{"id":4363,"date":"2022-01-19T19:22:37","date_gmt":"2022-01-19T13:52:37","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=4363"},"modified":"2022-01-19T19:22:39","modified_gmt":"2022-01-19T13:52:39","slug":"new-rabbit-ransomware-associated-to-fin8-hacking-group","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/","title":{"rendered":"New Rabbit Ransomware Associated to FIN8 Hacking Group"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">A new ransomware family called \u2018White Rabbit\u2019 appeared in the wild recently, and as per the current researcher\u2019s findings, could be a side-operation of the FIN8 hacking gang. FIN8 is a financially motivated attacker who has been addressed targeting financial organizations for some years, primarily by developing POS malware that can hijack credit card details.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is the Simple Tool to Transmit Double-Extortion?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">The first public mention of the White Rabbit Ransomware was in a tweet by a ransomware expert seeking a sample of the malware.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"363\" height=\"409\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image1-1.png\" alt=\"New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image1\" class=\"wp-image-4366\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image1-1.png 363w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image1-1-266x300.png 266w\" sizes=\"(max-width: 363px) 100vw, 363px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">In the recent report, Investigators examine a piece of the White Rabbit ransomware obtained during an attack on a US bank in December 2021. The ransomware executable is a small payload, weighing in at 100 KB file, and requires a password to be entered on command line execution to decrypt the malicious payload.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">A password to execute the malicious payload has been used previously by other ransomware operations, including Egregor, MegaCortex, and SamSam. Once executed with the correct password, the ransomware will scan all folders on the device and encrypt targeted files, creating ransom notes for each file it encrypts.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">For example, a file named test.txt would be encrypted as test.txt.script, and a ransom note would be created named test.txt.scrypt.txt. While encrypting a device, removable and network drives are also targeted, with Windows system folders excluded from encryption to prevent rendering the operating system unusable.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The ransom note notifies the victim that their files had been eliminated and threatens to post and\/or sell the seized information if the demands are not met.&nbsp; &nbsp;<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image2-1-833x1024.jpg\" alt=\"New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image2\" class=\"wp-image-4368\" width=\"531\" height=\"653\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image2-1-833x1024.jpg 833w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image2-1-244x300.jpg 244w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image2-1-768x944.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image2-1.jpg 1028w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">The deadline for the victim to pay a ransom is set to four days, after which the actors threaten to send the stolen data to data protection authorities, leading to data breach GDPR penalties. The evidence of the stolen files is uploaded to services such as &#8216;paste.com&#8217; and &#8216;file.io,&#8217; while the victim is offered a live chat communication channel with the actors on a Tor negotiation site.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The Tor site includes a &#8216;Main page,&#8217; used to display proof of stolen data, and a Chat section where the victim can communicate with the threat actors and negotiate a ransom demand, as shown below.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image3-1024x799.jpg\" alt=\"New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image3\" class=\"wp-image-4369\" width=\"687\" height=\"536\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image3-1024x799.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image3-300x234.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image3-768x599.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-image3.jpg 1264w\" sizes=\"(max-width: 687px) 100vw, 687px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What are the Links to FIN8?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">As noted in the Trend Micro report, evidence that connects FIN8 and &#8216;White Rabbit&#8217; is found in the ransomware&#8217;s deployment stage. More specifically, the novel ransomware uses a never-before-seen version of Badhatch (aka &#8220;Sardonic&#8221;), a backdoor associated with FIN8. Typically, these actors keep their custom backdoors to themselves and continue to develop them privately. This finding is also confirmed by a different report on the same ransomware family undertaken by Lodestone researchers.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">They too found Badhatch in &#8216;White Rabbit&#8217; attacks, while they also noticed PowerShell artifacts similar to FIN8-associated activity from last summer. As the Lodestone report concludes: &#8220;Lodestone identified several TTPs suggesting that White Rabbit if operating independently of FIN8, has a close connection with the more conventional threat group or is mimicking them.&#8221;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">For now, White Rabbit has limited itself to only targeting a few entities but is considered an emerging threat that could turn into a severe menace to companies in the future. At this point, it can be contained by taking standard anti-ransomware measures like the following:<\/p><\/p>\n\n\n\n<ul><li>Deploy cross-layered detection and response solutions.<\/li><li>Create an incident response playbook for attack prevention and recovery.<\/li><li>Conduct ransomware attack simulations to determine gaps and assess implementation.<\/li><li>Complete backups, test backups, confirm backups and preserve offline backups.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A new ransomware family called \u2018White Rabbit\u2019 appeared in the wild recently, and as per the current researcher\u2019s findings, could be a side-operation of the FIN8 hacking gang. FIN8 is a financially motivated attacker who has been addressed targeting financial organizations for some years, primarily by developing POS malware that can hijack credit card details. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4370,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Rabbit Ransomware Associated to FIN8 Hacking Group - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Rabbit Ransomware Associated to FIN8 Hacking Group - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"A new ransomware family called \u2018White Rabbit\u2019 appeared in the wild recently, and as per the current researcher\u2019s findings, could be a side-operation of the FIN8 hacking gang. FIN8 is a financially motivated attacker who has been addressed targeting financial organizations for some years, primarily by developing POS malware that can hijack credit card details. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-19T13:52:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-19T13:52:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"New Rabbit Ransomware Associated to FIN8 Hacking Group\",\"datePublished\":\"2022-01-19T13:52:37+00:00\",\"dateModified\":\"2022-01-19T13:52:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/\"},\"wordCount\":594,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/\",\"url\":\"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/\",\"name\":\"New Rabbit Ransomware Associated to FIN8 Hacking Group - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2022-01-19T13:52:37+00:00\",\"dateModified\":\"2022-01-19T13:52:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Rabbit Ransomware Associated to FIN8 Hacking Group\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Rabbit Ransomware Associated to FIN8 Hacking Group - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/","og_locale":"en_US","og_type":"article","og_title":"New Rabbit Ransomware Associated to FIN8 Hacking Group - Xiarch Solutions Private Limited","og_description":"A new ransomware family called \u2018White Rabbit\u2019 appeared in the wild recently, and as per the current researcher\u2019s findings, could be a side-operation of the FIN8 hacking gang. FIN8 is a financially motivated attacker who has been addressed targeting financial organizations for some years, primarily by developing POS malware that can hijack credit card details. [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2022-01-19T13:52:37+00:00","article_modified_time":"2022-01-19T13:52:39+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/New-Rabbit-Ransomware-Associated-to-FIN8-Hacking-Group-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"New Rabbit Ransomware Associated to FIN8 Hacking Group","datePublished":"2022-01-19T13:52:37+00:00","dateModified":"2022-01-19T13:52:39+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/"},"wordCount":594,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/","url":"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/","name":"New Rabbit Ransomware Associated to FIN8 Hacking Group - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2022-01-19T13:52:37+00:00","dateModified":"2022-01-19T13:52:39+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/new-rabbit-ransomware-associated-to-fin8-hacking-group\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"New Rabbit Ransomware Associated to FIN8 Hacking Group"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4363"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=4363"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4363\/revisions"}],"predecessor-version":[{"id":4371,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4363\/revisions\/4371"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/4370"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=4363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=4363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=4363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}