{"id":466,"date":"2019-03-20T15:57:02","date_gmt":"2019-03-20T15:57:02","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/i-didnt-see-what-you-did-redux\/"},"modified":"2019-11-28T13:48:29","modified_gmt":"2019-11-28T11:48:29","slug":"i-didnt-see-what-you-did-redux","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/","title":{"rendered":"I didn\u2019t see what you did, redux"},"content":{"rendered":"\n<p><em>For more than 30 years, I\u2019ve had the privilege of assisting people get rid of viruses and other malicious software.&nbsp; In the course of doing so, I\u2019ve often been asked questions about computer security-related topics that are not product-specific.&nbsp; Some are simple or easily answered; some are complex or require careful explanation and additional research.&nbsp; In this column, I\u2019ll address questions I\u2019ve been asked, and that you may ask, that don\u2019t fall into the kind of categories answered in product manuals or KnowledgeBases.&nbsp; Whether or not you are an ESET customer, feel free to ask and I\u2019ll give it my best shot to answer!<\/em><\/p>\n\n\n\n<p>In July 2018, ESET North America started getting queries from people (Fred, Bunny M., and others) who had received emails claiming that their computers had been hacked, and that the attacker had videos of them watching \u201cadult content.\u201d&nbsp; These were examples of so-called \u201csextortion scams\u201d; we wrote about it in July 2018, in a post entitled&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/07\/26\/i-saw-what-you-did-or-did-i\/\" target=\"_blank\" rel=\"noreferrer noopener\">I saw what you did\u2026or did I?<\/a><\/p>\n\n\n\n<p>Over the past few days, we\u2019ve started getting new reports of similar, but noticeably different, blackmail attempts; indeed, I\u2019ve received several in my own personal mailbox (Ha!&nbsp; Nice try). So it\u2019s time to revisit this; thanks to Barry G., Tim R., and others for bringing these to our attention.<\/p>\n\n\n\n<p>When we wrote about this scam before, it was a case of \u201cteach you to recognize a particular phish, and you\u2019ll be safe from that specific attack\u201d; today and in a few follow-up posts, I\u2019ll try to teach you to recognize&nbsp;<em>all&nbsp;<\/em>phishes, so you\u2019ll be safe from any similar attack.&nbsp; [No, technically these aren\u2019t&nbsp;<a href=\"https:\/\/www.virusradar.com\/en\/glossary\/phishing\" target=\"_blank\" rel=\"noreferrer noopener\">phishing attacks<\/a>, but they&nbsp;<em>do&nbsp;<\/em>try to extract money from their intended victims, so: \u201cclose enough.\u201d Maybe we\u2019ll do a series on recognizing actual phishes in future posts.]<\/p>\n\n\n\n<p>Since the scammers are always rolling out new traps to try to ensnare their intended victims, this will be a process that needs regular updating; indeed, to cover all I want to discuss and not make it into&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/War_and_Peace\" target=\"_blank\" rel=\"noreferrer noopener\"><em>War and Peace<\/em><\/a>, I\u2019m breaking this discussion up into more-easily digested sections. This may be an ongoing project for&nbsp;<em>Vox<\/em>, so let\u2019s get started.<\/p>\n\n\n\n<p>First, let\u2019s look at blackmail in general \u2013 it\u2019s pretty much the same for cyberspace as it is in-person. Blackmail requires several elements: (a) something the intended victim would want to keep secret, (b) some kind of proof that the blackmailer has that \u201csomething\u201d, (c) a threat, and (d) a way provided by the blackmailer for the intended victim to \u201cavoid\u201d that threatened action \u2013 usually money, though there are other possibilities.<\/p>\n\n\n\n<p>With that in mind, here\u2019s an example of one of the recent sextortion emails:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/03\/Leonard_2019-03-14_00-30-50.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/03\/Leonard_2019-03-14_00-30-50.jpg\" alt=\"\" class=\"wp-image-123408\"\/><\/a><\/figure>\n\n\n\n<p>Figure 1: New sextortion scam, March 2019<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Secret<\/h2>\n\n\n\n<p>Here, the secret is that the intended victim is accused of viewing adult material that is, at best, embarrassing if revealed to family, co-workers, etc. &nbsp;In our example above, we have:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/03\/The-Secret.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/03\/The-Secret.jpg\" alt=\"\" class=\"wp-image-123409\"\/><\/a><\/figure>\n\n\n\n<p>Figure 2: The Secret<\/p>\n\n\n\n<p>So: is the secret real?&nbsp; Well, if you&nbsp;<em>never&nbsp;<\/em>have visited a porn site (on purpose, anyway), or someone who hasn\u2019t visited such a site more recently than, as the attacker states, \u201ca few months ago\u201d, then you KNOW the email is a scam, and hence you can ignore it.<\/p>\n\n\n\n<p>But what if you\u2019re someone who does view adult content, at least occasionally?&nbsp; Then, according to \u2018Net statistics, \u201cWelcome to the club.\u201d&nbsp; And what if, as reported in the&nbsp;<a href=\"https:\/\/twitter.com\/wsj\/status\/333674423720763392?lang=en\" target=\"_blank\" rel=\"noreferrer noopener\">Wall Street Journal\u2019s Twitter feed<\/a>&nbsp;in 2013, you are one of the \u201c40 million Americans [who] are&nbsp;regular&nbsp;visitors to porn sites \u2013 including 70% of 18- to 34-year-olds\u201d?&nbsp; Then the threat is&nbsp;<em>still&nbsp;<\/em>fairly empty.&nbsp; Here\u2019s why: The mere fact that so many people view adult material, and that it is considered taboo in many circles, makes this secret one that the potential victim may well want to&nbsp;<em>keep&nbsp;<\/em>secret, and hence it is an attractive target for the blackmailer: the attacker can make a claim that may not be based on fact in any way, but that sounds convincing, and many potential victims will have cause to believe the attacker\u2019s claims.&nbsp; So the attacker can just \u201cspray and pray\u201d that some potential victims get hooked on the bait.&nbsp; But to test whether this is the case here \u2013 that the attacker actually knows the secret \u2013 we need to dig more deeply.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The \u201cproof\u201d<\/h2>\n\n\n\n<p>In our example, the supposed proof is threefold:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>there\u2019s the \u201cfact\u201d that the email came from the victim\u2019s own email account (and the implication that the attacker controls that account),<\/li><li>that the attacker claims to have hacked into your computer, and<\/li><li>that the cyber-blackmailer recorded evidence of \u201cyour activities\u201d.<\/li><\/ul>\n\n\n\n<p>In our example, we have, for the first \u201cfact\u201d:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/03\/To-From.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/03\/To-From.jpg\" alt=\"\" class=\"wp-image-123410\"\/><\/a><\/figure>\n\n\n\n<p>Figure 3: Email To: and From:<\/p>\n\n\n\n<p>In this case, there\u2019s a classic fail \u2013 the attacker, or more likely, the sextortion kit the cybercriminal purchased on the Dark Web \u2013 didn\u2019t even appear to send the email from the victim\u2019s account.&nbsp; Indeed, neither the&nbsp;<strong>To:<\/strong>&nbsp;address\u2019s name, nor domain, match that of the&nbsp;<strong>From:<\/strong>&nbsp;field.&nbsp; But other examples I\u2019ve seen do have what appear to be matching&nbsp;<strong>To:<\/strong>&nbsp;and&nbsp;<strong>From:<\/strong>&nbsp;fields.<\/p>\n\n\n\n<p>So: for cases not so obviously bogus: is this real?<\/p>\n\n\n\n<p>Not likely \u2013 the&nbsp;<strong>From:<\/strong>&nbsp;field of email is trivial to forge; we\u2019ll look at this in more detail in a future&nbsp;<em>Vox<\/em>&nbsp;post.&nbsp; Suffice it to say that a claim that one\u2019s email account has been hacked, based solely on the&nbsp;<strong>From:<\/strong>&nbsp;field, is vacuous.&nbsp; While potential victims might not know this, even the least competent attacker should, so that attacker would be inclined to provide better, or at least more, evidence if the account actually had been hacked.&nbsp; So ignore this so-called \u201cproof\u201d \u2013 but it\u2019s not a bad idea to change the password on your email account anyway, to a unique, difficult-to-guess password.&nbsp; This uniqueness is key; we\u2019ll come back to this later.&nbsp; And you can always contact your email provider to ask if there has been any unusual activity over \u201cthe past few months.\u201d&nbsp; Note that if you are&nbsp;<em>able&nbsp;<\/em>to change your password, there\u2019s an increased chance that there has been no attack: if I were a cybercriminal and I owned your account, I\u2019d probably be inclined to change the password so that YOU couldn\u2019t change it, and thereby lock me out.<\/p>\n\n\n\n<p>Next, there\u2019s the assertion that the attacker hacked into your&nbsp;<em>computer<\/em>:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/03\/hacked-in.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/03\/hacked-in.jpg\" alt=\"\" class=\"wp-image-123411\"\/><\/a><\/figure>\n\n\n\n<p>Figure 4: Claim of having hacked the victim\u2019s computer<\/p>\n\n\n\n<p>Notice that this is different from hacking into your email account, since they do have unique (and hence: different), difficult-to-guess passwords, right???&nbsp; Regardless: the attacker is claiming to have broken into your computer as well as your email account, which leads us to two cases:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>If real, and the attacker compromised the email account first, there is no direct way to tell what computer is associated with you, given your email address. This is why you can send and receive Gmail, for example, using your home computer, your phone, your work computer, and the public computer at your local public library.&nbsp; So how did the attacker, once s\/he hacked your email account, then figure out what your computer was in order to hack into it?&nbsp;&nbsp; Answer: \u201cS\/he didn\u2019t.\u201d<\/li><li>If real, and the attacker hacked into your computer first, then sure: it would be easier to know what your email address is, of course. But in order to hack into your computer (or \u201cdevices\u201d), the attacker would have to get past your computer security software.&nbsp; While the main purpose of computer security software (the anti-malware type everyone has installed \u2013 and you DO have top-quality, up-to-date, up<em>dated<\/em>&nbsp;security software on all your devices, correct??&nbsp; If you\u2019re reading WeLiveSecurity, surely you do\u2026) \u2026 where was I?&nbsp; Oh, yes: the main purpose of such software is not to protect against human attacks but rather against automated attempts to compromise your computer, but it also offers at least some protection against the&nbsp;<em>tools<\/em>&nbsp;an attacker might use to try to break into your machine.&nbsp; So unless the attacker used a&nbsp;<a href=\"https:\/\/www.virusradar.com\/en\/glossary\/zero-day\" target=\"_blank\" rel=\"noreferrer noopener\">zero-day exploit<\/a>&nbsp;against you, there\u2019s a very good chance that the hacking attempt would have failed.&nbsp; And unless your attacker has the budget of a G7 nation, and you are&nbsp;<em>very<\/em>&nbsp;interesting,&nbsp;0-days wouldn\u2019t be wasted for mere sextortion attempts.So again: how did the cybercriminal hack into your computer?&nbsp; Signs point to \u201cS\/he didn\u2019t.\u201d<\/li><\/ol>\n\n\n\n<p>Finally (for this example), there\u2019s the assertion that your webcam was used to capture video of you and your actions.&nbsp; If, like me, you have a piece of double-sided black electrical tape covering your camera(s), then again: the fraud is exposed.&nbsp; Also, several computer security suites, including ESET, include webcam protection.&nbsp; So get some sort of webcam cover (commercial ones exist, and are inexpensive, if you don\u2019t like the electrical tape idea) and consider using security software that includes this protection if you don\u2019t have it already.<\/p>\n\n\n\n<p>What if these tipoffs do not apply to you?&nbsp; Then we proceed to the next phase.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The threat<\/h2>\n\n\n\n<p>In our example, the sextortionist threatens to \u201csend out your video recording to all your contacts including relatives, coworkers, etc.\u201d unless payment is received.&nbsp; If you still think this email may be true (though we can prove that, in this example, it is not), then ask yourself: \u201cWould this embarrass me?\u201d&nbsp; Apparently, adult content is becoming more and more socially acceptable, so if you are one of the increasing number who aren\u2019t concerned if others know that you access adult content, then again: the cyber-blackmailer, even in cases where the attacker actually has what otherwise would be compromising information, is negated.<\/p>\n\n\n\n<p>On the other hand, if such a release would be embarrassing, then look for these key points: is there a brief time to pay the blackmail demand?&nbsp; Is the email vague?&nbsp; Does it use \u201ccomputer mumbo-jumbo\u201d?&nbsp; If so, then it\u2019s odds-on that the threat is not real.&nbsp; In this case: while the words below&nbsp;<em>do&nbsp;<\/em>have some meaning, they\u2019re intended more to scare than to convince.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/03\/mumbo-jumbo.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/03\/mumbo-jumbo.jpg\" alt=\"\" class=\"wp-image-123412\"\/><\/a><\/figure>\n\n\n\n<p>Figure 5: The mumbo-jumbo<\/p>\n\n\n\n<p>Also, it\u2019s worth noting that properly-configured computer security software is very good at catching&nbsp;<a href=\"https:\/\/www.virusradar.com\/en\/glossary\/keylogger\" target=\"_blank\" rel=\"noreferrer noopener\">keylogger<\/a>&nbsp;software, so it\u2019s pretty unlikely that an attacker could get that on your system without your security software noticing.&nbsp; Another strike against the cybercriminal.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The payment<\/h2>\n\n\n\n<p>In this case, the payment demand is for bitcoin \u2013 virtual currencies are often used by cyber-criminals.&nbsp; Here, it may shed some light to look at the amount requested: if someone had actually hacked into your machine, then the attacker would probably have some idea of your financial position.&nbsp; Does the dollar amount fit your economic situation?&nbsp; Probably not.&nbsp; And the attacker wants to get paid \u2013 if the attacker had&nbsp;<em>real&nbsp;<\/em>evidence, the cybercriminal might try to rush you, but probably wouldn\u2019t set a deadline.&nbsp; Or at least would try to contact you again if you didn\u2019t respond, perhaps setting different terms.&nbsp; But attackers know that people go on vacation and are away from email for various other reasons, so that their requests might not even be seen in the \u201ccritical period\u201d \u2026 and hence they would be likely to try again, perhaps with more convincing proof.&nbsp; For example, in the case of ransomware \u2013 a real threat indeed \u2013 the attackers put ransom notes all over the computer (Desktop, Documents folder, etc.), so it\u2019s very hard to miss.&nbsp; If the attacker in this case actually had hacked into the victim\u2019s computer, rest assured that a similar model would be in use.<\/p>\n\n\n\n<p>Oh, and note that blackmailers almost never settle for \u201cone-and-done.\u201d&nbsp; If they can get you to pay once, they\u2019ll keep knocking on your inbox to get more out of you.&nbsp; So even if this were real, it would be a fool\u2019s errand to pay \u2013 and for the fake ones, be sure that victims who respond will be put on a list of those who are prone to fall for such attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What next?<\/h2>\n\n\n\n<p>If none of the above \u201ctells\u201d convince you that this (or whatever email you might have received) is a scam, there are other techniques we can use.&nbsp; We\u2019ll take a look at these in our next&nbsp;<em>Vox<\/em>&nbsp;post \u2013 some of which are decidedly easier than the specific ones we\u2019ve presented here.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">About&nbsp;<em>Vox<\/em><\/h3>\n\n\n\n<p>Got a computer security question that\u2019s not product-specific?&nbsp; Leave us a comment here or use our&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">AskESET form<\/a>&nbsp;on the Contact Us page.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For more than 30 years, I\u2019ve had the privilege of assisting people get rid of viruses and other malicious software.&nbsp; In the course of doing so, I\u2019ve often been asked questions about computer security-related topics that are not product-specific.&nbsp; Some are simple or easily answered; some are complex or require careful explanation and additional research.&nbsp;<\/p>\n","protected":false},"author":5,"featured_media":4080,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[169],"tags":[],"class_list":["post-466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scams"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>I didn\u2019t see what you did, redux - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"I didn\u2019t see what you did, redux\" \/>\n<meta property=\"og:description\" content=\"For more than 30 years, I\u2019ve had the privilege of assisting people get rid of viruses and other malicious software.&nbsp; In the course of doing so, I\u2019ve often been asked questions about computer security-related topics that are not product-specific.&nbsp; Some are simple or easily answered; some are complex or require careful explanation and additional research.&nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-20T15:57:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-28T11:48:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/03\/ISaw_WhatYouDid.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"I didn\u2019t see what you did, redux\",\"datePublished\":\"2019-03-20T15:57:02+00:00\",\"dateModified\":\"2019-11-28T11:48:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/\"},\"wordCount\":2219,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ISaw_WhatYouDid.jpg\",\"articleSection\":[\"scams\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2019\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/\",\"name\":\"I didn\u2019t see what you did, redux - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ISaw_WhatYouDid.jpg\",\"datePublished\":\"2019-03-20T15:57:02+00:00\",\"dateModified\":\"2019-11-28T11:48:29+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ISaw_WhatYouDid.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/ISaw_WhatYouDid.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"I didn\u2019t see what you did, redux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/03\\\/20\\\/i-didnt-see-what-you-did-redux\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"I didn\u2019t see what you did, redux - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/","og_locale":"en_US","og_type":"article","og_title":"I didn\u2019t see what you did, redux","og_description":"For more than 30 years, I\u2019ve had the privilege of assisting people get rid of viruses and other malicious software.&nbsp; In the course of doing so, I\u2019ve often been asked questions about computer security-related topics that are not product-specific.&nbsp; Some are simple or easily answered; some are complex or require careful explanation and additional research.&nbsp;","og_url":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2019-03-20T15:57:02+00:00","article_modified_time":"2019-11-28T11:48:29+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/03\/ISaw_WhatYouDid.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"I didn\u2019t see what you did, redux","datePublished":"2019-03-20T15:57:02+00:00","dateModified":"2019-11-28T11:48:29+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/"},"wordCount":2219,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/03\/ISaw_WhatYouDid.jpg","articleSection":["scams"],"inLanguage":"en-US","copyrightYear":"2019","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/","url":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/","name":"I didn\u2019t see what you did, redux - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/03\/ISaw_WhatYouDid.jpg","datePublished":"2019-03-20T15:57:02+00:00","dateModified":"2019-11-28T11:48:29+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/03\/ISaw_WhatYouDid.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/03\/ISaw_WhatYouDid.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"I didn\u2019t see what you did, redux"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/03\/20\/i-didnt-see-what-you-did-redux\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=466"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/466\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/4080"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}