-width=\"440\"><span class=\"ar-custom\" style=\"padding-bottom:67.27%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-98735 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-3.png\" alt=\"\" width=\"440\" height=\"296\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-3.png 440w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-3-230x155.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-3-59x40.png 59w\" sizes=\"auto, (max-width: 440px) 100vw, 440px\" \/><\/span><\/div><\/a><\/p>\n<p><b>Step 4: Investigate<\/b><\/p>\n<p><span style=\"font-weight: 400;\">For further investigation, we have the option to click into several tabs revealing the forensic detail used to confirm that this is indeed malware. In these tabs, we find evidence across various types of endpoint behaviors. In the Alerts Tab, we find that the Persistence BIOC fired for the same machine 16 times. Furthermore, we can investigate the associated endpoint and network behaviors from the other tabs.<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-4.png\"><div style=\"max-width:100%\" data-width=\"1600\"><span class=\"ar-custom\" style=\"padding-bottom:49.69%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-98748 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-4.png\" alt=\"\" width=\"1600\" height=\"795\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-4.png 1600w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-4-230x114.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-4-768x382.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-4-500x248.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-4-510x253.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-4-81x40.png 81w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-4-604x300.png 604w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/span><\/div><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Looking through these tabs, we find: <\/span><\/p>\n<p><span style=\"font-weight: 400;\">1. Registry tampering visible on the registry tab.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">2. A suspicious connection to a random GoDaddy site visible on the Network tab.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">3. Repetitive file reads that show the malware reading itself from the startup menu on the File tab.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> Each of these is typical of persistence behavior. <\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-5.png\"><div style=\"max-width:100%\" data-width=\"1600\"><span class=\"ar-custom\" style=\"padding-bottom:36.56%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-98761 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-5.png\" alt=\"\" width=\"1600\" height=\"585\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-5.png 1600w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-5-230x84.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-5-768x281.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-5-500x183.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-5-510x186.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-5-109x40.png 109w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/XDR-5-650x238.png 650w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.45-AM.png\"><div style=\"max-width:100%\" data-width=\"1912\"><span class=\"ar-custom\" style=\"padding-bottom:11.3%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-98876 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.45-AM.png\" alt=\"\" width=\"1912\" height=\"216\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.45-AM.png 1912w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.45-AM-230x26.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.45-AM-768x87.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.45-AM-500x56.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.45-AM-510x58.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.45-AM-240x27.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.45-AM-650x73.png 650w\" sizes=\"auto, (max-width: 1912px) 100vw, 1912px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.57-AM.png\"><div style=\"max-width:100%\" data-width=\"1844\"><span class=\"ar-custom\" style=\"padding-bottom:49.78%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-98889 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.57-AM.png\" alt=\"\" width=\"1844\" height=\"918\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.57-AM.png 1844w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.57-AM-230x115.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.57-AM-768x382.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.57-AM-500x249.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.57-AM-510x254.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.57-AM-80x40.png 80w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-22-at-11.43.57-AM-603x300.png 603w\" sizes=\"auto, (max-width: 1844px) 100vw, 1844px\" \/><\/span><\/div><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re not a forensic specialist, this information can be a lot to take in, but Cortex XDR simplifies the known bad activity into contextual alerts so less experienced analysts can also perform fast and accurate investigations. This kind of information not only further confirms that this is malware but can also provide visibility into how much of our infrastructure this piece of malware may have infiltrated, to help assess the scope of damage.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Step 5: Remediate <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Now that we\u2019re clear that this is malicious activity, we take action. We first issue a reimage of the system given that it was affected by malware. We then blacklist the malware, preventing execution on endpoints, and do the same for the \u201cbad domain,\u201d blocking transmission through network and cloud protection points. This, in turn, updates Wildfire where the malicious entities will be confirmed. The prevention signatures will automatically be updated on Traps and pushed to all of our global customers, thereby enabling future prevention of a malware sample that the environment has not previously seen.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Step 6: Breathe<\/b><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s it \u2013 the world is now a slightly safer place. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Within a few clicks, Cortex XDR has simplified a legacy threat hunting process that is so cumbersome that companies often can\u2019t get to it, which contributes to industry statistics such as a mean-time-to-identify of 197 days. <\/span><\/p>\n<p><em><span style=\"font-weight: 400;\">Persistent malware is one example of structured data hunting, which is performed based on predefined behaviors that generate alerts. At Ignite, Vidya and Matt will also be sharing use cases of Cortex XDR for unstructured data hunting, using robust machine learning capabilities to find anomalies across hundreds of data dimensions. These are the types of threats that are even harder to identify using legacy approaches. <\/span><\/em><\/p>\n<p><em><span style=\"font-weight: 400;\">To learn more, catch the \u201c\u2018Stand and Still\u2019 Hunting with Cortex XDR\u201d session on June 3rd at <\/span><a href=\"https:\/\/bit.ly\/2UE5Wz1\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Ignite USA<\/span><\/a><span style=\"font-weight: 400;\">. If you can\u2019t make it to Austin but would like to see more of Cortex XDR in action, <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/company\/request-demo\"><span style=\"font-weight: 400;\">click here to request a demo<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s an exclusive preview of how we\u2019ve used Cortex XDR to hunt, identify, and remediate a piece of persistent malware.<\/p>\n","protected":false},"author":644,"featured_media":98696,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6770],"tags":[6737,1819,6786],"coauthors":[6785,1355],"class_list":["post-98695","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-future","tag-cortex-xdr","tag-ignite","tag-threat-hunting"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/control-room-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/644"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=98695"}],"version-history":[{"count":15,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98695\/revisions"}],"predecessor-version":[{"id":99014,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98695\/revisions\/99014"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/98696"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=98695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=98695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=98695"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=98695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}