{"id":75993,"date":"2024-03-18T15:03:04","date_gmt":"2024-03-18T07:03:04","guid":{"rendered":"https:\/\/version-2.com\/?p=75993"},"modified":"2024-02-28T15:04:52","modified_gmt":"2024-02-28T07:04:52","slug":"what-are-advanced-persistent-threats-apt-and-how-can-you-steer-clear-of-them","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/03\/what-are-advanced-persistent-threats-apt-and-how-can-you-steer-clear-of-them\/","title":{"rendered":"What are advanced persistent threats (APT) and how can you steer clear of them?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"75993\" class=\"elementor elementor-75993\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8a78aef49f\/advanced-persistent-threats.png\/m\/1080x0\/filters:quality(75)\" width=\"1080\" height=\"607\" \/><\/p><div><div><div class=\"my-3 PostContent_excerpt__wB2qU\"><p class=\"nord-text text-lead font-medium leading-normal text-black\">Cyberattacks are not all one-and-done deals. Some cybercriminals prefer to play the long game \u2013 they lurk and gather information over time before dealing the massive final blow. Advanced persistent threats (APT), our topic today, are exactly such long ploys \u2013 they\u2019re used to infiltrate a device and slowly collect its most sensitive data.<\/p><\/div><div class=\"PostContent_content__eM_tn text-black break-words\" data-content-type-blog=\"true\"><section class=\"my-3\"><div class=\"Article_wrapper__8_7eU\"><div class=\"richtext\"><p class=\"nord-text text-base leading-normal text-black\">Falling victim to prolonged attack campaigns can be detrimental to a business, so it\u2019s crucial to know the most effective defenses against them. Let\u2019s look at how advanced persistent threats work, how they differ from other cyberattacks, and what you can do to keep your company safe.<\/p><h2 class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Advanced persistent threat lifecycle<\/h2><p class=\"nord-text text-base leading-normal text-black\">Unlike malware, phishing emails, or other dangers lurking online, an advanced persistent threat isn\u2019t a single tool or action. The term describes a series of processes that include the infiltration and extraction of sensitive information from a device or a system. Its scale means that catching advanced persistent threats is a delicate process, and they may go unnoticed until it\u2019s too late.<\/p><p class=\"nord-text text-base leading-normal text-black\">Given the intricate nature of APTs and the complexity of their execution, these tactics are usually used by more experienced cybercriminals. Governments, law firms, and financial institutions are particularly popular targets as they handle highly valuable confidential data. The attackers tend to go after classified personal and financial information, intellectual property, patents, and other data that may be used for blackmail or ransom. Motives behind APTs include <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-cyber-espionage\/\">espionage<\/a> and <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/cyber-warfare-security-measures-against-cyber-threats\/\">cyber warfare<\/a>.<\/p><p class=\"nord-text text-base leading-normal text-black\">Advanced persistent threats require a lot of preparations ahead of the true strike. The attackers must first establish their targets and research them thoroughly, learning both about the organization\u2019s internal structure and the employees. The preparation stage helps find the target\u2019s weak links, such as poor password policies, insufficient on-site security, or outdated software use.<\/p><p class=\"nord-text text-base leading-normal text-black\">Once the background information is gathered, testing begins. The attackers want to ensure they enter and leave the system with the stolen data unnoticed, and they must go through trial and error to succeed. This thorough preparation makes advanced persistent threats stand out as some of the most sophisticated attacks, requiring expert teams to dismantle them and prevent or undo the damages. The execution itself consists of three advanced persistent threat steps.<\/p><p class=\"nord-text text-base leading-normal text-black\">Once the background work is done and the test runs have succeeded, cybercriminals initiate the first stage of the lifecycle \u2013 <b>infiltration<\/b>. Depending on the nature of the attack, they can infiltrate the system in different ways. Phishing to acquire employees&#8217; login credentials is a common strategy, as is using malicious email attachments that infect the system once downloaded and opened. Regardless of the actual strategy, the goal is to breach the defense systems and weaken the security measures in place.<\/p><p class=\"nord-text text-base leading-normal text-black\">As soon as the hackers have established their presence in the now-infected system, it\u2019s time for them to settle in and spread their roots. This step is usually known as <b>escalation<\/b> \u2013 a crucial stage for gathering intel and inching to the much-desired data. As they escalate, cybercriminals will acquire employee credentials, override security protocols, and establish backdoors to enter and exit the systems unnoticed, even if their key operation is compromised. They can attempt to reuse the backdoors in the future after evolving their tactics and striking the system again.<\/p><p class=\"nord-text text-base leading-normal text-black\">With the jackpot uncovered and the valuable data gathered, attackers can start the final phase of their operation \u2013 <b>extraction<\/b>. The backdoors from step two can be advantageous here, as the goal is to exfiltrate all the stolen information undetected. The biggest challenge here is distracting any uncompromised security systems. To achieve this, cybercriminals may rely on code obfuscation \u2013 creating a code that\u2019s difficult for humans and computers to understand and disassemble \u2013 or <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-a-ddos-attack\/\" data-link=\"NordUIlink\">distributed denial of service (DDoS) attacks<\/a>.<\/p><h3 class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">How do APTs differ from other threats?<\/h3><p class=\"nord-text text-base leading-normal text-black\">The hint is in the name here \u2013 advanced persistent threats aren\u2019t crafted like viruses you can easily quarantine. Instead, they\u2019re deeply hidden in the system, quietly combining several threats that would be a challenge to contain on their own to maximize the damage. They\u2019re not quite the \u201cmother of all threats,\u201d but they\u2019re certainly close \u2013 especially for small-scale companies that can be eroded from within by tactics that APT attackers employ.<\/p><p class=\"nord-text text-base leading-normal text-black\">Advanced persistent threats combine the worst that cyber criminals have to offer, all packaged into one \u2013 Trojan viruses infiltrating the systems, denial of service attacks to distract the security team, and mass phishing campaigns to get hold of as many login credentials as possible. One such attack could cause irreparable harm to a company, while the whole package is a destructive force. Worst of all, the amount of work put into every stage of the APT lifecycle means they\u2019re difficult to detect, and the damage is harder to undo.<\/p><h2 class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">What tactics are employed in an APT attack?<\/h2><p class=\"nord-text text-base leading-normal text-black\">As we\u2019ve established, the process of setting up and executing is complex and multifaceted. Different stages of the process employ different tactics to optimize the potential retrieval of data and exploit as many blind spots as possible. The goal is to simultaneously overwhelm the system\u2019s security measures and pass through them undetected. Common tactics used during an advanced persistent threat attack include:<\/p><ul class=\"leading-loose List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>Phishing. <\/b>Social engineering techniques reign supreme even in the most sophisticated schemes, so it\u2019s unsurprising that phishing is employed in APT attacks. In this instance, <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-spear-phishing\/\" data-link=\"NordUIlink\">spear phishing<\/a> is the popular choice \u2013 this type of attack targets a specific person to access sensitive information required to get inside the system.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>Credential theft.<\/b> This tactic often goes hand in hand with phishing attempts. The goal is to overtake as many login credentials within the organization as possible to maximize the possible theft scale.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>DoS and DDoS attacks.<\/b> These two types of denial-of-service attacks are used as a distraction technique. By overwhelming the server traffic with artificial requests, attackers distract the security team and can sneak deeper into the system undetected.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>Zero-day exploits.<\/b> <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-zero-day-vulnerability\/\">Zero-day vulnerabilities<\/a> are bugs or other weaknesses in a system that have been noticed by an attacker but haven\u2019t been patched yet. This strategy is a gambit for hackers because it requires a fast pace to execute. If executed in time, it can be used for espionage or extraction.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>Trojans. <\/b>Coopting their name from the ancient Greek myth, <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-trojan-horse-virus\/\" data-link=\"NordUIlink\">Trojan viruses<\/a> pretend to be legitimate apps and, upon being opened, attack your system from within. They may be used to weaken the defensive systems, create backdoors, or grant remote control of the infected device.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>Code obfuscation. <\/b>This is the process of creating a program that uses code so complicated neither people nor computers can effectively read or decipher it. This tactic helps cybercriminals escape the system in the final stages of an APT attack undetected, as the security tools are too preoccupied with the impossible code.<\/p><\/li><\/ul><h3 class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Advanced Persistent Threat examples<\/h3><p class=\"nord-text text-base leading-normal text-black\">Some of the biggest advanced persistent threats were years-long projects, attesting to the complexity of such attacks. Some APT groups have been around for over a decade, targeting high-profile subjects and companies, often in politically charged schemes. Many such groups are considered state-sponsored, while others may form on their own volition.<\/p><p class=\"nord-text text-base leading-normal text-black\">One of the oldest named attacks is Titan Rain, which started in 2003 and lasted several years. While the attacks that targeted the computer systems of various US-based organizations originated in China, the specific group was never identified or named. Nevertheless, the APT space is associated with a few notorious groups associated with cyber espionage, warfare, and hacktivism.<\/p><p class=\"nord-text text-base leading-normal text-black\">The APT group names that you see in the news are rarely official. Unlike other cybercrime groups that may pick a moniker, APT groups are identified and named by cybersecurity and cyberintelligence agencies. Therefore, you may see the same group referred to by a different name. For example, <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/intelligence\/microsoft-threat-actor-naming?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\" data-link=\"NordUIlink\">Microsoft\u2019s naming taxonomy<\/a> assigns climate terms based on the presumed region of the attack, whereas CrowdStrike uses animal names, i.e., \u201cTyphoon\u201d and \u201cPanda\u201d for China or \u201cSandstorm\u201d and \u201cKitten\u201d for Iran, respectively.<\/p><p class=\"nord-text text-base leading-normal text-black\"><b>Fancy Bear (Forest Blizzard, APT28)<\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">Fancy Bear is a Russian-based cyber espionage group. Although it wasn\u2019t officially identified until 2014, it\u2019s been engaged in advanced persistent threat attacks since at least 2007. The primary exploitation used by APT28 is zero-day vulnerabilities. Over the years, the group has been associated with Russian military intelligence and has been part of active cyber warfare following Russia\u2019s invasion of Ukraine in 2022. They\u2019ve also notably targeted the German parliament in a six-month APT in 2014 and interfered in presidential elections in France and the US.<\/p><p class=\"nord-text text-base leading-normal text-black\"><b>Lazarus (Diamond Sleet, APT38)<\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">Lazarus is an allegedly North Korean cyber warfare group. Its earliest confirmed APT attack, Operation Troy, dates back to 2009 and lasted until 2012. The group targeted the South Korean government with a stream of DDoS attacks. In recent years, Lazarus gained more notoriety for attacks against <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/crypto-security-tips\/\">cryptocurrency exchanges<\/a>, digital casinos, and traditional financial institutions.<\/p><p class=\"nord-text text-base leading-normal text-black\"><b>Helix Kitten (Hazel Sandstorm, APT34)<\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">Helix Kitten is assumed to be an Iranian cybercriminal group. It has a history of targeting financial and telecommunications industries, particularly in the Middle East, and relies heavily on social engineering techniques in its attacks. Its targets often overlap with those hit by Refined Kitten, another APT group assumed to be from Iran. However, it\u2019s unclear whether the two groups work in tandem.<\/p><h3 class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">APT security measures<\/h3><p class=\"nord-text text-base leading-normal text-black\">Preparing defenses against advanced persistent threats requires businesses to think ahead and stay on top of the most recent breach strategies. In some instances, an organization may only start working on its security measures after the infiltration phase of the attack, meaning that its reaction has to be quick and rely on robust tools to prevent broach escalation.<\/p><p class=\"nord-text text-base leading-normal text-black\">Here are some of the tools and tactics that your advanced persistent threat defense system should include:<\/p><ul class=\"leading-loose List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>Routine software updates and patches<\/b> \u2013 due to the prominence of zero-day exploits, it\u2019s crucial to keep your software up-to-date to close any potential vulnerabilities.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>Secure private networks<\/b> \u2013 unencrypted networks open up gateways for cybercriminals to sneak in. Ensure your organization uses encrypted network access, like <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/nordlayer.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-link=\"NordUIlink\">NordLayer<\/a>, to secure your company resources.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>Web Application Firewalls (WAF)<\/b> \u2013 firewalls help protect your web servers from potential infiltration attempts by monitoring web traffic in your organization, detecting suspicious activity, and blocking threats.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>Breach and Attack Simulations (BAS)<\/b> \u2013 running simulations helps ensure your security team is ready to tackle an incoming threat. It also ensures your tools are up-to-date and ready to handle robust cybercriminal tactics.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>Live monitoring<\/b> \u2013 it\u2019s simpler to open a backdoor passage when the security team isn\u2019t looking. Ensure that your company is always monitoring inbound and outbound network traffic to detect and block suspicious and malicious activity instantly.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>Centralized password policies<\/b> \u2013 password exploits help cybercriminals access organization accounts and, by extension, their jackpot \u2013 sensitive data and resources. By enforcing a password policy in your organization, you can ensure that everyone follows the protocol and uses strong login credentials. The policies can also account for potential data breaches and help reset affected accounts faster.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item\"><p class=\"nord-text text-base leading-normal text-black\"><b>Employee training <\/b>\u2013 to account for the human error factor, all employees should be aware of and stick to correct cybersecurity practices. Ensure your teams have regular online security training and follow the company guidelines.<\/p><\/li><\/ul><h2 class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">How can NordPass help you stay protected?<\/h2><p class=\"nord-text text-base leading-normal text-black\">Perhaps the scariest thing about advanced persistent threats is their ability to infiltrate a system undetected. This simply means that you need to reinforce your first line of defense to prevent cybercriminals from breaching your systems in the first place. Even if you suspect you\u2019re under attack, you can work on reinforcing your APT cybersecurity protection.<\/p><p class=\"nord-text text-base leading-normal text-black\">You may have noticed a trend already \u2013 many APT attacks involve social engineering techniques and rely on human error to succeed in the early stages. This makes protective measures surprisingly easy \u2013 implementing a secure password management system in your organization can be a life-changer.<\/p><p class=\"nord-text text-base leading-normal text-black\">The <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/enterprise-password-manager\/\" data-link=\"NordUIlink\">NordPass Enterprise<\/a> password manager lets you set up a robust company-wide password policy, ensuring everyone adheres to the highest security standards. The Enterprise plan is compatible with major identity authentication services, enabling secure and instant single sign-on (SSO) access. If you suspect any malicious activity from within, you can easily revoke access to sensitive information or reassign it to a different employee. If you suspect that your sensitive data has been compromised, you can use the <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/have-i-been-hacked\/\" data-link=\"NordUIlink\">Data Breach Scanner<\/a> to track your company credentials, domains, and credit card information.<\/p><p class=\"nord-text text-base leading-normal text-black\">Get in touch with our team to learn more about how <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/plans\/business\/\" data-link=\"NordUIlink\">NordPass Enterprise<\/a> helps your organization stay secure in the face of advanced persistent threats.<\/p><\/div><\/div><\/section><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cyberattacks are not all one-and-done deals. Some cyber [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,973,1129,61],"tags":[1272,974,1131],"class_list":["post-75993","post","type-post","status-publish","format-standard","hentry","category-1273","category-nord-security","category-nordpass","category-press-release","tag-1272","tag-nord-security","tag-nordpass"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are advanced persistent threats (APT) and how can you steer clear of them? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are advanced persistent threats (APT) and how can you steer clear of them? - Version 2\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks are not all one-and-done deals. Some cyber [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-18T07:03:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8a78aef49f\/advanced-persistent-threats.png\/m\/1080x0\/filters:quality(75)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/advanced-persistent-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/what-are-advanced-persistent-threats-apt-and-how-can-you-steer-clear-of-them\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"What are advanced persistent threats (APT) and how can you steer clear of them?\",\"datePublished\":\"2024-03-18T07:03:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/what-are-advanced-persistent-threats-apt-and-how-can-you-steer-clear-of-them\\\/\"},\"wordCount\":2100,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/advanced-persistent-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/8a78aef49f\\\/advanced-persistent-threats.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"keywords\":[\"2024\",\"Nord Security\",\"NordPass\"],\"articleSection\":[\"2024\",\"Nord Security\",\"NordPass\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/what-are-advanced-persistent-threats-apt-and-how-can-you-steer-clear-of-them\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/advanced-persistent-threats\\\/\",\"name\":\"What are advanced persistent threats (APT) and how can you steer clear of them? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/advanced-persistent-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/advanced-persistent-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/8a78aef49f\\\/advanced-persistent-threats.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"datePublished\":\"2024-03-18T07:03:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/advanced-persistent-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/advanced-persistent-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/advanced-persistent-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/8a78aef49f\\\/advanced-persistent-threats.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/8a78aef49f\\\/advanced-persistent-threats.png\\\/m\\\/1080x0\\\/filters:quality(75)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/advanced-persistent-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are advanced persistent threats (APT) and how can you steer clear of them?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are advanced persistent threats (APT) and how can you steer clear of them? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/","og_locale":"en_US","og_type":"article","og_title":"What are advanced persistent threats (APT) and how can you steer clear of them? - Version 2","og_description":"Cyberattacks are not all one-and-done deals. Some cyber [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/","og_site_name":"Version 2","article_published_time":"2024-03-18T07:03:04+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8a78aef49f\/advanced-persistent-threats.png\/m\/1080x0\/filters:quality(75)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/03\/what-are-advanced-persistent-threats-apt-and-how-can-you-steer-clear-of-them\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"What are advanced persistent threats (APT) and how can you steer clear of them?","datePublished":"2024-03-18T07:03:04+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/03\/what-are-advanced-persistent-threats-apt-and-how-can-you-steer-clear-of-them\/"},"wordCount":2100,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8a78aef49f\/advanced-persistent-threats.png\/m\/1080x0\/filters:quality(75)","keywords":["2024","Nord Security","NordPass"],"articleSection":["2024","Nord Security","NordPass","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/03\/what-are-advanced-persistent-threats-apt-and-how-can-you-steer-clear-of-them\/","url":"https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/","name":"What are advanced persistent threats (APT) and how can you steer clear of them? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8a78aef49f\/advanced-persistent-threats.png\/m\/1080x0\/filters:quality(75)","datePublished":"2024-03-18T07:03:04+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8a78aef49f\/advanced-persistent-threats.png\/m\/1080x0\/filters:quality(75)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/8a78aef49f\/advanced-persistent-threats.png\/m\/1080x0\/filters:quality(75)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/advanced-persistent-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What are advanced persistent threats (APT) and how can you steer clear of them?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jLH","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/75993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=75993"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/75993\/revisions"}],"predecessor-version":[{"id":75997,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/75993\/revisions\/75997"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=75993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=75993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=75993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}