{"id":2879,"date":"2021-08-17T19:35:21","date_gmt":"2021-08-17T14:05:21","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=2879"},"modified":"2021-08-17T19:35:23","modified_gmt":"2021-08-17T14:05:23","slug":"malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/","title":{"rendered":"Malware Dev Impacts Own PC and Information Ends Up On Intel Platform"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">The Trojan Developer discharges their creation on their system to try out the advanced features and the information ended up on a cybercrime intelligence platform, revealing a checkout the cybercriminal endeavor.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The threat actor is the developer of Raccoon, the data hijacked that can gather information from dozens of applications and has been rapidly increasing in popularity for the past two years.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A Name and Email, Still not enough<\/strong>!<\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">While examining an element to the threat actor, the developer of Raccoon harmed their system, a move that urgently triggered the information to pass to the command and control (C2) server and further on, to cybercrime organization.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Raccoon developer&#8217;s impacted test system was discovered through Hudson Rock\u2019s Cavalier platform, a cybercrime intelligence database that observes negotiated machines.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Co-Founder and Chief Technology Officer Alon Gal, Hudson Rock, states that Raccoon info stealer impacted their machine in February but went unnoticed because it presented no interest since it was not a machine belonging to the company\u2019s clients.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Alon Gal, Hudson Rock the co-founder and Chief Technology Officer, states that Raccoon info stealer has more than one million negotiated systems that are being monitored through Cavalier.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The researcher told our experts that the developer of Raccoon info stealer abused their machine in February but went unnoticed because it presented no interest since it was not a machine belonging to the company\u2019s clients.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">It draws attention through its IP address, 1.1.1.1, modified on purpose in the command and control server so that the real one would not get monitored, Gal says. It is enough, the IP address is used by Cloudflare&#8217;s public Domain Name System (DNS) resolver.&nbsp; &nbsp;<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"120\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image1-1024x120.png\" alt=\"Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image1\" class=\"wp-image-2881\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image1-1024x120.png 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image1-300x35.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image1-768x90.png 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image1-1536x180.png 1536w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image1.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">The information gathered from the self-infected system indicates that the developer tested the malware\u2019s ability to extract credentials from Google Chrome, an important attribute for any information stealer. More information dragged from the Raccoon test computer revealed a name and multiple email addresses associated with the malware.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Is the Raccoon Developer Revealed?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Unluckily, the details are insufficient to know the identity of Raccoon\u2019s developer. Gal says that the Trojan creator \u201clikely infected [the machine] on purpose\u201d and was careful enough to remove the details that could reveal who they are before unleashing the malware.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">For exemplify, email addresses used for various services contain either \u201craccoon\u201d or \u201craccoonstealer,\u201d indicating that they are used for customer communication. The investigators also found the name Benjamin Engel, a threat actor from Berlin and main character in the 2014 German hacker movie \u201cWho Am I.\u201d <\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"274\" height=\"324\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image2.png\" alt=\"Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image2\" class=\"wp-image-2883\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image2.png 274w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image2-254x300.png 254w\" sizes=\"(max-width: 274px) 100vw, 274px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">Other information is taken from the test system which indicates that the developer&#8217;s test box had cookies indicating logging into a Russian-speaking forum that is popular with prominent cybercriminal groups.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Gal was able to compare the ID in the cookie generated when logging into the forum with the ID attached to the Raccoon stealer account in the community.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"779\" height=\"374\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image3.png\" alt=\"Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image3\" class=\"wp-image-2884\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image3.png 779w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image3-300x144.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-image3-768x369.png 768w\" sizes=\"(max-width: 779px) 100vw, 779px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">While the information gathered this way does not include the hints essentially to put a real name to Raccoon\u2019s developer, it shows that cybercriminals can also slip up and there is still hope to catch them off guard.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Trojan Developer discharges their creation on their system to try out the advanced features and the information ended up on a cybercrime intelligence platform, revealing a checkout the cybercriminal endeavor. The threat actor is the developer of Raccoon, the data hijacked that can gather information from dozens of applications and has been rapidly increasing [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2882,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware Dev Impacts Own PC and Information Ends Up On Intel Platform - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware Dev Impacts Own PC and Information Ends Up On Intel Platform - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"The Trojan Developer discharges their creation on their system to try out the advanced features and the information ended up on a cybercrime intelligence platform, revealing a checkout the cybercriminal endeavor. The threat actor is the developer of Raccoon, the data hijacked that can gather information from dozens of applications and has been rapidly increasing [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-17T14:05:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-17T14:05:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Malware Dev Impacts Own PC and Information Ends Up On Intel Platform\",\"datePublished\":\"2021-08-17T14:05:21+00:00\",\"dateModified\":\"2021-08-17T14:05:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/\"},\"wordCount\":526,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/\",\"url\":\"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/\",\"name\":\"Malware Dev Impacts Own PC and Information Ends Up On Intel Platform - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-08-17T14:05:21+00:00\",\"dateModified\":\"2021-08-17T14:05:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Dev Impacts Own PC and Information Ends Up On Intel Platform\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Dev Impacts Own PC and Information Ends Up On Intel Platform - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/","og_locale":"en_US","og_type":"article","og_title":"Malware Dev Impacts Own PC and Information Ends Up On Intel Platform - Xiarch Solutions Private Limited","og_description":"The Trojan Developer discharges their creation on their system to try out the advanced features and the information ended up on a cybercrime intelligence platform, revealing a checkout the cybercriminal endeavor. The threat actor is the developer of Raccoon, the data hijacked that can gather information from dozens of applications and has been rapidly increasing [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-08-17T14:05:21+00:00","article_modified_time":"2021-08-17T14:05:23+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Malware-Dev-Impact-Own-PC-and-Information-Ends-Up-On-Intel-Platform-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Malware Dev Impacts Own PC and Information Ends Up On Intel Platform","datePublished":"2021-08-17T14:05:21+00:00","dateModified":"2021-08-17T14:05:23+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/"},"wordCount":526,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/","url":"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/","name":"Malware Dev Impacts Own PC and Information Ends Up On Intel Platform - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-08-17T14:05:21+00:00","dateModified":"2021-08-17T14:05:23+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/malware-dev-impacts-own-pc-and-information-ends-up-on-intel-platform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Malware Dev Impacts Own PC and Information Ends Up On Intel Platform"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2879"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=2879"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2879\/revisions"}],"predecessor-version":[{"id":2885,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2879\/revisions\/2885"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/2882"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=2879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=2879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=2879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}