{"id":8944,"date":"2024-09-04T16:25:13","date_gmt":"2024-09-04T16:25:13","guid":{"rendered":"https:\/\/fortgale.com\/blog\/?p=8944"},"modified":"2025-01-09T22:50:52","modified_gmt":"2025-01-09T22:50:52","slug":"behind-the-wheel-unveiling-the-supercar-phishing-kit-targeting-microsoft-365","status":"publish","type":"post","link":"https:\/\/fortgale.com\/blog\/featured\/behind-the-wheel-unveiling-the-supercar-phishing-kit-targeting-microsoft-365\/","title":{"rendered":"Behind the Wheel: Unveiling the Supercar Phishing Kit Targeting Microsoft 365"},"content":{"rendered":"\n<p><strong>UPDATES:<\/strong><\/p>\n\n\n\n<p><em><strong>27.11.2024:<\/strong> As mentioned by <a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/rockstar-2fa-phishing-as-a-service-paas-noteworthy-email-campaigns\/\">TrustWave<\/a>, &#8220;<strong>Supercar Phishing Kit<\/strong>&#8221; has an high level of overlapping with the most recent update of &#8220;<strong>Rockstar 2FA<\/strong> Phishing-as-a-Service&#8221;<\/em><\/p>\n\n\n\n<p><em><strong>26.09.2024<\/strong>: As mentioned by <a href=\"https:\/\/x.com\/anyrun_app\/status\/1839258848122544501\">Any.Run<\/a>, &#8220;<strong>Supercar Nebula<\/strong>&#8221; has an high level of overlapping with &#8220;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/06\/08\/detecting-and-mitigating-a-multi-stage-aitm-phishing-and-bec-campaign\/\"><strong>Storm-1575<\/strong><\/a>&#8220;<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>In August 2024, Fortgale identified and analyzed an extensive phishing campaign employing a previously publicy undocumented phishing kit now dubbed &#8220;<strong>Supercar Phishing Kit<\/strong>.&#8221; This campaign targets mainly <strong>Microsoft 365<\/strong> users via deceptive emails, which contain various attachments designed to redirect recipients to a counterfeit login page. A few campaigns observed using the same Phishing Kit have been observed targeting enterprise Google accounts. Upon submission of credentials, the harvested data is exfiltrated to a <strong>domain themed around luxury cars<\/strong>.<\/p>\n\n\n\n<p>Our investigation revealed that this campaign is part of a broader, ongoing attack wave. Variations of this attack have been observed targeting employees across <strong>multiple Italian companies<\/strong>, utilizing modified email themes and attachment types to evade detection. <\/p>\n\n\n\n<p>The following sections provide a detailed breakdown of the campaign\u2019s mechanics and the underlying structure of the phishing kit used in these attacks.<\/p>\n\n\n\n<p>The ownership of &#8220;<strong>Supercar Phishing Kit<\/strong>&#8221; has been attributed to &#8220;<strong>Supercar Nebula<\/strong>&#8220;, and it is probably being distributed following a <strong>Phishing-as-a-Service <\/strong>(PaaS) model.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Key Findings:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The analyzed phishing campaign is delivered via targeted emails with an HTML attachment containing a hardcoded fake Microsoft 365 login page.<\/li>\n\n\n\n<li>Upon submission, credentials are sent via a POST request to <code>https:\/\/shih-tzu-fancierson[.]ru<\/code>.<\/li>\n\n\n\n<li>Over 4000 (and still growing) similar domains, all luxury car-themed, have been identified as part of the same phishing kit infrastructure.<\/li>\n\n\n\n<li>Multiple campaigns have been observed using the same phishing kit, specifically targeting employees of Italian companies across different sectors.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Email Analysis<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Overview<\/strong><\/h3>\n\n\n\n<p>The phishing campaign initiates with a targeted email, specifically designed to deceive recipients. The goal is to lure recipients into opening the attached HTML file and unknowingly submitting their credentials.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Email Content<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Subject<\/strong>: &#8220;Attached is your e-fax issued on [REDACTED]&#8221;<\/li>\n\n\n\n<li><strong>Body Text<\/strong>: The email suggests that an e-fax document is attached, prompting the recipient to open the file to view its contents.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full is-resized is-style-default\"><img decoding=\"async\" width=\"886\" height=\"371\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/email-iniziale.png\" alt=\"\" class=\"wp-image-8946\" style=\"width:840px;height:auto\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/email-iniziale.png 886w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/email-iniziale-300x126.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/email-iniziale-768x322.png 768w\" sizes=\"(max-width: 886px) 100vw, 886px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\">Phishing email<\/figcaption><\/figure>\n\n\n\n<p>The HTML file attached to the email contains a hardcoded fake Microsoft 365 login page tailored for specific users.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Other Campaigns<\/h2>\n\n\n\n<p>In the same period we have observed other campaigns having the same structure for the exfiltration of credentials, using different email styles and topics. An example is reported below, themed around employee benefits:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"355\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/campagna_alternativa-2-1024x355.png\" alt=\"\" class=\"wp-image-8970\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/campagna_alternativa-2-1024x355.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/campagna_alternativa-2-300x104.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/campagna_alternativa-2-768x267.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/campagna_alternativa-2-1536x533.png 1536w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/campagna_alternativa-2.png 1893w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>In this case the attachment is a pdf containing a QR code leading to a Phishing page:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"790\" height=\"868\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/qr_code.png\" alt=\"\" class=\"wp-image-8955\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/qr_code.png 790w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/qr_code-273x300.png 273w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/qr_code-768x844.png 768w\" sizes=\"(max-width: 790px) 100vw, 790px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\">PDF attachment<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Phishing Page Analysis<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>HTML Code Analysis<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Page Structure<\/strong><\/h3>\n\n\n\n<p>The HTML code used in different Phishing campaign related to Super Car Phishing Kit is customized with particular variables names and, more interestingly, comments referring to famous citations about the automobilistic world: <\/p>\n\n\n\n<p><em>&lt;!&#8211; &lt;span&gt;Driving unlocks the doors to exploration.&lt;\/span&gt; &#8211;&gt;<br>&lt;!&#8211; Life&#8217;s soundtrack is the hum of a well-tuned engine. &#8211;&gt;<br>&lt;!&#8211; &lt;span&gt;Driving unlocks the doors to exploration.&lt;\/span&gt; &#8211;&gt;<br>&lt;!&#8211;&gt;Driving is freedom on the open road.&lt;\/p&gt; &#8211;&gt; <br>&lt;!&#8211; A car&#8217;s beauty is in its resilience. &#8211;&gt;<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"708\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/login-1024x708.png\" alt=\"\" class=\"wp-image-8984\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/login-1024x708.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/login-300x207.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/login-768x531.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/login.png 1287w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Credential Exfiltration<\/h3>\n\n\n\n<p>The common pattern among all the different campaigns is observed when the victim click on the login button after inserting its credentials. In that moment a POST request is made to a malicious website &#8211; in the first case analyzed to: &#8220;<code>https:\/\/shih-tzu-fancierson[.]ru<\/code>&#8220;. More precisely, the request follows the pattern: &#8220;POST https.\/\/maliciouswebsite.ru\/\/\/randomnumber.php&#8221; where &#8220;<code>randomnumber<\/code>&#8221; is usually a three digit number.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"506\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/shih-tzu-fancierson.ru_-1024x506.png\" alt=\"\" class=\"wp-image-8948\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/shih-tzu-fancierson.ru_-1024x506.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/shih-tzu-fancierson.ru_-300x148.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/shih-tzu-fancierson.ru_-768x379.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/shih-tzu-fancierson.ru_-1536x758.png 1536w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/shih-tzu-fancierson.ru_.png 1841w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\">https:\/\/shih-tzu-fancierson[.]ru<\/figcaption><\/figure>\n\n\n\n<p>The second example reported exfitered the data to: &#8220;ulsevibeol[.]ru&#8221;, having similar characteristics: <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"597\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/automotiv_design_club-1024x597.png\" alt=\"\" class=\"wp-image-8956\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/automotiv_design_club-1024x597.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/automotiv_design_club-300x175.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/automotiv_design_club-768x448.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/automotiv_design_club-1536x896.png 1536w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/automotiv_design_club.png 1670w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><figcaption class=\"wp-element-caption\">https:\/\/ulsevibeol[.]ru<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Infrastructure and Domain Analysi<\/strong>s<\/h2>\n\n\n\n<p><strong>Fortgale\u2019s investigation uncovered a vast network of domains, totaling over 4000, all associated with the &#8220;Supercar Phishing Kit.&#8221; These domains share a common luxury car theme and are connected to phishing campaigns that have targeted various Italian companies.<\/strong><\/p>\n\n\n\n<p>Other examples of landing pages for similar domains:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"885\" height=\"663\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/quantumglidese.shop_.png\" alt=\"\" class=\"wp-image-8949\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/quantumglidese.shop_.png 885w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/quantumglidese.shop_-300x225.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/quantumglidese.shop_-768x575.png 768w\" sizes=\"(max-width: 885px) 100vw, 885px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"887\" height=\"662\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/sparkelevate.ru_.png\" alt=\"\" class=\"wp-image-8951\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/sparkelevate.ru_.png 887w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/sparkelevate.ru_-300x224.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/sparkelevate.ru_-768x573.png 768w\" sizes=\"(max-width: 887px) 100vw, 887px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"892\" height=\"666\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/vaultware.ru_.png\" alt=\"\" class=\"wp-image-8950\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/vaultware.ru_.png 892w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/vaultware.ru_-300x224.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/vaultware.ru_-768x573.png 768w\" sizes=\"(max-width: 892px) 100vw, 892px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Total Identified Domains<\/strong>: Over 4,000 domains have been identified, all employing similar tactics and infrastructure, and active over the past four months since around May 2024. While the majority of these websites use the &#8220;.ru&#8221; domain, others with extensions like &#8220;.shop&#8221;, &#8220;.moscow&#8221;, &#8220;.site&#8221; and &#8220;.su&#8221; have also been observed.<\/li>\n\n\n\n<li><strong>Login Pages<\/strong>: Each domain features a login page, believed to be used by threat actors to manage collected data.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"621\" height=\"300\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/dashboard_page.png\" alt=\"\" class=\"wp-image-8957\" style=\"width:840px;height:auto\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/dashboard_page.png 621w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/dashboard_page-300x145.png 300w\" sizes=\"(max-width: 621px) 100vw, 621px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>login page<\/p>\n\n\n\n<p>These pages are likely designed to serve as a control panel for the attackers, where they can view and manage the stolen credentials. They are all protected by the Cloudflare Human Verification check.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong> Attribution<\/strong><\/h2>\n\n\n\n<p>Fortgale attributes the development of the &#8220;<strong>Supercar Phishing Kit<\/strong>&#8221; to a threat actor group dubbed &#8220;<strong>Supercar Nebula<\/strong>&#8220;. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Similar Variants<\/h2>\n\n\n\n<p>While the most prevalent backend theme remains the supercar and luxury motif, we are also identifying other variations. Specifically, different domains are using the same phishing kit hidden behind similarly structured websites, but using distinct topics such as &#8220;<strong>Wellness and Self Care<\/strong>.&#8221; Notably, these variants are associated with the exfiltration of Google credentials. <\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"507\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/healt_variant_home-1024x507.png\" alt=\"\" class=\"wp-image-8973\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/healt_variant_home-1024x507.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/healt_variant_home-300x148.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/healt_variant_home-768x380.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/healt_variant_home-1536x760.png 1536w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/healt_variant_home.png 1801w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"664\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/wellness-2-1024x664.png\" alt=\"\" class=\"wp-image-8976\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/wellness-2-1024x664.png 1024w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/wellness-2-300x194.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/wellness-2-768x498.png 768w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/wellness-2.png 1333w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" loading=\"lazy\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Interestingly, the login page for accessing the dashboard features a different design while retaining the core characteristics. This suggests that the phishing kit allows for some degree of customization or that these domains are using modified versions of the original code. The practice of altering existing code to create new variants of malicious tools is a common tactic among cyber threat actors.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1023\" height=\"493\" src=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/healt_variant_dashboard.png\" alt=\"\" class=\"wp-image-8974\" srcset=\"https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/healt_variant_dashboard.png 1023w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/healt_variant_dashboard-300x145.png 300w, https:\/\/fortgale.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/09\/healt_variant_dashboard-768x370.png 768w\" sizes=\"(max-width: 1023px) 100vw, 1023px\" loading=\"lazy\" \/><\/figure>\n\n\n\n<p>Notably, campaigns associated with this specific variant do not show any kind of particular comment in the html of the Phishing page.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>UPDATES: 27.11.2024: As mentioned by TrustWave, &#8220;Supercar Phishing Kit&#8221; has an high level of overlapping with the most recent update of &#8220;Rockstar 2FA Phishing-as-a-Service&#8221; 26.09.2024: As mentioned by Any.Run, &#8220;Supercar Nebula&#8221; has an high level of overlapping with &#8220;Storm-1575&#8220; In August 2024, Fortgale identified and analyzed an extensive phishing campaign employing a previously publicy undocumented [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":8962,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"[]"},"categories":[3,2515],"tags":[3070,269,3071],"class_list":["post-8944","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-news","category-featured","tag-microsoft365","tag-phishing","tag-phishingkit"],"_links":{"self":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/8944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/comments?post=8944"}],"version-history":[{"count":27,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/8944\/revisions"}],"predecessor-version":[{"id":9059,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/posts\/8944\/revisions\/9059"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media\/8962"}],"wp:attachment":[{"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/media?parent=8944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/categories?post=8944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fortgale.com\/blog\/wp-json\/wp\/v2\/tags?post=8944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}