{"id":2476,"date":"2021-07-12T18:45:49","date_gmt":"2021-07-12T13:15:49","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=2476"},"modified":"2021-07-12T18:45:50","modified_gmt":"2021-07-12T13:15:50","slug":"in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/","title":{"rendered":"In Widespread Ransomware Attack Kaseya Introduce Patches for Flaws Exploitation"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">On Sunday, a Florida-based software dealer Kaseya rolled out immediate updates to address the sensitive security vulnerabilities in its Virtual System Administrator (VSA) solution that was utilized as a jumping-off point to target as many as 1,500 businesses all over the globe as part of a widespread supply-chain ransomware attack.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Kaseya recently has released a security update for the VSA zero-day vulnerabilities used by the REvil ransomware group to attack MSPs and their customers.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>List of Vulnerabilities Discovered by DIVD<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Pursing the incident, the company had supported on-premises VSA customers to close down their server until or unless a patch is discovered. Now, almost 10 days later the firm has shipped a VSA version 9.5.7a (9.5.7.2994) with cures for these three new security flaws:<\/p><\/p>\n\n\n\n<ul><li><strong>CVE-2021-30116<\/strong>&nbsp;\u2013 Credentials leak and business logic flaw<\/li><li><strong>CVE-2021-30119<\/strong>&nbsp;\u2013 Cross-site scripting vulnerability&nbsp;<\/li><li><strong>CVE-2021-30120&nbsp;<\/strong>\u2013 Two-factor authentication prevention<\/li><\/ul>\n\n\n\n<p><p style=\"text-align: justify;\">All these security issues are part of a total of seven vulnerabilities that were founded and reported to Kaseya by the Dutch Institute for Vulnerability Disclosure (DIVD) earlier in April, of which the rest of the issues were remediated in the previous release:<\/p><\/p>\n\n\n\n<ul><li><strong>CVE-2021-30117:&nbsp;<\/strong>SQL insertion vulnerability (Fixed in VSA 9.5.6)<\/li><li><strong>CVE-2021-30118:&nbsp;<\/strong>Remote Code Execution (RCE) (Fixed in VSA 9.5.5)<\/li><li><strong>CVE-2021-30121:&nbsp;<\/strong>Local file inclusion vulnerability (Fixed in VSA 9.5.6)<\/li><li><strong>CVE-2021-30201:&nbsp;<\/strong>XML external aspect vulnerability (Fixed in VSA 9.5.6)<\/li><\/ul>\n\n\n\n<p><p style=\"text-align: justify;\">Apart from the fixes for the above-mentioned vulnerabilities, the latest version remedies the other three flaws, including an error that exposed weak credentials hashes in some API responses to brute-force attacks as well as a separate vulnerability that could permit the unauthorized uploads of files to the VSA server.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-medium\"><img decoding=\"async\" loading=\"lazy\" width=\"300\" height=\"300\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/In-Widespread-Ransomware-Attack-Kaseya-introduce-Patches-for-Flaws-Exploitation-image1-300x300.jpg\" alt=\"\" class=\"wp-image-2479\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/In-Widespread-Ransomware-Attack-Kaseya-introduce-Patches-for-Flaws-Exploitation-image1-300x300.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/In-Widespread-Ransomware-Attack-Kaseya-introduce-Patches-for-Flaws-Exploitation-image1-150x150.jpg 150w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/In-Widespread-Ransomware-Attack-Kaseya-introduce-Patches-for-Flaws-Exploitation-image1.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">For more security, Kasyea is suggesting limiting access to the VSA Web GUI to local IP addresses by blocking port 443 inbounds on your internet firewall.&nbsp;<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Kaseya Security Updates<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Kaseya is also alerting its users that installing the patch would force all users to essentially change their credentials to meet new credentials needs, computing that select features have been replaced with advanced alternatives and that the \u201crelease introduces some functional errors that will be corrected in the upcoming release.\u201d<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Apart from the rollout of the patch for on-premises versions of its VSA remote monitoring and management software, the organizations have also externalized the reinstatement of its VSA SaaS framework. \u201cThe backup of the services is progressing according to the plan, with 60% of our SaaS cutomers live and servers coming online for the rest of the customers in the coming time,\u201d Kaseya revealed in the rolling advisory.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The current progress arrives these days after Kaseya alter that spammers are exploiting the current ransomware crisis to send out a fake email notification that comes up to be Kaseya updates, only to harm customers with Cobalt Strike Payloads to access backdoor entry to the system and transmit next-stage malware.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Kaseya has said different flaws were chained together in what is named a \u201csophisticated Cyberattack\u201d, but it\u2019s concluded that a mixture of CVE-2021-30116, CVE-2021-30119, and CVE-2021-30120 was utilized to take out the intervention. REvil, a prolific ransomware group located in Russia, has claimed responsibility for this incident.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The use of trusted partners like software makers or service providers like Kaseya to discover and negotiate new downstream victims, often known as supply-chain attacks, and pair with the file-encrypting ransomware infections have also made it one of the largest and most significant such attacks to date.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cAmong the most conspicuous problems was software underpinned by out of date code, the use of weak encryption and credentials in Kaseya\u2019s products and servers, a patch to observe to traditional cybersecurity practices such as constantly patching the software and a focus on sales at the expense of various priorites,\u201d the investigator said.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The Kaseya attack highlights the third time that ransomware affiliates have harmed Kaseya products as a vector to set up ransomware.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">In February 2019, the Grandcrab ransomware cartel \u2013 which later evolved into Sodinokibi and REvil \u2013 advantages a vulnerability in a Kaseya plugin for the ConnectWise Manage software to set up ransomware on the networks of MSP\u2019s customer network. Moreover, in June 2019, the same gang went after Webroot SecureAnywhere and Kaseya VSA products to harm endpoints with Sobinokibi ransomware.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In-Widespread-Ransomware-Attack-Kaseya-introduce-Patches-for-Flaws-Exploitation-image1<\/p>\n","protected":false},"author":2,"featured_media":2478,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>In Widespread Ransomware Attack Kaseya Introduce Patches for Flaws Exploitation - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In Widespread Ransomware Attack Kaseya Introduce Patches for Flaws Exploitation - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"In-Widespread-Ransomware-Attack-Kaseya-introduce-Patches-for-Flaws-Exploitation-image1\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-12T13:15:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T13:15:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/In-Widespread-Ransomware-Attack-Kaseya-introduce-Patches-for-Flaws-Exploitation-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"In Widespread Ransomware Attack Kaseya Introduce Patches for Flaws Exploitation\",\"datePublished\":\"2021-07-12T13:15:49+00:00\",\"dateModified\":\"2021-07-12T13:15:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/\"},\"wordCount\":710,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/\",\"url\":\"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/\",\"name\":\"In Widespread Ransomware Attack Kaseya Introduce Patches for Flaws Exploitation - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-07-12T13:15:49+00:00\",\"dateModified\":\"2021-07-12T13:15:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"In Widespread Ransomware Attack Kaseya Introduce Patches for Flaws Exploitation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"In Widespread Ransomware Attack Kaseya Introduce Patches for Flaws Exploitation - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/","og_locale":"en_US","og_type":"article","og_title":"In Widespread Ransomware Attack Kaseya Introduce Patches for Flaws Exploitation - Xiarch Solutions Private Limited","og_description":"In-Widespread-Ransomware-Attack-Kaseya-introduce-Patches-for-Flaws-Exploitation-image1","og_url":"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-07-12T13:15:49+00:00","article_modified_time":"2021-07-12T13:15:50+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/07\/In-Widespread-Ransomware-Attack-Kaseya-introduce-Patches-for-Flaws-Exploitation-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"In Widespread Ransomware Attack Kaseya Introduce Patches for Flaws Exploitation","datePublished":"2021-07-12T13:15:49+00:00","dateModified":"2021-07-12T13:15:50+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/"},"wordCount":710,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/","url":"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/","name":"In Widespread Ransomware Attack Kaseya Introduce Patches for Flaws Exploitation - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-07-12T13:15:49+00:00","dateModified":"2021-07-12T13:15:50+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/in-widespread-ransomware-attack-kaseya-introduce-patches-for-flaws-exploitation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"In Widespread Ransomware Attack Kaseya Introduce Patches for Flaws Exploitation"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2476"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=2476"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2476\/revisions"}],"predecessor-version":[{"id":2480,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2476\/revisions\/2480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/2478"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=2476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=2476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=2476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}