{"id":1210,"date":"2021-03-06T09:03:36","date_gmt":"2021-03-06T03:33:36","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1210"},"modified":"2021-03-06T09:07:54","modified_gmt":"2021-03-06T03:37:54","slug":"supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/","title":{"rendered":"Supermicro and Pulse Released the Fixed while securing the \u2018TrickBoot\u2019 Attacks!"},"content":{"rendered":"\n<p><p style=\"text-align: justify\">Pulse and Supermicro had released an advisory and warns the users that few motherboards of the organization may be vulnerable to TrickBot malware\u2019s UEFI firmware that targeted the entire module.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How this Started?<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"512\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/supermicro-pulse-release-update-featured-1024x512.jpg\" alt=\"Supermicro and Pulse Released the Fixed while securing the \u2018TrickBoot\u2019 Attacks!\" class=\"wp-image-1211\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/supermicro-pulse-release-update-featured-1024x512.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/supermicro-pulse-release-update-featured-300x150.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/supermicro-pulse-release-update-featured-768x384.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/supermicro-pulse-release-update-featured-1536x768.jpg 1536w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/supermicro-pulse-release-update-featured.jpg 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">In 2020, the security firms named Advanced Intelligence and Eclypsium also published a joint report related to this new malware that targets the TrickBoot module which is delivered by TrickBoot malware.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Once the module is executed it will analyze the device that consists of UEFI firmware and verified the write protection disabled. In case the malware is capable to erase, read and write the firmware.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">This action authorizes the malware to perform multiple malicious activities that deal with bricking a device, bypassing an operating system security tool, or retargeting the system after reset.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">While verifying that UEFI BIOS write protection is enabled then the module uses the RwDrv.sys drivers from RWEverything utility.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">\u201cAll the requests that UEFI firmware stored in the SPI flash chip that does through with the SPI controller, which is the part of Platform Controller Hub (PCH) on Intel platforms. The SPI controller deals with access control mechanisms and gets locked during the boot process while preventing the unauthorized modification of UEFI firmware that was stored in the SPI flash memory.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">However, the Modern systems are intended and enabled these bios while writing the protections and prevent the firmware from further modifications; since these protections are not enabled or misconfigured. In case the BIOS is not write-protected then the hackers can easily able to edit the firmware or they can delete the data completely.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">This malware can examine the device firmware which is currently restricted to some Intel platforms like Kaby Lake, Coffee lake, Sky Lake, and Comet Lake.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Advisories Includes?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify\">The advisory released today that issues the warning that X10 UP motherboards are vulnerable to the TrickBoot malware that released a serious BIOS update and enabled write protection.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The organization Supermicro is already aware of this Trickboot issued, first identified while setting a subset of the X10 UP motherboards. Now the organization is working to provide a resolution for this vulnerability and the organization also shared the serial no of motherboards that may consist of the vulnerabilities.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The vulnerable X10 UP-series (&#8220;<strong>Denlow<\/strong>&#8220;) motherboards are listed below.<\/p><\/p>\n\n\n\n<ol><li><strong>X10SLH-F<\/strong>&nbsp;(will EOL on 3\/11\/2021)<\/li><li><strong>X10SLL-F<\/strong>&nbsp;(EOL\u2019ed since 6\/30\/2015)<\/li><li><strong>X10SLM-F<\/strong>&nbsp;(EOL\u2019ed since 6\/30\/2015)<\/li><li><strong>X10SLL+-F<\/strong>&nbsp;(EOL\u2019ed since 6\/30\/2015)<\/li><li><strong>X10SLM+-F<\/strong>&nbsp;(EOL\u2019ed since 6\/30\/2015)<\/li><li><strong>X10SLM+-LN4F<\/strong>&nbsp;(EOL\u2019ed since 6\/30\/2015)<\/li><li><strong>X10SLA-F<\/strong>&nbsp;(EOL\u2019ed since 6\/30\/2015)<\/li><li><strong>X10SL7-F<\/strong>&nbsp;(EOL\u2019ed since 6\/30\/2015)<\/li><li><strong>X10SLL-S<\/strong>\/<strong>-SF<\/strong>&nbsp;(EOL\u2019ed since 6\/30\/2015)<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Summering Up<\/strong><\/h3>\n\n\n\n<p><p style=\"text-align: justify\">Whereas, the organization also released an update named BIOS version 3.4 to fix this issue and this fix is released for the X10SLH-F motherboard only. Users also contact the organization to get the new BIOS in case their motherboards have reached the end.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Pulse Secure also released an advisory that followed Pulse Secure Appliance 5000 (PSA-5000) and Pulse Secure Appliance 7000 (PSA-7000) devices that run on the Supermicro motherboard.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Pulse released a BIOS patch update for devices that are connected or running with Pulse Connect Secure or Pulse Policy Secure. Pulse One (On-Prem Appliance Only) users will have to wait for a long period while getting the update.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The organization also advised the users to apply and update the patch that will reboot the device.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pulse and Supermicro had released an advisory and warns the users that few motherboards of the organization may be vulnerable to TrickBot malware\u2019s UEFI firmware that targeted the entire module. How this Started? In 2020, the security firms named Advanced Intelligence and Eclypsium also published a joint report related to this new malware that targets [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1215,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Supermicro and Pulse Released the Fixed while securing the \u2018TrickBoot\u2019 Attacks! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Supermicro and Pulse Released the Fixed while securing the \u2018TrickBoot\u2019 Attacks! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Pulse and Supermicro had released an advisory and warns the users that few motherboards of the organization may be vulnerable to TrickBot malware\u2019s UEFI firmware that targeted the entire module. How this Started? In 2020, the security firms named Advanced Intelligence and Eclypsium also published a joint report related to this new malware that targets [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-06T03:33:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-06T03:37:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/trickbot.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"747\" \/>\n\t<meta property=\"og:image:height\" content=\"390\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Supermicro and Pulse Released the Fixed while securing the \u2018TrickBoot\u2019 Attacks!\",\"datePublished\":\"2021-03-06T03:33:36+00:00\",\"dateModified\":\"2021-03-06T03:37:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/\"},\"wordCount\":571,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Breaches\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/\",\"url\":\"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/\",\"name\":\"Supermicro and Pulse Released the Fixed while securing the \u2018TrickBoot\u2019 Attacks! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-03-06T03:33:36+00:00\",\"dateModified\":\"2021-03-06T03:37:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Supermicro and Pulse Released the Fixed while securing the \u2018TrickBoot\u2019 Attacks!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Supermicro and Pulse Released the Fixed while securing the \u2018TrickBoot\u2019 Attacks! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Supermicro and Pulse Released the Fixed while securing the \u2018TrickBoot\u2019 Attacks! - Xiarch Solutions Private Limited","og_description":"Pulse and Supermicro had released an advisory and warns the users that few motherboards of the organization may be vulnerable to TrickBot malware\u2019s UEFI firmware that targeted the entire module. How this Started? In 2020, the security firms named Advanced Intelligence and Eclypsium also published a joint report related to this new malware that targets [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-03-06T03:33:36+00:00","article_modified_time":"2021-03-06T03:37:54+00:00","og_image":[{"width":747,"height":390,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/trickbot.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Supermicro and Pulse Released the Fixed while securing the \u2018TrickBoot\u2019 Attacks!","datePublished":"2021-03-06T03:33:36+00:00","dateModified":"2021-03-06T03:37:54+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/"},"wordCount":571,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Breaches"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/","url":"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/","name":"Supermicro and Pulse Released the Fixed while securing the \u2018TrickBoot\u2019 Attacks! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-03-06T03:33:36+00:00","dateModified":"2021-03-06T03:37:54+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/supermicro-and-pulse-released-the-fixed-while-securing-the-trickboot-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Supermicro and Pulse Released the Fixed while securing the \u2018TrickBoot\u2019 Attacks!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1210"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1210"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1210\/revisions"}],"predecessor-version":[{"id":1213,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1210\/revisions\/1213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1215"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}