{"id":8283,"date":"2019-07-29T09:05:41","date_gmt":"2019-07-28T23:05:41","guid":{"rendered":"https:\/\/nsrd.info\/blog\/?p=8283"},"modified":"2019-07-29T09:05:51","modified_gmt":"2019-07-28T23:05:51","slug":"ransomware-news","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2019\/07\/29\/ransomware-news\/","title":{"rendered":"Ransomware News"},"content":{"rendered":"\n<p>I&#8217;ve been tracking news on ransomware for a while now, and there&#8217;s been a few events of late that warrant greater attention. Data protection is an umbrella term: for some it refers to security, for others it refers to privacy, then there&#8217;s data storage protection as well. Ransomware is of interest in all three fields: it&#8217;s clearly a security problem, it could create a privacy issue, and it can be recovered faster and cheaper from with appropriate storage protection options than by paying vile criminals for a decryption key.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"540\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2018\/07\/bigStock-Abstract-Broken-Data.jpg\" alt=\"Abstract Futuristic Cyberspace With A Hacked Array Of Binary Dat\" class=\"wp-image-6980\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2018\/07\/bigStock-Abstract-Broken-Data.jpg 900w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2018\/07\/bigStock-Abstract-Broken-Data-300x180.jpg 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2018\/07\/bigStock-Abstract-Broken-Data-768x461.jpg 768w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2018\/07\/bigStock-Abstract-Broken-Data-333x200.jpg 333w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><figcaption>What happens when your data becomes unusable?<\/figcaption><\/figure>\n\n\n\n<p>Let&#8217;s start with City Power in Johannesburg, South Africa:<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Update?src=hash&amp;ref_src=twsrc%5Etfw\">#Update<\/a> City Power has been hit by a Ransomware virus. it has encrypted all our databases, applications and network. Currently our ICT department is cleaning and rebuilding all impacted applications.^GR<\/p>&mdash; @CityPowerJhb (@CityPowerJhb) <a href=\"https:\/\/twitter.com\/CityPowerJhb\/status\/1154277777950093313?ref_src=twsrc%5Etfw\">July 25, 2019<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Ransomware has had a long history of targeting sensitive industry verticals. Healthcare has been a common target, and I&#8217;d wager serious money that by now we have had <em>patient deaths<\/em> or caused, or significantly contributed by a ransomware attack at the wrong time causing a quality of care issue.<\/p>\n\n\n\n<p>Power and other utilities are obvious additional targets. While utilities companies will usually separate their corporate systems from their operational systems, that&#8217;s not always going to happen, and what&#8217;s more, a common theme when you have isolated networks is that they&#8217;re also isolated from the internet, and therefore have out of date patching and virus scanning. So all you need is one person with a USB key at the wrong time and you may very well see ransomware toast what is meant to be a sensitive, secured network area.<\/p>\n\n\n\n<p>According to BBC News:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>The ransomware attack initially affected customers&#8217; ability to buy pre-paid electricity and also hampered the firm&#8217;s efforts to respond to localised blackouts.<\/p><p>A spokesman for City Power told the BBC that more than a quarter of a million people might have been affected.<\/p><p>&#8220;These are the people on pre-paid system[s] and would at any given day buy electricity,&#8221; he said.<\/p><p>&#8220;Those people were not able to access the system.&#8221;<\/p><cite><strong><a href=\"https:\/\/www.bbc.com\/news\/technology-49125853\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Ransomware hits Jahannesburg electricity supply (opens in a new tab)\">Ransomware hits Jahannesburg electricity supply<\/a><\/strong>, 26 July 2019<\/cite><\/blockquote>\n\n\n\n<p>There are only two types of companies in the world: those who have been hit by ransomware, and those who haven&#8217;t been hit by ransomware <strong>yet<\/strong>.<\/p>\n\n\n\n<p>Ransomware has turned into a serious business model for criminals:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>From May 2018 to May 2019, the top malware category mentioned in underground forums was ransomware<\/p><cite><strong><a href=\"https:\/\/www.recordedfuture.com\/measuring-malware-popularity\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Bestsellers in the Underground Economy: Measuring Malware Popularity by Forum (opens in a new tab)\">Bestsellers in the Underground Economy: Measuring Malware Popularity by Forum<\/a><\/strong>, July 24 2019, Insikt Group<\/cite><\/blockquote>\n\n\n\n<p>People are seeking ransomware because so far it&#8217;s proven an effective extortion process: companies with inadequate backup and recovery processes feel compelled to pay the ransom in order to get the data back.<\/p>\n\n\n\n<p>Paying ransom to get back data is <em>nuts<\/em>. OK, if that&#8217;s your only option then you probably end up having to do it, but from a compliance perspective, how can you prove that something <em>else<\/em> hasn&#8217;t been done to the data?<\/p>\n\n\n\n<p>But the real rub is that if you&#8217;ve got appropriate data storage protection, <a rel=\"noreferrer noopener\" aria-label=\"you can get the data back faster by not paying the ransom (opens in a new tab)\" href=\"https:\/\/nsrd.info\/blog\/2019\/03\/12\/pay-the-ransom-or-recover-the-data\/\" target=\"_blank\">you can get the data back faster by <\/a><em><a rel=\"noreferrer noopener\" aria-label=\"you can get the data back faster by not paying the ransom (opens in a new tab)\" href=\"https:\/\/nsrd.info\/blog\/2019\/03\/12\/pay-the-ransom-or-recover-the-data\/\" target=\"_blank\">not<\/a><\/em><a rel=\"noreferrer noopener\" aria-label=\"you can get the data back faster by not paying the ransom (opens in a new tab)\" href=\"https:\/\/nsrd.info\/blog\/2019\/03\/12\/pay-the-ransom-or-recover-the-data\/\" target=\"_blank\"> paying the ransom<\/a>.<\/p>\n\n\n\n<p>Here&#8217;s the next thing: the sorts of cheap and cheerful storage systems that SMB and smaller mid-market companies tend to use are now <em>also<\/em> being targeted by ransomware. Yes, I love my Synology NAS systems I have at home, but:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Taiwan-headquartered storage vendor Synology is warning users to strengthen the passwords to their network attached storage (NAS) after several devices \u2014 capable of storing terabytes of data \u2014 were encrypted by ransomware.\u00a0<\/p><cite><a rel=\"noreferrer noopener\" aria-label=\"Ransomware crooks hit Synology NAS devices with brute-force password attacks (opens in a new tab)\" href=\"https:\/\/www.zdnet.com\/article\/ransomware-crooks-hit-synology-nas-devices-with-brute-force-password-attacks\/\" target=\"_blank\"><strong>Ransomware crooks hit Synology NAS devices with brute-force password attacks<\/strong><\/a>, Liam Tung, 26 July 2019, ZDNet<\/cite><\/blockquote>\n\n\n\n<p>It&#8217;s not just Synology though \u2014\u00a0QNAP has been similarly targeted.<\/p>\n\n\n\n<p>This is an ongoing theme: ransomware may at times be an opportunistic attack, but it&#8217;s just as likely to be deliberately targeted at specific industry verticals through spear phishing and other social engineering approaches. What&#8217;s more, you&#8217;re more likely to hear these days about ransomware attacking backup servers, which is why using general filesystem storage presented by, and accessible as a normal OS filesystem mount, is dangerous. (On the other hand, systems like Data Domain Boost keep the mount away from the backup server \u2014 and clients! \u2014 giving you greater peace of mind in a ransomware situation.)<\/p>\n\n\n\n<p>Law enforcement teams and collaborative projects are trying to get tools in the hands of businesses to allow them to decrypt ransomware attacks without having to pay a ransom. But <em>this is a standard arms race<\/em>. Every time a decryption tool gets freely published, there&#8217;ll be a new encryption attack released.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>On the three-year anniversary of the No More Ransom project, Europol announced today that users who downloaded and decrypted files using free tools made available through\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.nomoreransom.org\/\" target=\"_blank\">the No More Ransom portal<\/a>\u00a0have prevented ransomware gangs from making profits estimated at at least $108 million.<\/p><cite><strong><a href=\"https:\/\/www.zdnet.com\/article\/no-more-ransom-project-has-prevented-ransomware-profits-of-at-least-108-million\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"No More Ransom project has prevented ransomware profits of at least $108 million (opens in a new tab)\">No More Ransom project has prevented ransomware profits of at least $108 million<\/a><\/strong>, Catalin Cimpanu, 26 July 2019, ZDNet<\/cite><\/blockquote>\n\n\n\n<p>Preventing $108 million in ransomware profits sounds good, until you stop to consider that $108 million is a drop in the collective ocean for ransomware:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><strong>Ransomware cost businesses more than $8 billion per year in 2018<\/strong><\/p><p>&#8230;This is an incredibly high surge compared to 2016, when the annual cost of ransomware was estimated at $1 billion. It&#8217;s also important to mention that the money\u00a0is only a part of what a company loses. The company\u2019s reputation, the downtime, and other factors all amount to disastrous consequences behind these\u00a0ransomware statistics.<\/p><cite><strong><a href=\"https:\/\/safeatlast.co\/blog\/ransomware-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Ransomware Statistics (opens in a new tab)\">Ransomware Statistics<\/a><\/strong>, Ana Bera, 24 March 2019, Safeatlast<\/cite><\/blockquote>\n\n\n\n<p>So if it was $1 billion in 2016, and $8 billion in 2018, let&#8217;s be conservative and assume it was $3 billion in 2017. So the No More Ransom project collectively appears to have wiped out 0.9% of profits for ransomware criminals. Hmmmm.<\/p>\n\n\n\n<p>There was a time when IT related incidents were just seen as things that impacted geeky people who didn&#8217;t mind being on-call. Ransomware changes that up:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>This Wednesday, Louisiana Governor John Bel Edwards\u00a0<a href=\"http:\/\/gov.louisiana.gov\/index.cfm\/newsroom\/detail\/2085\">declared<\/a>\u00a0a state of\u00a0<a href=\"https:\/\/www.documentcloud.org\/documents\/6214291-115-JBE-2019-State-of-Emergency-Cybersecurity.html\">emergency<\/a>\u00a0in response to ransomware attacks on three public school districts.<\/p><cite><strong><a href=\"https:\/\/arstechnica.com\/tech-policy\/2019\/07\/louisiana-declares-state-emergency-in-response-to-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Louisiana declares state of emergency in response to ransomware attack (opens in a new tab)\">Louisiana declares state of emergency in response to ransomware attack<\/a><\/strong>, Jim Salter, 27 July 2019, ArsTechnica<\/cite><\/blockquote>\n\n\n\n<p>What a way to make the news.<\/p>\n\n\n\n<p>If you think you&#8217;re safe from ransomware if you operate in the cloud, you may want to re-think that one, too:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>iNSYNQ, a cloud computing provider of virtual desktop environments, has been down in a major outage that has lasted nearly a week after its servers were\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/blog.insynq.com\/blog\/an-update-from-the-ceo\" target=\"_blank\">infected last Tuesday, July 16<\/a>, with ransomware.<\/p><cite><a rel=\"noreferrer noopener\" aria-label=\"Cloud-based virtual desktop provider hit by ransomware (opens in a new tab)\" href=\"https:\/\/www.zdnet.com\/article\/cloud-based-virtual-desktop-provider-hit-by-ransomware\/\" target=\"_blank\"><strong>Cloud-based virtual desktop provider hit by ransomware<\/strong><\/a>, Catalin Cimpanu, 22 July 2019, ZDNet<\/cite><\/blockquote>\n\n\n\n<p>Some verticals have been targeted so heavily that it&#8217;s become a major topic of consideration. Take US city councils for instance: there&#8217;s been a near constant flow of news reports about US municipalities being taken out by ransomware. This has even lead to:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Meeting in Hawaii at the end of June, 1400 mayors, representing just about every US municipality with a population of 30,000 or more,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.usmayors.org\/the-conference\/resolutions\/?category=a0D4N00000FCb3LUAT&amp;meeting=87th%20Annual%20Meeting\" target=\"_blank\">voted unanimously to refuse<\/a>\u00a0to pay to unlock their IT systems encrypted by a ransomware attack.<\/p><cite><strong><a href=\"https:\/\/www.itwire.com\/security\/us-conference-of-mayors-bans-payment-of-ransomware-demands.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"US Conference of Mayors bans payment of ransomware demands (opens in a new tab)\">US Conference of Mayors bans payment of ransomware demands<\/a><\/strong>, David Heath, 13 July 2019, ITWire.<\/cite><\/blockquote>\n\n\n\n<p>The above article gives some interesting details by quoting the actual resolution that was passed:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><strong>WHEREAS<\/strong>, targeted ransomware attacks on local US government entities are on the rise; and<\/p><p><strong>WHEREAS<\/strong>, at least 170 county, city, or state government systems have experienced a ransomware attack since 2013; and<\/p><p><strong>WHEREAS<\/strong>, 22 of those attacks have occurred in 2019 alone, including the cities of Baltimore and Albany and the counties of Fisher, Texas and Genesee, Michigan; and<\/p><p><strong>WHEREAS<\/strong>, ransomware attacks can cost localities millions of dollars and lead to months of work to repair disrupted technology systems and files; and<\/p><p><strong>WHEREAS<\/strong>, paying ransomware attackers encourages continued attacks on other government systems, as perpetrators financially benefit<\/p><cite>Ibid.<\/cite><\/blockquote>\n\n\n\n<p>People run around bleating that cyber-insurance is the way to go to address the ransomware issue. Is it? Is it, though?<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Weeks after the city\u2019s insurer paid the ransom, the phones are back on and email is once again working, but the city has still not recovered all of its files.<\/p><cite><strong><a href=\"https:\/\/www.nytimes.com\/2019\/07\/07\/us\/florida-ransom-hack.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"A City Paid a Hefty Ransom to Hackers. But Its Pains Are Far From Over (opens in a new tab)\">A City Paid a Hefty Ransom to Hackers. But Its Pains Are Far From Over<\/a><\/strong>, Frances Robles, 7 July 2019, New York Times.<\/cite><\/blockquote>\n\n\n\n<p>My first book is called <strong>Enterprise systems backup and recovery: A corporate insurance policy<\/strong> for a reason. If you want <em>cyber-insurance<\/em>, spend your funds on making sure your data protection process is up to date and functional rather than paying shysters offering &#8220;cyber insurance&#8221;.<\/p>\n\n\n\n<p>So between all the ransomware news I&#8217;ve been reading about recently, and conversations I&#8217;ve been having for a while, I&#8217;ve got a few thoughts and observations:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Backing up to ReFS is nuts<\/strong>: OK, where did this one come from? I&#8217;ve had a few conversations where people have wanted to compare using a purpose built backup appliance like Data Domain to &#8220;hey I&#8217;ll just backup to ReFS on Windows Server, that does dedupe.&#8221; Even putting aside the obvious points about, <span style=\"text-decoration: underline;\">there&#8217;s deduplication, and there&#8217;s <\/span><em><span style=\"text-decoration: underline;\">deduplication<\/span><\/em>, if you&#8217;ve got someone telling you that you can achieve backup efficiency by leveraging ReFS, what they&#8217;re not telling you is that you&#8217;ll also get very poor efficiency on your ransomware payout when that storage area is encrypted.<\/li><li><strong>Avoid Windows-hosted backup servers<\/strong>: Yes, I know that ransomware attacks Linux systems as well, but it&#8217;s a numbers game, and if you track the incidents of ransomware you&#8217;ll see that Windows systems are more likely to be hit than Linux or Unix servers. So put your backup services on a Linux host, or better yet, a locked down appliance, and take away that entire threat vector.<\/li><li><strong>If you are using a regularly accessible OS for your backup server, make sure you wrap CDP around it<\/strong>: Of course, this assumes that the actual backup data is generated external to the backup server itself. (E.g., Data Domain.) If your backup server gets hit by ransomware, you need a way to quickly rewind it and get your catalogues back so you can start recovering data quickly. <em>That&#8217;s what things like RecoverPoint for Virtual Machines is for.<\/em><\/li><li><strong>You should be as paranoid about security on your backup server as you are your mission critical systems<\/strong>: Data protection <em>is<\/em> a mission-critical function for your business: the impact to your business if your backup service is lost or degraded has the potential to be massive. See my earlier post about <a rel=\"noreferrer noopener\" aria-label=\"cascading failure states (opens in a new tab)\" href=\"https:\/\/nsrd.info\/blog\/2019\/07\/17\/disaster-movies-a-model-for-data-protection\/\" target=\"_blank\">cascading failure states<\/a>.<\/li><li><strong>Tape is not the solution to ransomware:<\/strong> Yes, tape is an offline copy. Yes, tape won&#8217;t be hit by ransomware. (I&#8217;ll bet money that by mid-2020 that there will be ransomware that deliberately looks for tape devices attached to a system and <em>at least<\/em> writes data to whatever tapes are in the drives. It&#8217;s not hard.) But give yourself a thought exercise: what if you had to recover <em>everything<\/em> in your environment from tape, all at the same time? Particularly for disaster recovery scenarios <em>tape does not scale<\/em>. <\/li><li><strong>Your databases won&#8217;t decrypt properly<\/strong>: I see regular references in ransomware articles about &#8220;even our databases have been encrypted&#8221;. Congratulations, you&#8217;ll pay for a decryption key that won&#8217;t help you out. Your database hasn&#8217;t been encrypted by the ransomware jumping into the database SQL interface as an administrator and issuing SQL commands to replace the contents of each row with encrypted data, it&#8217;s stampeded over the database as a file and encrypted the data. Do you seriously want to bet that the data will come back in a consistent, recoverable format? (If you do, you&#8217;re braver than I.)<\/li><li><strong>So-called cyber insurance doesn&#8217;t do squat<\/strong>: As far as I&#8217;m concerned, the burgeoning push for &#8220;cyber insurance&#8221; is almost as criminal as the ransomware movement itself. Cyber-insurance doesn&#8217;t guarantee you an outcome, doesn&#8217;t have a guaranteed timeframe that you&#8217;ll get your data back, and doesn&#8217;t guarantee that your business won&#8217;t end up dragged through the papers as a poster-child for ransomware victims.<\/li><\/ol>\n\n\n\n<p>Those are just some of my observations. Personally I think criminals are going to end up <a rel=\"noreferrer noopener\" aria-label=\"targeting conventional backup services even more (opens in a new tab)\" href=\"https:\/\/nsrd.info\/blog\/2019\/04\/10\/backup-servers-and-malicious-attacks\/\" target=\"_blank\">targeting conventional backup services even more<\/a>, and that means point (4) above becomes even more critical.<\/p>\n\n\n\n<p>I want to wrap up by reiterating a previous point, that being there are only two types of companies in the world: those who have been hit by ransomware, and those who haven&#8217;t been hit by ransomware <strong>yet<\/strong>. Which type of company do you work for?<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>Finally, if you&#8217;re reading this in July, there&#8217;s still a couple of days left for you to go in the draw to win my latest book. <a href=\"https:\/\/nsrd.info\/blog\/2019\/06\/16\/book-giveaway-competition-protecting-information-assets-and-it-infrastructure-in-the-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Check it out, here (opens in a new tab)\">Check it out, here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;ve been tracking news on ransomware for a while now, and there&#8217;s been a few events of late that warrant&hellip;<\/p>\n","protected":false},"author":1,"featured_media":6980,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1133,21],"tags":[1343],"class_list":["post-8283","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practice","category-security","tag-ransomware"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2018\/07\/bigStock-Abstract-Broken-Data.jpg","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-29B","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/8283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=8283"}],"version-history":[{"count":5,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/8283\/revisions"}],"predecessor-version":[{"id":8289,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/8283\/revisions\/8289"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media\/6980"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=8283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=8283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=8283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}