{"id":12246,"date":"2020-11-13T18:22:07","date_gmt":"2020-11-13T10:22:07","guid":{"rendered":"https:\/\/www.kaspersky.com.cn\/blog\/?p=12246"},"modified":"2020-11-13T18:22:07","modified_gmt":"2020-11-13T10:22:07","slug":"mobile-malware-part-two","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.cn\/blog\/mobile-malware-part-two\/12246\/","title":{"rendered":"\u79fb\u52a8\u8bbe\u5907\u7684\u5a01\u80c1\uff0c\u4ee5\u53ca\u5982\u4f55\u62b5\u5fa1\u5b83\u4eec\u2014\u2014\u7b2c2\u90e8\u5206"},"content":{"rendered":"<p>\u5728<a href=\"https:\/\/www.kaspersky.com.cn\/blog\/mobile-malware-part-1\" target=\"_blank\" rel=\"noopener\">\u4e0a\u4e00\u671f<\/a>\u6709\u5173\u624b\u673a\u7aef\u4e0d\u6cd5\u5206\u5b50\u7684\u6545\u4e8b\u4e2d\uff0c\u6211\u4eec\u8ba8\u8bba\u4e86\u5371\u5bb3\u6027\u76f8\u5bf9\u8f83\u5c0f\u7684\u4e00\u4e9b\u6076\u610f\u8f6f\u4ef6\uff0c\u5b83\u4eec\u53ef\u80fd\u4f1a\u51fa\u73b0\u5728\u4f60\u7684\u624b\u673a\u6216\u5e73\u677f\u4e0a\u3002\u4eca\u5929\uff0c\u6211\u4eec\u5c06\u4ecb\u7ecd\u4e00\u4e9b\u5371\u9669\u6027\u5927\u5f97\u591a\u7684\u5a01\u80c1\uff0c\u5b83\u4eec\u5f88\u53ef\u80fd\u8ba9\u4f60\u4ed8\u51fa\u91d1\u94b1\u7684\u4ee3\u4ef7\u751a\u81f3\u5931\u53bb\u624b\u673a\u3002<\/p>\n<h2>\u624b\u673a\u52d2\u7d22\u8f6f\u4ef6<\/h2>\n<p>\u6211\u4eec\u4e4b\u524d\u8bf4\u8fc7\uff0c\u4eba\u4eec\u5bf9\u624b\u673a\u7684\u4f9d\u8d56\u6027\u5f88\u5f3a\uff0c\u5982\u679c\u65e0\u6cd5\u4f7f\u7528\u624b\u673a\u7684\u8bdd\uff0c\u8bb8\u591a\u4eba\u4f1a\u4e0d\u60dc\u4ee3\u4ef7\u5c06\u5176\u6062\u590d\u3002\u6076\u610f\u8f6f\u4ef6\u5f00\u53d1\u4eba\u5458\u5bf9\u6b64\u4e86\u5982\u6307\u638c\uff0c\u5e76\u521b\u5efa\u4e86\u79fb\u52a8\u5e73\u53f0\u4e0a\u7684\u52d2\u7d22\u8f6f\u4ef6\u6728\u9a6c\u7a0b\u5e8f\uff0c\u5b83\u4eec\u4f1a\u963b\u62e6\u53d7\u5bb3\u8005\u4f7f\u7528\u624b\u673a\uff0c\u5e76\u8981\u6c42\u652f\u4ed8\u8d4e\u91d1\u6765\u6062\u590d\u4f7f\u7528\u6743\u3002<\/p>\n<p>\u548c\u5b83\u5728\u8ba1\u7b97\u673a\u5e73\u53f0\u4e0a\u7684\u201d\u8868\u4eb2\u201d\u4e00\u6837\uff0c\u624b\u673a\u52d2\u7d22\u8f6f\u4ef6\u5206\u4e3a\u4e24\u79cd\u7c7b\u578b\uff1a\u963b\u62e6\u7a0b\u5e8f\u548c\u52a0\u5bc6\u7a0b\u5e8f\u3002\u6b63\u5982\u5176\u540d\u79f0\u6240\u8868\u793a\u7684\u90a3\u6837\uff0c\u52a0\u5bc6\u7a0b\u5e8f\u4f1a\u52a0\u5bc6\u624b\u673a\u6587\u4ef6\uff0c\u963b\u62e6\u7a0b\u5e8f\u4f1a\u963b\u6b62\u5bf9\u624b\u673a\u7684\u8bbf\u95ee\u2014\u2014\u6700\u5e38\u89c1\u7684\u624b\u6cd5\u662f\u7528\u72e1\u8bc8\u7684\u6807\u8bed\u906e\u76d6\u5c4f\u5e55\u6216\u8005\u7d22\u8981PIN\u7801\u3002<\/p>\n<p>\u987a\u4fbf\u8bf4\u4e00\u53e5\uff0c\u624b\u673a\u6076\u610f\u8f6f\u4ef6\u5f80\u5f80\u4f1a\u540c\u65f6\u52a0\u5bc6\u548c\u963b\u62e6\u8bbf\u95ee\u3002\u4f8b\u5982\uff0c\u6211\u4eec\u6240\u719f\u6089\u7684<a href=\"https:\/\/www.kaspersky.com\/blog\/mobile-ransomware-2016\/12491\/\" target=\"_blank\" rel=\"noopener nofollow\">Svpeng<\/a>\u6728\u9a6c\u7a0b\u5e8f\u7684\u67d0\u4e2a\u4fee\u6539\u7248\u672c\u5c31\u662f\u8fd9\u4e48\u5f97\u901e\u7684\u3002<\/p>\n<p>\u867d\u7136\u963b\u62e6\u7a0b\u5e8f\u5728\u8ba1\u7b97\u673a\u5e73\u53f0\u4e0a\u51e0\u4e4e\u6d88\u5931\u4e86\uff08\u5b83\u4eec\u5f88\u5bb9\u6613\u88ab\u7ed5\u5f00\uff09\uff0c\u4f46\u662f\u5b83\u4eec\u5728\u79fb\u52a8\u8bbe\u5907\u4e0a\u5374\u4e0d\u65ad\u589e\u591a\u3002\u6bd4\u5982\uff0c<a href=\"https:\/\/securelist.com\/mobile-malware-review-2017\/84139\/\" target=\"_blank\" rel=\"noopener\">\u57282017\u5e74<\/a>\u76d1\u6d4b\u5230\u7684\u52d2\u7d22\u8f6f\u4ef6\u4e2d\uff0c83%\u6765\u81eaCongur\u6728\u9a6c\u5bb6\u65cf\uff0c\u5b83\u4eec\u4f7f\u7528PIN\u9501\u5b9a\u4e86\u53d7\u5bb3\u8005\u7684\u8bbe\u5907\u3002<\/p>\n<p>\u7c7b\u4f3c\u4e8e\u684c\u9762\u963b\u62e6\u7a0b\u5e8f\uff0c\u624b\u673a\u7248\u901a\u5e38\u63a7\u544a\u7528\u6237\u8fdd\u53cd\u4e86\u67d0\u4e9b\u6cd5\u5f8b\u2014\u2014\u901a\u5e38\u662f\u6d4f\u89c8\u8272\u60c5\u5185\u5bb9\u2014\u2014\u5e76\u5047\u88c5\u653f\u5e9c\u673a\u6784\u7d22\u8981\u7f5a\u6b3e\u3002\u6beb\u65e0\u7591\u95ee\u653b\u51fb\u8005\u901a\u8fc7\u8fd9\u79cd\u624b\u6bb5\u53ef\u4ee5\u5927\u8d5a\u4e00\u7b14\u3002\u8fd9\u7c7b\u6076\u610f\u8f6f\u4ef6\u901a\u5e38\u662f\u901a\u8fc7\u8272\u60c5\u7f51\u7ad9\u4f20\u64ad\u7684\uff0c\u56e0\u6b64\u5b83\u4eec\u7684\u6307\u63a7\u5728\u53d7\u5bb3\u8005\u770b\u6765\u66f4\u52a0\u53ef\u4fe1\u3002<\/p>\n<h2>\u624b\u673a\u62b9\u673a\u8f6f\u4ef6<\/h2>\n<p>\u540c\u6837\u5982\u540d\u5b57\u6240\u793a\uff1a\u62b9\u673a\u8f6f\u4ef6\u62b9\u9664\u53d7\u5bb3\u8005\u8bbe\u5907\u4e2d\u7684\u6240\u6709\u6587\u4ef6\u3002\u5bf9\u4e8e\u8bd5\u56fe\u901a\u8fc7\u6536\u53d6\u8d4e\u91d1\u6765\u8d5a\u94b1\u7684\u666e\u901a\u9a97\u5b50\uff0c\u62b9\u6389\u7528\u6237\u7684\u6570\u636e\u6ca1\u6709\u4efb\u4f55\u5546\u4e1a\u610f\u4e49\uff0c\u5b83\u4eec\u66f4\u53ef\u80fd\u88ab\u7528\u4e8e\u4f01\u4e1a\u6216\u653f\u6cbb\u6597\u4e89\u3002<\/p>\n<p>\u5728\u79fb\u52a8\u8bbe\u5907\u4e0a\u9047\u5230\u62b9\u673a\u8f6f\u4ef6\u7684\u6982\u7387\u6bd4\u5728PC\u4e0a\u5c0f\u5f97\u591a\u3002\u5373\u4f7f\u5b83\u4eec\u5728\u624b\u6301\u8bbe\u5907\u4e0a\u51fa\u73b0\uff0c\u5927\u591a\u6570\u60c5\u51b5\u4e0b\u4e5f\u662f\u548c\u4e00\u4e9b\u5176\u4ed6\u4ee4\u4eba\u8ba8\u538c\u7684\u4f0e\u4fe9\u4e00\u8d77\u3002\u4f8b\u5982\uff0c\u540d\u4e3a<a href=\"http:\/\/news.softpedia.com\/news\/mazar-bot-android-malware-can-erase-your-phone-s-data-except-if-you-re-russian-500349.shtml\" target=\"_blank\" rel=\"noopener nofollow\">Mazar<\/a>\u7684\u6076\u610f\u8f6f\u4ef6\u4e0d\u4ec5\u5220\u9664\u6570\u636e\u8fd8\u53ef\u4ee5\u5c06\u624b\u673a\u53d8\u6210<a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/botnet\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">\u50f5\u5c38\u7f51\u7edc<\/a>\u7684\u4e00\u90e8\u5206\u2014\u2014\u50f5\u5c38\u7f51\u7edc\u662f\u88ab\u7528\u4e8e\u7f51\u7edc\u653b\u51fb\u7684\u7f51\u7edc\u3002\u4e0d\u8fc7\u6211\u4eec\u4ee5\u540e\u518d\u53e6\u627e\u65f6\u95f4\u8ba8\u8bba\u6709\u5173\u201d\u4e8c\u5408\u4e00\u201d\u75c5\u6bd2\u7684\u8bdd\u9898\u3002<\/p>\n<h2>\u79fb\u52a8\u77ff\u673a<\/h2>\n<p>\u5982\u679c\u4f60\u7684\u624b\u673a\u7a81\u7136\u5f00\u59cb\u53d1\u70ed\uff0c\u8fd0\u884c\u901f\u5ea6\u51cf\u6162\u5e76\u4e14\u7535\u91cf\u6d88\u8017\u52a0\u5feb\uff0c\u7f6a\u9b41\u7978\u9996\u5f88\u53ef\u80fd\u662f\u9690\u85cf\u5728\u624b\u673a\u91cc\u7684\u52a0\u5bc6\u8d27\u5e01\u6316\u77ff\u7a0b\u5e8f\u2014\u2014\u8fd9\u4e9b\u6076\u610f\u7a0b\u5e8f\u4f1a\u5077\u5077\u5730\u6316\u52a0\u5bc6\u8d27\u5e01\uff0c\u4f46\u662f\u4f60\u8981\u4e3a\u5176\u4e70\u5355\u3002<\/p>\n<p>\u5373\u4f7f\u5728\u5b98\u65b9\u5e94\u7528\u5546\u5e97\u4e5f\u6709\u53ef\u80fd<a href=\"https:\/\/www.kaspersky.com\/blog\/google-play-hidden-miners\/21882\/\" target=\"_blank\" rel=\"noopener nofollow\">\u88ab\u75c5\u6bd2\u611f\u67d3<\/a>\uff1a\u8fd9\u79cd\u7a0b\u5e8f\u5f88\u597d\u5730\u4f2a\u88c5\u6210\u5408\u6cd5\u5e94\u7528\u7a0b\u5e8f\u5e76\u8868\u73b0\u5f97\u548c\u7a0b\u5e8f\u63cf\u8ff0\u4e00\u6837\uff0c\u4e0e\u6b64\u540c\u65f6\u5b83\u4eec\u4e5f\u5728\u540e\u53f0\u4e3a\u5176\u5f00\u53d1\u8005\u6316\u6398\u865a\u62df\u8d27\u5e01\u3002\u4ece\u7b2c\u4e09\u65b9\u8d44\u6e90\u4e0b\u8f7d\u7684\u5e94\u7528\u7a0b\u5e8f\u4f1a\u8bd5\u56fe\u4f2a\u88c5\u6210\u7cfb\u7edf\u5e94\u7528\u7a0b\u5e8f\uff0c\u6709\u7684\u6076\u610f\u8f6f\u4ef6\u751a\u81f3\u5047\u88c5\u6210\u7528\u4e8e\u66f4\u65b0\u5e94\u7528\u5546\u5e97\u7684\u7a0b\u5e8f\uff0c\u6bd4\u5982<a href=\"https:\/\/www.newsbtc.com\/2018\/03\/30\/hiddenminer-mines-monero-on-android-devices-while-protecting-itself-from-discovery-and-removal\/\" target=\"_blank\" rel=\"noopener nofollow\">HiddenMiner<\/a>\u3002<\/p>\n<p>\u867d\u7136\u6316\u77ff\u8f6f\u4ef6\u4e0d\u4f1a\u5077\u53d6\u4f60\u7684\u94b1\u8d22\u6216\u8005\u62b9\u9664\u4f60\u7684\u6587\u4ef6\uff0c\u4f46\u662f\u6211\u4eec\u4e0d\u5e94\u4f4e\u4f30\u5176\u98ce\u9669\uff1a\u8d1f\u8f7d\u8fc7\u9ad8\u4e0d\u4ec5\u4f1a\u5bfc\u81f4\u8bbe\u5907\u8fd0\u884c\u7f13\u6162\u4ee5\u53ca\u7535\u91cf\u6d88\u8017\u8fc7\u5feb\uff0c\u4e5f\u4f1a\u707e\u96be\u6027\u5730\u5bfc\u81f4\u8bbe\u5907\u8fc7\u70ed\u3002<\/p>\n<h2>\u5982\u4f55\u6301\u7eed\u5904\u4e8e\u88ab\u4fdd\u62a4\u72b6\u6001<\/h2>\n<p>\u65e0\u8bba\u5165\u4fb5\u8005\u591a\u4e48\u8ba9\u4eba\u70e6\u607c\uff0c\u6211\u4eec\u53ef\u4ee5\u901a\u8fc7\u9075\u5faa\u4ee5\u4e0b\u51e0\u4e2a\u89c4\u5219\u6765\u9632\u8303\u5927\u591a\u6570\u5a01\u80c1\uff1a<\/p>\n<ul>\n<li>\u53ea\u901a\u8fc7\u5b98\u65b9\u5546\u5e97\uff08\u5982\u8c37\u6b4c\u5e94\u7528\u5546\u5e97\u7b49\uff09\u5b89\u88c5\u5e94\u7528\u7a0b\u5e8f\uff1a\u8fd9\u5e76\u4e0d\u80fd\u4fdd\u8bc1\u7edd\u5bf9\u5b89\u5168\uff0c\u4f46\u5b83\u53ef\u4ee5\u5728\u5f88\u5927\u7a0b\u5ea6\u4e0a\u964d\u4f4e\u4f60\u5141\u8bb8\u6076\u610f\u8f6f\u4ef6\u8fdb\u5165\u8bbe\u5907\u7684\u98ce\u9669\u3002<\/li>\n<li>\u8bf7\u5728\u8bbe\u5907\u7684\u8bbe\u7f6e\u4e2d\u7981\u6b62\u901a\u8fc7\u7b2c\u4e09\u65b9\u8d44\u6e90\u5b89\u88c5\u5e94\u7528\u7a0b\u5e8f\u3002\u8fd9\u53ef\u4ee5\u9632\u6b62\u7528\u6237\u968f\u673a\u4e0b\u8f7d\u5230\u90a3\u4e9b\u4f2a\u88c5\u6210\u7cfb\u7edf\u66f4\u65b0\u7684\u6076\u610f\u7a0b\u5e8f\u3002<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8325 aligncenter\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2017\/08\/24144238\/unknown-sources-EN.jpg\" alt=\"\" width=\"573\" height=\"398\"><\/p>\n<ul>\n<li>\u5b9a\u671f\u5c06\u91cd\u8981\u6570\u636e\u4ece\u8bbe\u5907\u4e0a<a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-backup\/19589\/\" target=\"_blank\" rel=\"noopener nofollow\">\u5907\u4efd<\/a>\u5230\u4e91\u3001USB\u95ea\u5b58\u76d8\u6216\u5916\u7f6e\u786c\u76d8\u3002<\/li>\n<li>\u5f53\u64cd\u4f5c\u7cfb\u7edf\u548c\u5e94\u7528\u7a0b\u5e8f\u6709\u66f4\u65b0\u65f6\uff0c\u8bf7\u7acb\u5373\u8fdb\u884c\u5b89\u88c5\u2014\u2014\u5b83\u4eec\u53ef\u4ee5\u4fee\u590d\u4e0d\u6cd5\u5206\u5b50\u4eec\u5229\u7528\u7684\u6f5c\u5728\u6f0f\u6d1e\u3002<\/li>\n<li>\u4e0d\u8981\u70b9\u51fb\u7535\u5b50\u90ae\u4ef6\u3001\u77ed\u4fe1\u6216\u8005\u5373\u65f6\u901a\u8baf\u6d88\u606f\u4e2d\u7684\u53ef\u7591\u94fe\u63a5\u3002<\/li>\n<li>\u4f7f\u7528\u53ef\u9760\u7684\u6740\u6bd2\u8f6f\u4ef6\u4fdd\u62a4\u6240\u6709\u7684\u79fb\u52a8\u8bbe\u5907\u3002\u4f8b\u5982\uff0c<a href=\"https:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=cn_kdailyplaceholder\" target=\"_blank\" rel=\"noopener nofollow\">\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef6\u5b89\u5353\u7248<\/a>\u53ef\u4ee5\u5bf9\u5e94\u7528\u7a0b\u5e8f\u3001\u94fe\u63a5\u548c\u7f51\u9875\u8fdb\u884c\u5b9e\u65f6\u5206\u6790\uff0c\u5e76\u963b\u62e6\u4efb\u4f55\u770b\u8d77\u6765\u53ef\u7591\u6216\u5371\u9669\u7684\u5185\u5bb9\u3002<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n","protected":false},"excerpt":{"rendered":"<p>\u5728\u8fd9\u4e00\u90e8\u5206\uff0c\u6211\u4eec\u6765\u63a2\u8ba8\u90a3\u4e9b\u53ef\u80fd\u7ed9\u79fb\u52a8\u7aef\u7528\u6237\u5e26\u6765\u771f\u5b9e\u4f24\u5bb3\u7684\u6076\u610f\u7a0b\u5e8f\u3002<\/p>\n","protected":false},"author":2484,"featured_media":12247,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1506,1447],"tags":[1466,871,25,869,771,857,2451,2452,872,44,2450],"class_list":{"0":"post-12246","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-1466","10":"tag-871","11":"tag-25","12":"tag-869","13":"tag-771","14":"tag-857","15":"tag-2451","16":"tag-2452","17":"tag-872","18":"tag-44","19":"tag-2450"},"hreflang":[{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/mobile-malware-part-two\/12246\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mobile-malware-part-two\/13801\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mobile-malware-part-two\/11554\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/mobile-malware-part-two\/6085\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mobile-malware-part-two\/15856\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mobile-malware-part-two\/14135\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mobile-malware-part-two\/13252\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mobile-malware-part-two\/16650\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/mobile-malware-part-two\/16065\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mobile-malware-part-two\/21025\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mobile-malware-part-two\/5172\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mobile-malware-part-two\/23350\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mobile-malware-part-two\/10787\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/mobile-malware-part-two\/10677\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/mobile-malware-part-two\/9563\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mobile-malware-part-two\/17411\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/mobile-malware-part-two\/21226\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/mobile-malware-part-two\/23811\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mobile-malware-part-two\/17088\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mobile-malware-part-two\/20714\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mobile-malware-part-two\/20714\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.cn\/blog\/tag\/%e5%a8%81%e8%83%81\/","name":"\u5a01\u80c1"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/12246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/comments?post=12246"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/12246\/revisions"}],"predecessor-version":[{"id":12253,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/12246\/revisions\/12253"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media\/12247"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media?parent=12246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/categories?post=12246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/tags?post=12246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}