{"id":6417,"date":"2016-07-06T11:06:14","date_gmt":"2016-07-06T01:06:14","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=6417"},"modified":"2016-07-06T11:06:14","modified_gmt":"2016-07-06T01:06:14","slug":"office-365-cerber-ransomware-attack-slams-businesses","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses","title":{"rendered":"Cerber ransomware hits over half of Office 365 users globally; Avanan."},"content":{"rendered":"<p><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-zero-day-exploit2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6425\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-zero-day-exploit2.png\" alt=\"Cerber virus hits microsoft office 365 users\" width=\"491\" height=\"266\" \/><\/a><\/p>\n<p><strong>Millions of Office 365 users were recently struck with malicious malware that bypassed Microsoft&#8217;s built-in security and devastated their systems.<\/strong><\/p>\n<p>Almost as unnerving as malware smashing so easily through Microsoft safeguards was the fact that once infected, the ransomware speaks to the user directly through their speakers.<\/p>\n<p><!--more--><\/p>\n<p>Unlike other ransomware, Cerber plays an audio file to inform users of the infection\u2014while showing a written note at the same time.<\/p>\n<p>The phishing attack started on June 22 2016 and lasted for more than 24 hours, according to cloud-security firm Avanan. <a href=\"http:\/\/www.avanan.com\/resources\/attack-on-office-365-corporate-users-with-zero-day-ransomware-virus\">It said<\/a> during the span of the attack, around 57 percent of users &#8220;received at least one copy of the malware into one of their corporate mailboxes.&#8221;<\/p>\n<p>Avanan\u00a0said the virus targeted Office 365 users specifically, trying to trick them into activating macros to let the malware in.<\/p>\n<figure id=\"attachment_6423\" aria-describedby=\"caption-attachment-6423\" style=\"width: 454px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-exploit.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6423\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-exploit.png\" alt=\"Cerber\" width=\"464\" height=\"246\" \/><\/a><figcaption id=\"caption-attachment-6423\" class=\"wp-caption-text\">What Microsoft Office 365 users infected with Cerber saw<\/figcaption><\/figure>\n<p>The Cerber ransomware first reared it&#8217;s ugly head back in March, and has since been worked on and upgraded by malware makers. Cerber has been used in campaigns targeting the United States, Turkey, the United Kingdom, Germany and Australia, as well as in DDoS attacks.<\/p>\n<p>As if the malware couldn&#8217;t get any creepier with its built-in voice, Cerber ransomware was witnessed morphing every 15 seconds in early June. This ability gave it the ability to evade detection by switching its hash repeatedly.<\/p>\n<p>This constant work has seen Cerber rise in rank to be considered the <a href=\"https:\/\/blog.fortinet.com\/2016\/05\/26\/cerber-ransomware-marks-its-presence-in-the-wild-catches-up-with-cryptowall-and-locky\">third largest ransomware threat<\/a>, behind CryptoWall and Locky. Cerber enjoys a 24 percent Ransomware market share, behind CryptoWall (41 percent) and Locky (34 percent).<\/p>\n<figure id=\"attachment_6420\" aria-describedby=\"caption-attachment-6420\" style=\"width: 484px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/cerber.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6420\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/cerber.png\" alt=\"cerber \" width=\"494\" height=\"267\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/cerber.png 915w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/cerber-300x162.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/cerber-768x415.png 768w\" sizes=\"auto, (max-width: 494px) 100vw, 494px\" \/><\/a><figcaption id=\"caption-attachment-6420\" class=\"wp-caption-text\">The distribution of ransomware hits from FortiGuard IPS telemetry<\/figcaption><\/figure>\n<p>A number of the world&#8217;s top IT security experts <a href=\"http:\/\/www.informationsecuritybuzz.com\/hacker-news\/office-365-ransomware-attack\/\">urged businesses<\/a>\u00a0to take proper precautions following the Office 365 attacks and\u00a0to make sure to\u00a0take proper precautions.<\/p>\n<h3><span style=\"color: #000000;\">Here are the precautions IT experts recommend\u00a0you\u00a0take against Cerber:<\/span><\/h3>\n<ul>\n<li>Always keep your system and antivirus up-to-date.<\/li>\n<li>Disable Macros in your MS Office programs.<\/li>\n<li>Regularly backup your files in an external hard drive. Use a reliable backup program like <a href=\"https:\/\/www.backupassist.com\/backupassist.html\">BackupAssist<\/a>\u00a0that can encrypt your data and also perform <a href=\"https:\/\/www.backupassist.com\/backupassist\/features\/specialized\/cloudserverbackup.html\">offsite backups<\/a>. Performing the <a href=\"https:\/\/www.backupassist.com\/blog\/news\/3-2-1-rule-of-backups-infographic\/\">3-2-1 rule of backups<\/a> is essential.<\/li>\n<li>Perform regular test restores of your data to make sure they&#8217;re ready for if you&#8217;re hit with malware (or any other data emergency).<\/li>\n<li>Beware of phishing e-mails, spams, and clicking the malicious attachment.<\/li>\n<li>You can use an Intrusion Detection System (IDS) to quickly detect malware and other threats in your network. This, combined with a strong backup strategy, has allowed <a href=\"https:\/\/www.backupassist.com\/blog\/news\/samsam-ransomware-attacks-us-hospitals\/\">companies to thwart new malware<\/a> in the past and avoid paying ransoms.<\/li>\n<\/ul>\n<p>If you&#8217;re not already backed up, we recommend downloading the <a href=\"https:\/\/www.backupassist.com\/BackupAssist\/download2.php\">30-day fully featured trial<\/a> of BackupAssist and then seeking out a reliable IDS for your servers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Millions of Office 365 users were recently struck with malicious malware that bypassed Microsoft&#8217;s built-in security and devastated their systems. Almost as unnerving as malware smashing so easily through Microsoft safeguards was the fact that once infected, the ransomware speaks to the user directly through their speakers.<\/p>\n","protected":false},"author":3,"featured_media":6425,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,23],"tags":[464,465,311,389,112],"class_list":["post-6417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interest","category-news","tag-cerber","tag-office-365","tag-ransomware","tag-security","tag-windows-server-backup"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cerber ransomware hits over half of Office 365 users globally.<\/title>\n<meta name=\"description\" content=\"Millions of Office 365 users were recently struck with the malicious malware &#039;Cerber&#039; that bypassed Microsoft&#039;s built-in security and endangered businesses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cerber ransomware hits over half of Office 365 users globally.\" \/>\n<meta property=\"og:description\" content=\"Millions of Office 365 users were recently struck with the malicious malware &#039;Cerber&#039; that bypassed Microsoft&#039;s built-in security and endangered businesses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-06T01:06:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-zero-day-exploit2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"726\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adam Ipsen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Ipsen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses\"},\"author\":{\"name\":\"Adam Ipsen\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\"},\"headline\":\"Cerber ransomware hits over half of Office 365 users globally; Avanan.\",\"datePublished\":\"2016-07-06T01:06:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses\"},\"wordCount\":473,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-zero-day-exploit2.png\",\"keywords\":[\"Cerber\",\"Office 365\",\"ransomware\",\"security\",\"windows server backup\"],\"articleSection\":[\"Interest\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses\",\"url\":\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses\",\"name\":\"Cerber ransomware hits over half of Office 365 users globally.\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-zero-day-exploit2.png\",\"datePublished\":\"2016-07-06T01:06:14+00:00\",\"description\":\"Millions of Office 365 users were recently struck with the malicious malware 'Cerber' that bypassed Microsoft's built-in security and endangered businesses.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-zero-day-exploit2.png\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-zero-day-exploit2.png\",\"width\":726,\"height\":380,\"caption\":\"Cerber virus hits microsoft office 365 users\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cerber ransomware hits over half of Office 365 users globally; Avanan.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d\",\"name\":\"Adam Ipsen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g\",\"caption\":\"Adam Ipsen\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cerber ransomware hits over half of Office 365 users globally.","description":"Millions of Office 365 users were recently struck with the malicious malware 'Cerber' that bypassed Microsoft's built-in security and endangered businesses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses","og_locale":"en_US","og_type":"article","og_title":"Cerber ransomware hits over half of Office 365 users globally.","og_description":"Millions of Office 365 users were recently struck with the malicious malware 'Cerber' that bypassed Microsoft's built-in security and endangered businesses.","og_url":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses","og_site_name":"Cyber Resilience Blog","article_published_time":"2016-07-06T01:06:14+00:00","og_image":[{"width":726,"height":380,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-zero-day-exploit2.png","type":"image\/png"}],"author":"Adam Ipsen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adam Ipsen","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses"},"author":{"name":"Adam Ipsen","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d"},"headline":"Cerber ransomware hits over half of Office 365 users globally; Avanan.","datePublished":"2016-07-06T01:06:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses"},"wordCount":473,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-zero-day-exploit2.png","keywords":["Cerber","Office 365","ransomware","security","windows server backup"],"articleSection":["Interest","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses","url":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses","name":"Cerber ransomware hits over half of Office 365 users globally.","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-zero-day-exploit2.png","datePublished":"2016-07-06T01:06:14+00:00","description":"Millions of Office 365 users were recently struck with the malicious malware 'Cerber' that bypassed Microsoft's built-in security and endangered businesses.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-zero-day-exploit2.png","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2016\/07\/microsoft-office-zero-day-exploit2.png","width":726,"height":380,"caption":"Cerber virus hits microsoft office 365 users"},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/office-365-cerber-ransomware-attack-slams-businesses#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Cerber ransomware hits over half of Office 365 users globally; Avanan."}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/7a3a759eceffd2e597d435c34ed3519d","name":"Adam Ipsen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1cb7aaf3e3a12c73b037ce2cd62192517634d57a26edc34ff6b01f40fce1a50?s=96&d=mm&r=g","caption":"Adam Ipsen"},"url":"https:\/\/www.backupassist.com\/blog\/author\/adam-ipsen"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/6417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=6417"}],"version-history":[{"count":0,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/6417\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/6425"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=6417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=6417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=6417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}