{"id":5687,"date":"2018-06-12T17:39:16","date_gmt":"2018-06-12T16:39:16","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5687"},"modified":"2021-07-12T13:32:47","modified_gmt":"2021-07-12T12:32:47","slug":"our-top-10-email-malware-all-time","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time","title":{"rendered":"Our Top 10 Email Malware of All Time"},"content":{"rendered":"<p>Email is infamous as a common means for spreading malware, with spam and phishing messages used to trick users into installing malicious software on their computers. These emails leverage a number of different techniques to get their payload delivered onto computers, including malicious links, macros, embedded scripts, or just the malware itself cloaked in a zip archive.<\/p>\n<p>In this article, we will review some of the most dangerous pieces of malware that ever existed and were spread via email. These malicious applications have been hugely damaging for their victims, and some continue to pose a real threat. Here is our top ten \u201cmost wanted\u201d malware of all time\u2014spread via email.<\/p>\n<h2>10. TrickBot (2016)<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/06\/trojan%20horse.jpg\" alt=\"trojan horse.jpg\" width=\"409\" height=\"202\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>This is a banking Trojan, which mainly uses a macro-based malware that hides in .doc and .xls files. Very similar to Dyre Trojan, it was set up to target digital banking platforms used by US banks, before spreading further afield to the UK, Australia, New Zealand, Canada, and Germany. Currently, it only affects Windows computers and does not harm Mac, iPhone, iPad, Blackberry, Windows phone, or Android phone.<\/p>\n<h2>9. Emotet (2014)<\/h2>\n<p>This Trojan has also been seen in the banking world, targeting sensitive information, such as bank account details. It usually appears as a malicious spam email related to an invoice or payment notification with a direct download link to malware. Early this year, an\u00a0<a class=\"ext\" href=\"https:\/\/www.peerlyst.com\/posts\/new-spike-in-emotet-attacks-one-infection-costs-city-of-allentown-usd1-million-barkly\" target=\"_blank\" rel=\"noopener noreferrer\">Emotet attack<\/a>\u00a0cost the city of Allentown, PA, around $1 million. It is important to know these emails are often very difficult to block, unless the link follow option is enabled.<\/p>\n<h2>8. Hancitor (2014)<\/h2>\n<p>Also known as Chanitor, this is, to some extent, similar to the Emotet Trojan described above. It sends out malware links via a word document attachment. Most of the malicious web servers are located in the USA, while the majority of compromised domains are based in Asia.<\/p>\n<h2>7.\u00a0Loki-Bot (2015)<\/h2>\n<p>This is a login credentials information stealer, which sends sensitive data from the infected computer.\u00a0Unlike other trojans, it is difficult to identify specific patterns in the spam emails distributing Loki-Bot Trojan. However, more often than not, attachment invoices or .zip files with .exe or other executable files inside can be seen in the emails.<\/p>\n<h2>6. Duqu (2011)<\/h2>\n<p>Seen as the successor of Stuxnet back in 2011 when it first surfaced, Duqu has been leveraging a zero-day vulnerability in the Microsoft Windows TrueType Fonts and spreading via Word documents. In its second variant, it used spear-phishing, targeting Asia-Pacific businesses and their employees, and leveraged up to three zero-day vulnerabilities. It also deleted mailboxes and browser histories to cover its tracks.<\/p>\n<h2>5. Cridex (2012)<\/h2>\n<p>This Trojan, discovered in early 2012, is another strain of financial malware that steals banking credentials and sensitive information from infected machines. There have been reports of spam campaigns sent by the Cutwail botnet that bundled the Cridex malware back in early 2013. The email would include a link that would redirect users to a compromised legitimate website, that would then route the victim to the Blackhole Exploit Kit, which would deliver the final payload of Cridex.<\/p>\n<h2>4. Upatre (2013)<\/h2>\n<p>Shortly after the fall of the Blackhole Exploit Kit, Upatre surfaced, spreading via malicious email attachments or links inserted into emails that sent victims to a website hosting the malicious payload. Upatre also bundled several malware payloads such as: ZeuS, Crilock, Dyreza, and Rovnix, which severely damaged the security of infected computers.<\/p>\n<h2>3. Dyre (2014)<\/h2>\n<p>Dyre is a banking malware that made headlines after stealing more than\u00a0<a class=\"ext\" href=\"https:\/\/www.esecurityplanet.com\/malware\/ibm-warns-of-new-dyre-wolf-malware-campaign.html\" target=\"_blank\" rel=\"noopener noreferrer\">$1 million in a single campaign<\/a>\u00a0and bypassing two-factor authentication security measures by persuading victims to contact the hackers and send the required information. Dyre is known for infecting its victims via spam emails; it lies in wait for the victim to log in to a bank website and steals his\/her credentials. After infecting a computer, the malware converts it into a slave that sends out spam with the malicious attachment.<\/p>\n<h2>2. CryptoLocker (2013)<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/06\/payransom.jpg\" alt=\"payransom.jpg\" width=\"404\" height=\"200\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>CryptoLocker is some of the most prolific ransomware ever created by cybercriminals; it encrypts all files on infected computers and demands a ransom in Bitcoins (BTC) for the decryption keys. It used to infect computers via attachments sent in spam campaigns or by leveraging the Gameover ZeuS botnet.<\/p>\n<h2>1. Dridex Trojan (2014)<\/h2>\n<p>Dridex is a well-known banking Trojan that leverages malicious macros in Microsoft Office documents and steals banking credentials and other financial details of victims. Dridex is an update of Cridex, which was built on top of the ZeuS botnet. It began spreading in late 2014, generating almost 15,000 emails per day during the first spam campaign. Recently, the Dridex Trojan started to refocus its attacks on high-valued banking targets from the UK, leveraging malicious macros in an office document disguised as invoices during its phishing campaigns.<\/p>\n<p>To help keep your network and computers protected, you need a multilayered security approach. Deploying a professional email security solution that filters all incoming as well as outgoing messaging is of great importance; however, this is only one part of your security strategy. A robust endpoint security solution is just as critical to help ensure you directly secure end-user devices. This is the optimal strategy to help you keep malware out.<\/p>\n<p>Do you have something to add to our list?<\/p>\n<p><b>Additional reading:<\/b><\/p>\n<ul>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/evasive-malware-enemy-you-cant-see\">Evasive Malware: The Enemy You Can\u2019t See<\/a><\/li>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/how-keep-top-malware-threat\">How to Keep on Top of the Malware Threat<\/a><\/li>\n<\/ul>\n<p><b>To find out how SolarWinds<sup>\u00ae<\/sup>\u00a0Mail Assure<\/b><b><sup>\u2122<\/sup><\/b><b>\u00a0can help you protect your systems,\u00a0<\/b><a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\"><b>click here<\/b><\/a><b>.<\/b><\/p>\n<p><em>Sebastian Antonescu is the Technical Support Team Manger for Mail Assure and SpamExperts brands.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Email is one of the most prevalent ways to distribute malware, some of which can be truly devastating for companies. Sebastian Antonescu looks at the ten most dangerous kinds.<\/p>\n","protected":false},"author":48,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5687","post","type-post","status-publish","format-standard","hentry","topic-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Our Top 10 Email Malware of All Time - N-able<\/title>\n<meta name=\"description\" content=\"Email is one of the most prevalent ways to distribute malware, some of which can be truly devastating for companies. Sebastian Antonescu looks at the ten most dangerous kinds.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Our Top 10 Email Malware of All Time - N-able\" \/>\n<meta property=\"og:description\" content=\"Email is one of the most prevalent ways to distribute malware, some of which can be truly devastating for companies. Sebastian Antonescu looks at the ten most dangerous kinds.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-12T16:39:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T12:32:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/06\/trojan%20horse.jpg\" \/>\n<meta name=\"author\" content=\"Sebastia Antonescu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sebastia Antonescu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time\"},\"author\":{\"name\":\"Sebastia Antonescu\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/72960a026add67634ae7be743e32ea50\"},\"headline\":\"Our Top 10 Email Malware of All Time\",\"datePublished\":\"2018-06-12T17:39:16+01:00\",\"dateModified\":\"2021-07-12T12:32:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time\"},\"wordCount\":904,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/06\/trojan%20horse.jpg\",\"articleSection\":[\"Mail\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time\",\"name\":\"Our Top 10 Email Malware of All Time - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/06\/trojan%20horse.jpg\",\"datePublished\":\"2018-06-12T17:39:16+01:00\",\"dateModified\":\"2021-07-12T12:32:47+00:00\",\"description\":\"Email is one of the most prevalent ways to distribute malware, some of which can be truly devastating for companies. Sebastian Antonescu looks at the ten most dangerous kinds.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/06\/trojan%20horse.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/06\/trojan%20horse.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mail\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/mail\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Top 10 Email Malware of All Time\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/72960a026add67634ae7be743e32ea50\",\"name\":\"Sebastia Antonescu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0d6dd4367edd0aa46aa6bd00401469fe92cd451d6f39def83ec4c421433ad1fe?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0d6dd4367edd0aa46aa6bd00401469fe92cd451d6f39def83ec4c421433ad1fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0d6dd4367edd0aa46aa6bd00401469fe92cd451d6f39def83ec4c421433ad1fe?s=96&d=mm&r=g\",\"caption\":\"Sebastia Antonescu\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Our Top 10 Email Malware of All Time - N-able","description":"Email is one of the most prevalent ways to distribute malware, some of which can be truly devastating for companies. Sebastian Antonescu looks at the ten most dangerous kinds.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time","og_locale":"it_IT","og_type":"article","og_title":"Our Top 10 Email Malware of All Time - N-able","og_description":"Email is one of the most prevalent ways to distribute malware, some of which can be truly devastating for companies. Sebastian Antonescu looks at the ten most dangerous kinds.","og_url":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2018-06-12T16:39:16+00:00","article_modified_time":"2021-07-12T12:32:47+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/06\/trojan%20horse.jpg","type":"","width":"","height":""}],"author":"Sebastia Antonescu","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Sebastia Antonescu","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time"},"author":{"name":"Sebastia Antonescu","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/72960a026add67634ae7be743e32ea50"},"headline":"Our Top 10 Email Malware of All Time","datePublished":"2018-06-12T17:39:16+01:00","dateModified":"2021-07-12T12:32:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time"},"wordCount":904,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/06\/trojan%20horse.jpg","articleSection":["Mail"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time","url":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time","name":"Our Top 10 Email Malware of All Time - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/06\/trojan%20horse.jpg","datePublished":"2018-06-12T17:39:16+01:00","dateModified":"2021-07-12T12:32:47+00:00","description":"Email is one of the most prevalent ways to distribute malware, some of which can be truly devastating for companies. Sebastian Antonescu looks at the ten most dangerous kinds.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/06\/trojan%20horse.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/06\/trojan%20horse.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/our-top-10-email-malware-all-time#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mail","item":"https:\/\/www.n-able.com\/it\/blog\/category\/mail"},{"@type":"ListItem","position":2,"name":"Our Top 10 Email Malware of All Time"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/72960a026add67634ae7be743e32ea50","name":"Sebastia Antonescu","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/0d6dd4367edd0aa46aa6bd00401469fe92cd451d6f39def83ec4c421433ad1fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0d6dd4367edd0aa46aa6bd00401469fe92cd451d6f39def83ec4c421433ad1fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d6dd4367edd0aa46aa6bd00401469fe92cd451d6f39def83ec4c421433ad1fe?s=96&d=mm&r=g","caption":"Sebastia Antonescu"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/5687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=5687"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/5687\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=5687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}