{"id":21969,"date":"2016-07-15T09:00:27","date_gmt":"2016-07-15T01:00:27","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=21969"},"modified":"2016-07-12T18:30:02","modified_gmt":"2016-07-12T10:30:02","slug":"%e6%8e%a1%e7%a4%a6%e6%a5%ad%e9%9d%a2%e8%87%a8%e7%9a%84%e7%b6%b2%e8%b7%af%e5%a8%81%e8%84%85","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=21969","title":{"rendered":"\u63a1\u7926\u696d\u9762\u81e8\u7684\u7db2\u8def\u5a01\u8105"},"content":{"rendered":"<figure class=\"thumbnail wp-caption alignnone\" style=\"width: 220px\"><a href=\"https:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-cyber-threats-to-the-mining-industry.pdf\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/research-reports\/wp-cyber-threats-to-the-mining-industry_ai.jpg\" alt=\"\u6aa2\u8996\u7814\u7a76\u5831\u544a\uff1a\u300c\u63a1\u7926\u696d\u9762\u81e8\u7684\u7db2\u8def\u5a01\u8105\u300d(Cyber Threats to the Mining Industry)\" width=\"210\" height=\"270\" \/><\/a><figcaption class=\"caption wp-caption-text\">\u6aa2\u8996\u7814\u7a76\u5831\u544a\uff1a\u300c\u63a1\u7926\u696d\u9762\u81e8\u7684\u7db2\u8def\u5a01\u8105\u300d(Cyber Threats to the Mining Industry)<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>\u7531\u65bc\u4eca\u65e5\u5168\u7403\u5e02\u5834\u5c0d\u65bc\u5927\u5b97\u7269\u8cc7\u53ca\u5546\u54c1\u7684\u6fc0\u70c8\u722d\u596a\uff0c\u800c\u4e14\u7d93\u6fdf\u767c\u5c55\u7686\u9700\u4ef0\u8cf4\u5929\u7136\u8cc7\u6e90\uff0c\u518d\u52a0\u4e0a\u8fd1\u4f86\u6c23\u5019\u6975\u7aef\u8b8a\u5316\uff0c\u4f7f\u5f97\u63a1\u7926\u696d\u958b\u59cb\u6210\u70ba\u7db2\u8def\u9593\u8adc\u6d3b\u52d5\u7684\u76ee\u6a19\uff0c\u751a\u81f3\u6975\u7aef\u4e00\u9ede\uff0c\u6210\u70ba\u7834\u58de\u6027\u6216\u6bc0\u6ec5\u6027\u7db2\u8def\u653b\u64ca\u7684\u76ee\u6a19\u3002\u9019\u985e\u7db2\u8def\u9593\u8adc\u6d3b\u52d5\u7684\u76ee\u6a19\u5728\u65bc\u53d6\u5f97\u6700\u65b0\u7684\u79d1\u6280\u77e5\u8b58\u548c\u60c5\u5831\uff0c\u4ee5\u4fbf\u80fd\u5728\u5168\u7403\u7d93\u6fdf\u5e02\u5834\u7576\u4e2d\u7dad\u6301\u7af6\u722d\u512a\u52e2\u8207\u5730\u4f4d\u3002<\/p>\n<p>\u6b79\u5f92\u770b\u4e0a\u4e86\u63a1\u7926\u696d\u5728\u5168\u7403\u4f9b\u61c9\u93c8\u4e0a\u7684\u6230\u7565\u5730\u4f4d\uff0c\u4f7f\u5f97\u8a72\u7522\u696d\u958b\u59cb\u9762\u81e8\u7db2\u8def\u653b\u64ca\u7684\u5a01\u8105\u3002\u9019\u985e\u5a01\u8105\u4e0d\u50c5\u5177\u5099\u76f8\u7576\u9ad8\u7684\u91dd\u5c0d\u6027\uff0c\u800c\u4e14\u7d93\u904e\u7cbe\u5bc6\u7684\u8a08\u756b\uff0c\u5176\u5e55\u5f8c\u7684\u99ed\u5ba2\u5718\u9ad4\u4e5f\u5305\u7f85\u842c\u8c61\uff0c\u5f9e\u99ed\u5ba2\u6fc0\u9032\u5718\u9ad4\u3001\u6575\u5c0d\u570b\u5bb6\uff0c\u5230\u6709\u7d44\u7e54\u7684\u72af\u7f6a\u96c6\u5718\u3002\u9019\u4e9b\u99ed\u5ba2\u5df2\u5b78\u6703\u5982\u4f55\u5229\u7528\u7926\u7269\u5929\u7136\u8cc7\u6e90\u5728\u5340\u57df\u548c\u5168\u7403\u4f9b\u61c9\u93c8\u4ee5\u53ca\u570b\u5bb6\u7d93\u6fdf\u7576\u4e2d\u6240\u626e\u6f14\u7684\u91cd\u8981\u89d2\u8272\uff0c\u4e26\u4e14\u77e5\u9053\u5982\u4f55\u653b\u64ca\u7926\u696d\u516c\u53f8\u56e0\u6975\u5ea6\u4ef0\u8cf4\u6574\u5408\u6027\u81ea\u52d5\u5316\u7cfb\u7d71\u6240\u66b4\u9732\u7684\u6f0f\u6d1e\u3002<\/p>\n<p><strong>\u91dd\u5c0d\u4e0d\u540c\u7522\u696d\u7684\u7db2\u8def\u653b\u64ca<\/strong><\/p>\n<p>\u4eca\u65e5\uff0c\u5404\u7a2e\u7522\u696d\u906d\u5230\u7db2\u8def\u653b\u64ca\u7684\u65b0\u805e\u5df2\u7d93\u53f8\u7a7a\u898b\u6163\uff0c\u5c31\u50cf\u65e5\u5e38\u64ad\u5831\u7684\u8cc7\u6599\u5916\u6d29\u65b0\u805e\u4e00\u6a23\u3002<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=123\">\u9032\u968e\u6301\u7e8c\u6027\u6ef2\u900f\u653b\u64ca (APT)<\/a>\u539f\u672c\u53ea\u662f\u7d14\u7cb9\u7684\u7522\u696d\u9593\u8adc\u884c\u52d5 (\u5982 BlackEnergy)\uff0c\u73fe\u5728\u537b\u5df2\u6f14\u8b8a\u6210\u53ef\u80fd\u9020\u6210\u5be6\u9ad4\u7834\u58de\u7684\u653b\u64ca\u8207\u6bc0\u6ec5\u884c\u52d5\u3002\u7814\u7a76\u4eba\u54e1\u767c\u73fe\uff0cBlackEnergy \u548c\u53e6\u4e00\u500b\u540d\u70ba Sandworm \u7684 APT \u884c\u52d5\u4f3c\u4e4e\u662f 2015 \u5e74 12 \u6708<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=16041\">\u70cf\u514b\u862d\u5169\u5ea7\u767c\u96fb\u5ee0\u5927\u65b7\u96fb<\/a>\u5e55\u5f8c\u7684\u5143\u51f6\u3002\u6b64\u5916\uff0cBlackEnergy \u548c KillDisk \u4ea6\u66fe\u8a66\u5716\u91dd\u5c0d\u4e00\u5bb6\u7926\u696d\u516c\u53f8\u548c\u4e00\u5bb6\u5927\u578b\u9435\u8def\u516c\u53f8\u767c\u52d5\u985e\u4f3c\u653b\u64ca\uff0c\u540c\u6a23\u4e5f\u662f\u4f4d\u65bc\u70cf\u514b\u862d\u3002\u9019\u986f\u793a BlackEnergy \u5df2\u6709\u80fd\u529b\u5f9e\u80fd\u6e90\u7522\u696d\u8de8\u8db3\u5230\u5176\u4ed6\u7522\u696d\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/research-reports\/sectors-campaigns-malware.png\" width=\"800\" height=\"678\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>\u7522\u696d\u3001\u653b\u64ca\u884c\u52d5\u3001\u60e1\u610f\u7a0b\u5f0f\u548c\u5e55\u5f8c\u64cd\u7e31 (C&amp;C) \u4f3a\u670d\u5668\u4e4b\u9593\u7684\u4ea4\u96c6\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u7522\u696d\u70ba\u4f55\u6703\u906d\u5230\u653b\u64ca\uff1f<\/strong><\/p>\n<p>\u7db2\u8def\u653b\u64ca\u4e26\u975e\u55ae\u7d14\u53ea\u662f IT \u7684\u554f\u984c\uff0c\u800c\u662f\u53ef\u80fd\u5c0d\u4f01\u696d\u65e5\u5e38\u71df\u904b\u9020\u6210\u6df1\u9060\u7684\u5f71\u97ff\uff1a\u71df\u904b\u4e2d\u65b7\u3001\u8a2d\u5099\u640d\u58de\u3001\u5546\u8b7d\u53d7\u640d\u3001\u8ca1\u7269\u640d\u5931\u3001\u667a\u6167\u8ca1\u7522\u6b0a\u640d\u5931\u3001\u7af6\u722d\u529b\u640d\u5931\u3001\u5065\u5eb7\u8207\u4eba\u8eab\u5b89\u5168\u98a8\u96aa\u7b49\u7b49\u3002\u4eca\u65e5\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u89ac\u89a6\u7684\u76ee\u6a19\u4e0d\u662f\u53ea\u6709\u9322\u548c\u8ca1\u52d9\u8cc7\u6599\u800c\u5df2\uff0c\u4ed6\u5011\u4e0d\u8ad6\u5728\u6280\u8853\u80fd\u529b\u548c\u72af\u7f6a\u624b\u6cd5\u4e0a\u90fd\u6709\u9577\u8db3\u7684\u9032\u5c55\uff0c\u800c\u4e14\u8d8a\u4f86\u8d8a\u66c9\u5f97\u7aca\u53d6\u654f\u611f\u8cc7\u6599\u7684\u50f9\u503c\u6240\u5728\uff0c\u4ee5\u53ca\u5982\u4f55\u5229\u7528\u9019\u4e9b\u8cc7\u6599\u4f86\u8cfa\u9322\u4e26\u64cd\u5f04\u5546\u696d\u7684\u904b\u4f5c\u3002\u4f8b\u5982\uff0c\u67d0\u500b\u5718\u9ad4\u5f9e 100 \u591a\u5bb6\u516c\u53f8\u7aca\u53d6\u5230\u5e02\u5834\u654f\u611f\u7684\u8cc7\u8a0a\uff0c\u53e6\u4e00\u500b\u5718\u9ad4\u5f9e\u91d1\u878d\u65b0\u805e\u5a92\u9ad4\u7aca\u53d6\u5230\u7522\u54c1\u7684\u4e0a\u5e02\u524d\u8cc7\u8a0a\uff0c\u7136\u5f8c\u5169\u500b\u5718\u9ad4\u5f7c\u6b64\u4ea4\u63db\u7aca\u53d6\u5230\u7684\u8cc7\u8a0a\uff0c\u9019\u6a23\u5c31\u80fd\u5f9e\u80a1\u7968\u5e02\u5834\u7372\u5229\u3002<!--more--><\/p>\n<p><strong>\u7926\u696d \u2013 \u4e3b\u8981\u76ee\u6a19\u70ba\u9593\u8adc\u6d3b\u52d5<\/strong><\/p>\n<p>\u70ba\u4f55\u7926\u696d\u6703\u6210\u70ba\u4e00\u500b\u6b79\u5f92\u7684\u91cd\u8981\u76ee\u6a19\uff1f<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u767c\u73fe\u6709\u4e09\u9805\u986f\u800c\u6613\u898b\u7684\u56e0\u7d20\uff1a<\/p>\n<ol>\n<li>\u5927\u5b97\u7269\u8cc7\u5728\u570b\u969b\u8cbf\u6613\u5e02\u5834\u7684\u91cd\u8981\u6027\u548c\u50f9\u503c\u8d8a\u4f86\u8d8a\u9ad8\u3002<\/li>\n<li>\u7d93\u6fdf\u767c\u5c55\u9700\u4ef0\u8cf4\u5929\u7136\u8cc7\u6e90\u3002<\/li>\n<li>\u5404\u570b\u5fc5\u9808\u8b93\u81ea\u8eab\u7684\u7926\u85cf\u767c\u63ee\u6700\u5927\u6548\u76ca\u3002<\/li>\n<\/ol>\n<p>\u63a1\u7926\u696d\u4e0d\u4f46\u662f\u4e00\u7a2e\u653f\u6cbb\u5730\u7406\u76ee\u6a19\uff0c\u4e5f\u662f\u7d93\u6fdf\u76ee\u6a19\u3002\u7db2\u8def\u9593\u8adc\u884c\u52d5\u8d8a\u4f86\u8d8a\u5e0c\u671b\u80fd\u638c\u63e1\u4f01\u696d\u7ba1\u7406\u968e\u5c64\u7684\u653f\u7b56\u3001\u6c7a\u5b9a\u4ee5\u53ca\u6c7a\u7b56\u6d41\u7a0b\uff0c\u4e26\u4e14\u8a66\u5716\u7834\u58de\u7af6\u722d\u5c0d\u624b\u7684\u512a\u52e2\u4f86\u53d6\u5f97\u7af6\u722d\u5730\u4f4d\u3002<\/p>\n<p><strong>\u7d93\u6fdf\u56e0\u7d20<\/strong><\/p>\n<p>\u63a1\u7926\u696d\u662f\u4ee5\u5927\u5b97\u7269\u8cc7\u70ba\u6838\u5fc3\u7684\u5168\u7403\u7522\u696d\uff0c\u975e\u5e38\u5bb9\u6613\u53d7\u5230\u5168\u7403\u5e02\u5834\u7684\u6ce2\u52d5\u6240\u5f71\u97ff\u3002\u63a1\u7926\u696d\u5fc5\u9808\u9762\u81e8\u7684\u73fe\u5be6\u4e4b\u4e00\u662f\u671f\u8ca8\u50f9\u683c\u6703\u53d7\u5230\u77ed\u671f\u9707\u76ea\u548c\u9577\u671f\u666f\u6c23\u5faa\u74b0\u7684\u5f71\u97ff\u3002\u88fd\u9020\u696d\u4e00\u65e6\u51fa\u73fe\u7dca\u7e2e\uff0c\u5c31\u6703\u5c0e\u81f4\u539f\u6599\u9700\u6c42\u6e1b\u5c11\uff0c\u4f7f\u5f97\u63a1\u7926\u696d\u56e0\u800c\u8870\u9000\u3002<\/p>\n<p>\u9700\u6c42\u6e1b\u5c11\u82e5\u518d\u52a0\u4e0a\u671f\u8ca8\u50f9\u683c\u4e0b\u6ed1\uff0c\u5c07\u4f7f\u5f97\u6975\u5ea6\u4ef0\u8cf4\u5929\u7136\u8cc7\u6e90\u51fa\u53e3\u7684\u570b\u5bb6 (\u5982\u6fb3\u6d32\u548c\u52a0\u62ff\u5927) \u7d93\u6fdf\u56e0\u800c\u8870\u9000\u3002\u53cd\u89c0\u7f8e\u570b\u9019\u985e\u8f03\u4e0d\u4ef0\u8cf4\u5929\u7136\u8cc7\u6e90\u51fa\u53e3\u7684\u570b\u5bb6\uff0c\u671f\u8ca8\u50f9\u683c\u4e0b\u8dcc\u5c0d\u5176\u7d93\u6fdf\u7684\u885d\u64ca\u76f8\u5c0d\u8f03\u5c0f\u3002\u9019\u4e00\u9ede\u7a81\u986f\u51fa\u67d0\u4e9b\u570b\u5bb6\u7684\u7d93\u6fdf\u591a\u9ebc\u4ef0\u8cf4\u5c11\u6578\u95dc\u9375\u7522\u696d\uff0c\u56e0\u6b64\u9019\u4e9b\u7522\u696d\u7d93\u4e0d\u8d77\u4e00\u9ede\u9ede\u7684\u885d\u64ca\u3002<\/p>\n<p><strong>\u7aca\u53d6\u50f9\u683c\u8cc7\u8a0a<\/strong><\/p>\n<p>\u91d1\u5c6c\u7684\u50f9\u683c\u6c7a\u5b9a\u65bc\u67d0\u4e00\u6a19\u6e96\u55ae\u4f4d\u7cbe\u7149\u7522\u54c1\u7684\u91cd\u91cf\u3002\u5de5\u696d\u91d1\u5c6c\u8207\u7926\u7269\u7684\u53c3\u8003\u50f9\u683c\u6216\u8a31\u7121\u6cd5\u76f4\u63a5\u5957\u7528\u5728\u7926\u696d\u516c\u53f8\u7684\u6700\u7d42\u7522\u54c1\u4e0a\u3002\u4f46\u57fa\u65bc\u751f\u7522\u689d\u4ef6\u3001\u8f09\u904b\u5bb9\u91cf\u6216\u662f\u70ba\u4e86\u6eff\u8db3\u5ba2\u6236\u8981\u6c42\uff0c\u7926\u696d\u516c\u53f8\u6703\u4ee5\u5404\u7a2e\u4e0d\u540c\u7684\u7cbe\u7149\u7a0b\u5ea6\u4f86\u92b7\u552e\u5176\u7522\u54c1\u3002\u5176\u5b9a\u50f9\u6c7a\u5b9a\u65bc\u5169\u500b\u91cd\u8981\u56e0\u7d20\uff1a\u904b\u9001\u65b9\u4fbf\u6027 (\u662f\u5426\u5bb9\u6613\u904b\u9001) \u8207\u7d14\u5ea6 (\u662f\u5426\u9054\u5230\u6a19\u6e96)\uff0c\u9019\u4e9b\u56e0\u7d20\u6c7a\u5b9a\u4e86\u8cb7\u8ce3\u96d9\u65b9\u6700\u7d42\u7684\u8b70\u50f9\u3002<\/p>\n<p>\u56e0\u6b64\uff0c\u5982\u679c\u80fd\u5920\u638c\u63e1\u67d0\u5bb6\u7926\u696d\u516c\u53f8\u7684\u50f9\u683c\u8cc7\u8a0a\uff0c\u5176\u7af6\u722d\u5c0d\u624b\u5c31\u80fd\u4ee5\u66f4\u4f4e\u7684\u50f9\u683c\u6436\u6a19\uff0c\u5176\u8cb7\u5bb6\u5c31\u80fd\u8b70\u5230\u66f4\u597d\u7684\u50f9\u683c\u3002\u7aca\u8cca\u7684\u53e6\u4e00\u500b\u4e3b\u8981\u76ee\u6a19\u662f\u5ba2\u6236\u8cc7\u8a0a\uff0c\u56e0\u70ba\u7af6\u722d\u5c0d\u624b\u53ef\u4ee5\u5229\u7528\u5077\u4f86\u7684\u5ba2\u6236\u8cc7\u8a0a\u6436\u8d70\u672a\u4f86\u7684\u92b7\u552e\u6a5f\u6703\uff0c\u6240\u4ee5\u4e5f\u6210\u70ba\u6b79\u5f92\u89ac\u89a6\u7684\u91cd\u8981\u8cc7\u8a0a\u4e4b\u4e00\u3002<\/p>\n<p><strong>\u99ed\u5ba2\u6fc0\u9032\u4e3b\u7fa9<\/strong><\/p>\n<p>\u63a1\u7926\u696d\u5c0d\u65bc\u74b0\u5883\u6240\u9020\u6210\u7684\u6c59\u67d3\uff0c\u4ee5\u53ca\u5c0d\u91ce\u751f\u52d5\u7269\u68f2\u606f\u5730\u7684\u7834\u58de\uff0c\u8b93\u6fc0\u9032\u7684\u74b0\u4fdd\u4eba\u58eb\u61a4\u800c\u5c55\u958b\u5831\u5fa9\uff0c\u9032\u800c\u963b\u7919\u7926\u696d\u516c\u53f8\u7684\u71df\u904b\uff0c\u800c\u7db2\u8def\u653b\u64ca\u6b63\u597d\u6210\u70ba\u9019\u4e9b\u6fc0\u9032\u5718\u9ad4\u963b\u6493\u63a1\u7926\u4f5c\u696d\u6700\u65b0\u7684\u65b9\u5f0f\u3002<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\"><em>\u8da8\u52e2\u79d1\u6280<\/em><\/a><em>\u5728\u6700\u65b0\u7684\u300c\u63a1\u7926\u696d\u9762\u81e8\u7684\u7db2\u8def\u5a01\u8105\u300d(Cyber Threats to the Mining Industry) \u7814\u7a76\u5831\u544a\u7576\u4e2d\u63a2\u8a0e\u4e86\u4eca\u65e5\u63a1\u7926\u696d\u7684\u5be6\u52d9\u548c\u6d41\u7a0b\uff0c\u9ede\u51fa\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u53ef\u80fd\u5229\u7528\u7684\u5b89\u5168\u6f0f\u6d1e\uff0c\u4e26\u5206\u6790\u5404\u985e\u72af\u7f6a\u96c6\u5718\u80cc\u5f8c\u53ef\u80fd\u7684\u539f\u56e0\u548c\u52d5\u6a5f\u3002\u9019\u4efd\u5831\u544a\u4e26\u672a\u7279\u5225\u63a2\u8a0e\u500b\u5225\u7684 APT \u653b\u64ca\u884c\u52d5\uff0c\u800c\u662f\u91dd\u5c0d\u9019\u500b\u4e4d\u770b\u4e4b\u4e0b\u4e26\u975e\u6b79\u5f92\u653b\u64ca\u76ee\u6a19\u7684\u7522\u696d\u63d0\u51fa\u6574\u9ad4\u5f31\u9ede\u7684\u8a55\u4f30\u3002 <\/em><\/p>\n<p>\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/cyber-threats-to-the-mining-industry\">Cyber Threats to the Mining Industry<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; \u7531\u65bc\u4eca\u65e5\u5168\u7403\u5e02\u5834\u5c0d\u65bc\u5927\u5b97\u7269\u8cc7\u53ca\u5546\u54c1\u7684\u6fc0\u70c8\u722d\u596a\uff0c\u800c\u4e14\u7d93\u6fdf\u767c\u5c55\u7686\u9700\u4ef0\u8cf4\u5929\u7136\u8cc7\u6e90\uff0c\u518d\u52a0\u4e0a\u8fd1\u4f86\u6c23\u5019\u6975\u7aef\u8b8a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14344,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[10],"tags":[45,498,1307],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/21969"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21969"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/21969\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/media\/14344"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=21969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=21969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}