{"id":1381,"date":"2021-03-22T18:16:38","date_gmt":"2021-03-22T12:46:38","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1381"},"modified":"2021-06-07T11:10:40","modified_gmt":"2021-06-07T05:40:40","slug":"hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/","title":{"rendered":"Hackers Use 11 Zero-Days Vulnerabilities while infecting the users from Windows iOS and Android!"},"content":{"rendered":"\n<p><p style=\"text-align: justify\">On Sunday, the Google zero-day bug-hunting team find out the group of attackers that are using the 11 zero-days while targeting the users from Windows, Android, and iOS this year. The Project team also state that the hacking group behind this attack is executing two different attacks between February and October 2020.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">According to the investigation the report states they used seven zero-days in January and showed how the other 4 zero-days are also used together while exploiting the big attacks.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">However, the hackers also used multiple websites that can host 2 exploit servers, and each of the servers is used while targeting the iOS, Android, and Windows users respectively.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Researchers Concluded?<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"460\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/hackers-zero-day-exploit-infect-user-accounts-image-1024x460.png\" alt=\"Hackers Use 11 Zero-Days Vulnerabilities while infecting the users from Windows IOS and Android!\" class=\"wp-image-1382\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/hackers-zero-day-exploit-infect-user-accounts-image-1024x460.png 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/hackers-zero-day-exploit-infect-user-accounts-image-300x135.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/hackers-zero-day-exploit-infect-user-accounts-image-768x345.png 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/hackers-zero-day-exploit-infect-user-accounts-image.png 1450w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">The experts state that during their testing both the servers used are exploited and discovered in all the domains. Once the initial fingerprinting is completed, an iframe was driven into the website that points to one of two servers that may exploit.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Whereas, while analyzing the campaign the experts also find out the following things;<\/p><\/p>\n\n\n\n<ul><li>Another Exploited Chain Targeted fully Patched Windows 10 that Use the Google Chrome.<\/li><li>Two partial chains are targeting 2 different Android devices that running on Android 10 that use Google Chrome and Samsung Browser.<\/li><li>Multiple RCE exploits are used for iOS 11-13 and that privileges the escalation the may execute an exploit in iOS 13.<\/li><\/ul>\n\n\n\n<p><p style=\"text-align: justify\">The security researcher also added that according to the investigation the attackers also used 11 zero-day vulnerabilities in a year. These 11 zero-day vulnerabilities are misused by building the chains of the attacks that deal with;<\/p><\/p>\n\n\n\n<ul><li><a href=\"https:\/\/googleprojectzero.blogspot.com\/p\/rca-cve-2020-6418.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-6418<\/a> &#8211; Chrome Vulnerability in TurboFan (February 2020)<\/li><li><a href=\"https:\/\/googleprojectzero.blogspot.com\/p\/rca-cve-2020-0938.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-0938<\/a> &#8211; Font Vulnerability on Windows (February 2020)<\/li><li><a href=\"https:\/\/googleprojectzero.blogspot.com\/p\/rca-cve-2020-1020.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-1020<\/a> &#8211; Font Vulnerability on Windows (February 2020)<\/li><li><a href=\"https:\/\/googleprojectzero.blogspot.com\/p\/rca-cve-2020-1027.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-1027<\/a> &#8211; Windows CSRSS Vulnerability (February 2020)<\/li><li><a href=\"https:\/\/googleprojectzero.github.io\/0days-in-the-wild\/0day-RCAs\/2020\/CVE-2020-15999.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-15999<\/a> &#8211; Chrome Freetype heap buffer overflow (October 2020)<\/li><li><a href=\"https:\/\/googleprojectzero.github.io\/0days-in-the-wild\/0day-RCAs\/2020\/CVE-2020-17087.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17087<\/a> &#8211; Windows heap buffer overflow in CNG.sys (October 2020)<\/li><li><a href=\"https:\/\/googleprojectzero.github.io\/0days-in-the-wild\/0day-RCAs\/2020\/CVE-2020-16009.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16009<\/a> &#8211; Chrome type confusion in TurboFan map deprecation (October 2020)<\/li><li><a href=\"https:\/\/googleprojectzero.github.io\/0days-in-the-wild\/0day-RCAs\/2020\/CVE-2020-16010.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16010<\/a> &#8211; Chrome for Android heap buffer overflow (October 2020)<\/li><li><a href=\"https:\/\/googleprojectzero.github.io\/0days-in-the-wild\/0day-RCAs\/2020\/CVE-2020-27930.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-27930<\/a> &#8211; Safari arbitrary stack read\/write via Type 1 fonts (October 2020)<\/li><li><a href=\"https:\/\/googleprojectzero.github.io\/0days-in-the-wild\/0day-RCAs\/2020\/CVE-2020-27950.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-27950<\/a> &#8211; iOS XNU kernel memory disclosure in each message trailers (October 2020)<\/li><li><a href=\"https:\/\/googleprojectzero.github.io\/0days-in-the-wild\/0day-RCAs\/2020\/CVE-2020-27932.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-27932<\/a> &#8211; iOS kernel type confusion with turnstiles (October 2020)<\/li><\/ul>\n\n\n\n<p><p style=\"text-align: justify\">All the discovered exploits are also revealed that the vulnerabilities are discovered is may get exploited and whereas in the case of Google Chrome Freetype zero-day, the exploit used by the hackers are identified as the new threat.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Summering Up<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify\">The experts state that the modularity of these payloads are may create interchangeable exploitation that chains, logging, targeting, and maturity of the actor&#8217;s operation while setting attacks, The entire process of how to trigger these attacks in the iOS system is not easy and the methods they used may be varied or update according to the time and situation.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Sunday, the Google zero-day bug-hunting team find out the group of attackers that are using the 11 zero-days while targeting the users from Windows, Android, and iOS this year. The Project team also state that the hacking group behind this attack is executing two different attacks between February and October 2020. According to the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1383,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers Use 11 Zero-Days Vulnerabilities while infecting the users from Windows iOS and Android! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Use 11 Zero-Days Vulnerabilities while infecting the users from Windows iOS and Android! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"On Sunday, the Google zero-day bug-hunting team find out the group of attackers that are using the 11 zero-days while targeting the users from Windows, Android, and iOS this year. The Project team also state that the hacking group behind this attack is executing two different attacks between February and October 2020. According to the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-22T12:46:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T05:40:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/hackers-zero-day-exploit-infect-user-accounts-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Hackers Use 11 Zero-Days Vulnerabilities while infecting the users from Windows iOS and Android!\",\"datePublished\":\"2021-03-22T12:46:38+00:00\",\"dateModified\":\"2021-06-07T05:40:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/\"},\"wordCount\":468,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Breaches\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/\",\"url\":\"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/\",\"name\":\"Hackers Use 11 Zero-Days Vulnerabilities while infecting the users from Windows iOS and Android! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-03-22T12:46:38+00:00\",\"dateModified\":\"2021-06-07T05:40:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Use 11 Zero-Days Vulnerabilities while infecting the users from Windows iOS and Android!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Use 11 Zero-Days Vulnerabilities while infecting the users from Windows iOS and Android! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Use 11 Zero-Days Vulnerabilities while infecting the users from Windows iOS and Android! - Xiarch Solutions Private Limited","og_description":"On Sunday, the Google zero-day bug-hunting team find out the group of attackers that are using the 11 zero-days while targeting the users from Windows, Android, and iOS this year. The Project team also state that the hacking group behind this attack is executing two different attacks between February and October 2020. According to the [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-03-22T12:46:38+00:00","article_modified_time":"2021-06-07T05:40:40+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/03\/hackers-zero-day-exploit-infect-user-accounts-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Hackers Use 11 Zero-Days Vulnerabilities while infecting the users from Windows iOS and Android!","datePublished":"2021-03-22T12:46:38+00:00","dateModified":"2021-06-07T05:40:40+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/"},"wordCount":468,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Breaches"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/","url":"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/","name":"Hackers Use 11 Zero-Days Vulnerabilities while infecting the users from Windows iOS and Android! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-03-22T12:46:38+00:00","dateModified":"2021-06-07T05:40:40+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/hackers-use-11-zero-days-vulnerabilities-while-infecting-the-users-from-windows-ios-and-android\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Use 11 Zero-Days Vulnerabilities while infecting the users from Windows iOS and Android!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1381"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1381"}],"version-history":[{"count":2,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1381\/revisions"}],"predecessor-version":[{"id":1386,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1381\/revisions\/1386"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1383"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}