{"id":1572,"date":"2018-05-01T17:01:18","date_gmt":"2018-05-01T17:01:18","guid":{"rendered":"https:\/\/beta.webuildsolutions.com\/?p=1572"},"modified":"2019-08-29T11:00:45","modified_gmt":"2019-08-29T16:00:45","slug":"ransomware-protection-how-to-stay-one-step-ahead-of-attackers-from-nakivo-white-paper","status":"publish","type":"post","link":"https:\/\/www.webuildsolutions.com\/index.php\/2018\/05\/01\/ransomware-protection-how-to-stay-one-step-ahead-of-attackers-from-nakivo-white-paper\/","title":{"rendered":"Ransomware Protection: How to Stay One Step  Ahead of Attackers (from Nakivo White Paper)"},"content":{"rendered":"<div class=\"textLayer\">\n<div><strong><span style=\"text-decoration: underline;\"><img decoding=\"async\" class=\"alignnone size-medium wp-image-1390\" src=\"https:\/\/beta.webuildsolutions.com\/wp-content\/uploads\/2018\/03\/01010101-300x128.jpg\" alt=\"\" width=\"300\" height=\"128\" srcset=\"https:\/\/www.webuildsolutions.com\/wp-content\/uploads\/2018\/03\/01010101-300x128.jpg 300w, https:\/\/www.webuildsolutions.com\/wp-content\/uploads\/2018\/03\/01010101-600x256.jpg 600w, https:\/\/www.webuildsolutions.com\/wp-content\/uploads\/2018\/03\/01010101.jpg 753w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/strong><\/div>\n<div><strong><span style=\"text-decoration: underline;\">Overview<\/span><\/strong><\/div>\n<div>In today\u2019s digitized world, having uninterrupted access to data is critical. This is why the<\/div>\n<div>concept of ransomware occurred to criminals in the first place: locking electronic files is much<\/div>\n<div>easier than seizing a warehouse or otherwise disrupting business activity offline.<\/div>\n<div>The concept proved attractive and lucrative, resulting in a sharp increase of ransomware<\/div>\n<div>attacks. Today, a company falls prey to attackers every 40 seconds, while the average ransom<\/div>\n<div>demand has grown by several times.<\/div>\n<div>The prospects are rather grim \u2013 experts predict that ransomware can get more sophisticated<\/div>\n<div>year by year, finding new ways to infect and proliferate.<\/div>\n<div>In such conditions, knowing what you are dealing with and protecting your infrastructure is<\/div>\n<div>essential. Otherwise, your important files could be taken hostage at any moment.<\/div>\n<div>What Is Ransomware?<\/div>\n<div>Ransomware is a type of malware that limits the access of users to their files. The goal is<\/div>\n<div>almost always monetary; access is returned to the user after a certain amount of money (the<\/div>\n<div>ransom) is paid. This means that businesses are some of the primary targets, because they<\/div>\n<div>can afford to pay more than not-for-profit organizations or individual users. Yet cases have<\/div>\n<div>been recorded when public institutions, such as hospitals, fell victim to ransomware, which<\/div>\n<div>resulted in endangering the lives of many patients.<\/div>\n<div>The first attempts at using ransomware were recorded long before the actual term was<\/div>\n<div>coined. In fact, the idea of taking files hostage and demanding ransom for releasing them<\/div>\n<div>belonged to AIDS researcher Joseph Popp. As early as in 1989, he distributed floppy disks<\/div>\n<div>among fellow health researchers all around the world, which supposedly contained a survey<\/div>\n<div>to evaluate their risks of contracting HIV. The floppy disk did contain the survey \u2013 as well as<\/div>\n<div>a virus that nested in users\u2019 computers and, after a certain number of reboots, locked their<\/div>\n<div>files, demanding a $189 ransom. Joseph Popp was subsequently arrested, but was ultimately<\/div>\n<div>judged mentally unfit to be prosecuted. His promising idea, however, was soon picked up,<\/div>\n<div>developed, and put into practice. By now, \u201cransomware\u201d has become a buzzword.<\/div>\n<div>Most Common Types of Ransomware<\/div>\n<div>Over the years, ransomware has lived through numerous transformations, adapting to the<\/div>\n<div>increasing levels of protection and the ever-higher awareness level of users. Hundreds of<\/div>\n<div>strains exist today, each of them with different methods of system penetration and damage<\/div>\n<div>White Paper<\/div>\n<div>2<\/div>\n<div class=\"canvasWrapper\"><\/div>\n<div><strong><span style=\"text-decoration: underline;\">potential.<\/span><\/strong> At a high level, they can all be classified according to several criteria:<\/div>\n<div>\u0016<\/div>\n<div><strong><span style=\"text-decoration: underline;\">Lock,<\/span><\/strong><\/div>\n<div>limiting your access to files. In such cases,<\/div>\n<div>you can only communicate with the attacker and<\/div>\n<div>transfer the ransom.<\/div>\n<div>\u0016<\/div>\n<div><strong><span style=\"text-decoration: underline;\">Encrypt,<\/span><\/strong><\/div>\n<div>leaving you access but depriving you of<\/div>\n<div>the ability to use the files. Modern ransomware<\/div>\n<div>uses hybrid encryption, which makes decryption<\/div>\n<div>near impossible without the permission of the<\/div>\n<div>attacker.<\/div>\n<div>\u0016<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Delete,<\/strong><\/span><\/div>\n<div>which can be done in two ways: the<\/div>\n<div>attacker can threaten to delete all the files unless<\/div>\n<div>the ransom is paid, OR they can delete encrypted<\/div>\n<div>or locked files one by one while waiting for the<\/div>\n<div>ransom.<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Destroy<\/strong><\/span><\/div>\n<div>files unless the ransom is paid, setting a<\/div>\n<div>time limit after which they start deleting the files<\/div>\n<div>one by one. The amount of ransom might grow<\/div>\n<div>with every hour.<\/div>\n<div>\u0016<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>What the attackers can threaten to do:<\/strong><\/span><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Leak<\/strong><\/span><\/div>\n<div>files, such as confidential client information<\/div>\n<div>or internal documents.<\/div>\n<div>\u0016<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Prosecute<\/strong><\/span><\/div>\n<div>the owner of the affected system for<\/div>\n<div>having illegal content. In this case, the attacker<\/div>\n<div>usually poses as a law enforcement agency,<\/div>\n<div>stating that the victim has violated intellectual<\/div>\n<div>property rights or other legislation and has to pay<\/div>\n<div>an electronic fine. This type of ransomware is a<\/div>\n<div>rather advanced one, with attackers determining<\/div>\n<div>the location of their targets and posing as a law<\/div>\n<div>enforcement agency of the relevant country.<\/div>\n<div><\/div>\n<div>White Paper<\/div>\n<div>3<\/div>\n<div class=\"canvasWrapper\"><\/div>\n<div>\u0016<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Unleash<\/strong><\/span><\/div>\n<div>more attacks in the future, prompting<\/div>\n<div>the victim to buy software that can supposedly<\/div>\n<div>protect them from future threats.<\/div>\n<\/div>\n<div>\n<div><strong>What devices can be attacked:<\/strong><\/div>\n<div><strong>\u0016<\/strong><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Computers,<\/strong><\/span><\/div>\n<div>including PCs and laptops.<\/div>\n<div>\u0016<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Mobile devices,<\/strong><\/span><\/div>\n<div>especially Android-based ones,<\/div>\n<div>because they allow the installation of applications<\/div>\n<div>from third-party sources.<\/div>\n<\/div>\n<div class=\"textLayer\">\n<div><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Ways of Contracting the Virus:<\/strong><\/span><\/div>\n<div>Many uneducated users believe that ransomware<\/div>\n<div>viruses arrive only in suspicious email attachments,<\/div>\n<div>and that all you have to do is impose strict control in<\/div>\n<div>this area. However, modern strains of ransomware<\/div>\n<div>are sophisticated enough to find multiple ways of<\/div>\n<div>penetration in your environment, and are sometimes<\/div>\n<div>even capable of turning such environment into a<\/div>\n<div>distributor. Email is, however, the primary channel,<\/div>\n<div>given the relative simplicity and the big number of<\/div>\n<div>users that can be targeted at once.<\/div>\n<div>Other channels include:<\/div>\n<div>\u0016<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>SMS text messages prompting users to click a<\/strong><\/span><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>link.<\/strong><\/span><\/div>\n<div>\u0016<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Malicious websites<\/strong><\/span>, where users are tricked<\/div>\n<div>to download infected content or are infected<\/div>\n<div>automatically using an exploit kit. An exploit kit is a tool that finds and exploits<\/div>\n<div>vulnerabilities in a user\u2019s system, causing malware to be downloaded.<\/div>\n<div>\u0016<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Legitimate websites that have been violated<\/strong> <\/span>by having malware injected into their pages.<\/div>\n<div>These can be websites of any nature, including social media, video platforms such as<\/div>\n<div>YouTube, etc.<\/div>\n<div>\u0016<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Malvertising<\/strong><\/span> \u2013 ads that contain malware, even though they are placed on trusted websites.<\/div>\n<div>When clicking on an ad, the user is redirected to a server with an exploit kit.<\/div>\n<div>\u0016<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Software applications<\/strong><\/span>, such as instant messaging apps, and their updates.<\/div>\n<div>\u0016<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Infected external storage devices<\/strong><\/span>.<\/div>\n<div>\u0016<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Computers running Remote Desktop or Terminal Services<\/strong> <\/span>whose passwords are brute-<\/div>\n<div>forced to gain malicious access to the system.<\/div>\n<div>The biggest threat related to ransomware is that such online extortion is developing rapidly,<\/div>\n<div>constantly finding new ways of damaging the files in your infrastructure.<\/div>\n<div><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Payment amount:<\/strong><\/span><\/div>\n<div>The average ransomware<\/div>\n<div>demand was $1,077 in 2016<\/div>\n<div>and went down to $544 in the<\/div>\n<div>first half of 2017. Attackers<\/div>\n<div>are settling for smaller<\/div>\n<div>amounts to make sure that<\/div>\n<div>victims can afford paying<\/div>\n<div>the ransom. They also want<\/div>\n<div>payment to seem the easiest<\/div>\n<div>way out.<\/div>\n<div><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Payment methods used for ransomware:<\/strong><\/span><\/div>\n<div>Bitcoin<\/div>\n<div>MoneyPak<\/div>\n<div>cashU<\/div>\n<div>Payment vouchers<\/div>\n<div>Gift cards<\/div>\n<div><\/div>\n<div>White Paper<\/div>\n<div>4<\/div>\n<div class=\"canvasWrapper\"><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Lower Your Chances of Becoming a Victim<\/strong><\/span><\/div>\n<div>As with any major threat, your defense should start<\/div>\n<div>before the first attack. Ransomware creators are<\/div>\n<div>looking to exploit any security vulnerabilities in your<\/div>\n<div>infrastructure; the earlier you identify and patch<\/div>\n<div>them, the better protected your environment can be.<\/div>\n<div>There is a list of tried and tested best practices that<\/div>\n<div>can help you reduce your chances of falling prey to<\/div>\n<div>attackers.<\/div>\n<div><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Education of Users<\/strong><\/span><\/div>\n<div>Email is the primary channel for infecting a system.<\/div>\n<div>In most cases, such emails are crafted individually<\/div>\n<div>to increase the chances of users opening them and<\/div>\n<div>clicking on the link or attachment inside. Sending<\/div>\n<div>mass emails that are designed to trick users into<\/div>\n<div>clicking a link or an attachment contained therein<\/div>\n<div>(i.e., users are tricked with bait en masse) is called<\/div>\n<div>\u201cphishing\u201d. Sending highly targeted emails using<\/div>\n<div>information gathered from other channels, including<\/div>\n<div>social media (i.e., users are singled out and targeted<\/div>\n<div>individually) is called \u201cspear phishing\u201d.<\/div>\n<div>Different deception techniques are used to persuade<\/div>\n<div>users of the legitimate nature of such emails. They<\/div>\n<div>can be disguised as order confirmations, package<\/div>\n<div>delivery notifications, or other seemingly harmless<\/div>\n<div>messages. Educating your system\u2019s users on the<\/div>\n<div>dangers related to opening suspicious emails,<\/div>\n<div>especially clicking on the links and attachments<\/div>\n<div>inside, can be of great help in securing your<\/div>\n<div>endpoints. Don\u2019t forget to educate your network\u2019s<\/div>\n<div>users on the dangers of using social media from<\/div>\n<div>a work computer; social media is one of the most<\/div>\n<div>frequently used channels for spreading malware<\/div>\n<div>through \u201csocial engineering\u201d (that is, tricks).<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>White Paper<\/div>\n<div>5<\/div>\n<div class=\"canvasWrapper\"><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Email Hygiene<\/strong><\/span><\/div>\n<div>Implement thorough spam filtering and email scanning to block executable (e.g., .exe) files<\/div>\n<div>in attachments, as they are the most dangerous. Unsubscribe users from unnecessary<\/div>\n<div>corporate email lists to reduce the chances of mass distribution of malicious links.<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Protection Software<\/strong><\/span><\/div>\n<div>Make sure you have reliable, up-to-date anti-virus, anti-malware, and intrusion-detection<\/div>\n<div>software that scans the systems regularly, taking immediate action if a threat is identified.<\/div>\n<div>Robust protection should cover all components of your infrastructure, including SaaS<\/div>\n<div>applications. When configuring your firewall(s), block access to known malicious IP addresses.<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Network Segmentation<\/strong><\/span><\/div>\n<div>Given the ability of ransomware to spread within a company\u2019s infrastructure, the propagation<\/div>\n<div>capabilities of the infection must be limited. You can achieve this through network<\/div>\n<div>segmentation, i.e., dividing resources, applications, and assets into segments. Communication<\/div>\n<div>between segments should be limited by logical and\/or physical separation of such segments.<\/div>\n<div>This way, if an infection does find a way into one, the effects of such infection can be isolated<\/div>\n<div>there, leaving other segments unaffected.<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Restricted Access<\/strong><\/span><\/div>\n<div>Even though users are sometimes given administrative accounts to reduce some of the IT<\/div>\n<div>team\u2019s workload, such practice puts the entire environment at greater risk. The more users<\/div>\n<div>that have the freedom to install third-party software on their computers, the higher the<\/div>\n<div>chances that at least one of them might get into trouble. Even a single infected computer<\/div>\n<div>is enough to undermine the security of the entire company. That\u2019s why users should be<\/div>\n<div>given guest accounts with limited rights. Apply the \u201cleast privilege\u201d rule in all systems and<\/div>\n<div>applications: if possible, grant read-only access to files or folders. Generally, allow access only<\/div>\n<div>for those users that can\u2019t do without such access. Restrict mapped drives on a need-only<\/div>\n<div>basis and consider disabling Remote Desktop Protocol or changing the default port. Switch off<\/div>\n<div>unused Bluetooth and infrared ports. Impose controls on the use of external devices, such as<\/div>\n<div>flash drives. Use application white-listing, i.e., allow access only to those applications that are<\/div>\n<div>trustworthy.<\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Browser Hygiene<\/strong><\/span><\/div>\n<div>Because exploit kits work based on vulnerabilities in the system, all security settings in<\/div>\n<div>browsers should be on to allow maximum protection. Update or delete outdated plugins<\/div>\n<div>White Paper<\/div>\n<div>6<\/div>\n<div class=\"canvasWrapper\"><\/div>\n<div>and add-ons. Make sure syncing folders do not sync files non-stop. Install an ad blocker to<\/div>\n<div>block malvertising.<\/div>\n<div><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>File-level Measures<\/strong><\/span><\/div>\n<div>Disable macro scripts in Office files because they can be used as downloaders of ransomware<\/div>\n<div>payloads. Enable showing file extensions and pay close attention to those that have<\/div>\n<div>suspicious (e.g., .scr) or double (e.g., .pdf.exe) extensions.<\/div>\n<div><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Testing and Improvement<\/strong><\/span><\/div>\n<div>Run regular penetration tests to check the protection level of your infrastructure and<\/div>\n<div>identify possible weak spots. Stay informed on the latest strains of ransomware and how the<\/div>\n<div>infections find ways into systems.<\/div>\n<div>Reliable Backup Practices as the Most Effective<\/div>\n<div><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Insurance<\/strong><\/span><\/div>\n<div>Despite often being listed among prevention measures, backup is more of a damage control<\/div>\n<div>method. Having backups might not make your company a less attractive target for attackers<\/div>\n<div>or patch your security holes. However, with properly executed backups, you should be able to<\/div>\n<div>shrug off the threats and simply recover your files from the latest backup.<\/div>\n<div>For virtualized and cloud environments, NAKIVO Backup &amp; Replication can be used as a<\/div>\n<div>reliable form of anti-ransomware protection. With the help of NAKIVO Backup &amp; Replication,<\/div>\n<div>you can:<\/div>\n<div>\u0016<\/div>\n<div>Back up or replicate all your Hyper-V or VMware VMs and AWS EC2 instances in<\/div>\n<div>accordance with the 3-2-1 rule (3 copies of data, on 2 different media, with one of them<\/div>\n<div>offsite). For better protection, put your offsite copy in a cloud environment.<\/div>\n<div>\u0016<\/div>\n<div>Store up to 1,000 recovery points for VM backups and as many as 30 recovery points for<\/div>\n<div>VM replicas. Rotate them using the GFS (grandfather-father-son) approach to provide you<\/div>\n<div>with multiple recovery options and a large recovery window, which can be useful if your<\/div>\n<div>recent backup files turn out to be corrupted.<\/div>\n<div>\u0016<\/div>\n<div>Increase the frequency of backups thanks to the forever-incremental approach, where<\/div>\n<div>only those data blocks that have changed since the last backup job are transferred. With<\/div>\n<div>smaller amounts of data needing to be backed up, the VM backup job takes less time and<\/div>\n<div>can thus be run more frequently without straining the network. Performing frequent<\/div>\n<div>backups means that you should have a recent recovery point available at any time.<\/div>\n<div>White Paper<\/div>\n<div>7<\/div>\n<div class=\"canvasWrapper\"><\/div>\n<div>\u0016<\/div>\n<div>Save storage space thanks to deduplication and compression. This means that your<\/div>\n<div>data can be protected against ransomware without overspending. If you choose to<\/div>\n<div>use a network-attached storage (NAS) device, NAKIVO Backup &amp; Replication can be<\/div>\n<div>installed directly on such device and help achieve even bigger savings, along with higher<\/div>\n<div>performance of your production environment.<\/div>\n<div>\u0016<\/div>\n<div>Protect your data with encryption in flight and at rest as an additional layer of security.<\/div>\n<div>\u0016<\/div>\n<div>Verify your VM backups and replicas to make sure they can be used for recovery. NAKIVO<\/div>\n<div>Backup &amp; Replication can perform screenshot verification for every VM after every backup<\/div>\n<div>or replication job and report the results to you via email.<\/div>\n<div>The entire scope of VM data protection measures is at your fingertips in the NAKIVO Backup<\/div>\n<div>&amp; Replication\u2019s intuitive web interface, with convenient scheduling and simple automation.<\/div>\n<div>Is Paying the Ransom the Right Solution?<\/div>\n<div>Assume the worst \u2013 your infrastructure was hit by a successful ransomware attack. Should<\/div>\n<div>you recommend that the business owners pay the ransom? There is no single answer to this<\/div>\n<div>question. The \u201cwe don\u2019t negotiate with terrorists\u201d philosophy suggests you should not even<\/div>\n<div>consider payment. However, following the resolute path is much harder in practice than in<\/div>\n<div>theor y.<\/div>\n<div>In each individual case, the decision should be made bearing the following things in mind:<\/div>\n<div>\u0016<\/div>\n<div>Even if you do pay, there is no guarantee that the files get released. In fact, around a<\/div>\n<div>quarter of all companies affected by ransomware who paid never received their files back.<\/div>\n<div>\u0016<\/div>\n<div>In case of sloppily and hastily made ransomware, the ability to unlock or decrypt files<\/div>\n<div>might not be even included in the initial design.<\/div>\n<div>\u0016<\/div>\n<div>Paying up once can make your company a likely target in future, because you proved to be<\/div>\n<div>vulnerable.<\/div>\n<div>Yet again \u2013 if you have properly made backups that are stored separately from your physical<\/div>\n<div>and\/or virtual machines, the question of payment should not arise at all.<\/div>\n<div>White Paper<\/div>\n<div>8<\/div>\n<div class=\"canvasWrapper\"><\/div>\n<div><span style=\"text-decoration: underline;\"><strong>Summary<\/strong><\/span><\/div>\n<div>Ransomware protection is a complex, multi-faceted approach to maintaining your entire<\/div>\n<div>infrastructure and arranging the work processes within. Such approach should include multi-<\/div>\n<div>layered protection of your data (backups as well as replication), educating users on safe work<\/div>\n<div>practices, reducing risks by sealing the weak spots, keeping up with latest developments in<\/div>\n<div>the ransomware protection field, and periodic testing of your environment for vulnerabilities.<\/div>\n<div>Using NAKIVO Backup &amp; Replication can become the first major step in your ransomware<\/div>\n<div>protection plan.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Overview In today\u2019s digitized world, having uninterrupted access to data is critical. This is why the concept of ransomware occurred to criminals in the first place: locking electronic files is much easier than seizing a warehouse or otherwise disrupting business activity offline. The concept proved attractive and lucrative, resulting in a sharp increase of ransomware<\/p>\n","protected":false},"author":1,"featured_media":1390,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rs_blank_template":"","rs_page_bg_color":"","slide_template_v7":"","footnotes":""},"categories":[16],"tags":[],"class_list":["post-1572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.webuildsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/1572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.webuildsolutions.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.webuildsolutions.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.webuildsolutions.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webuildsolutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=1572"}],"version-history":[{"count":0,"href":"https:\/\/www.webuildsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/1572\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.webuildsolutions.com\/index.php\/wp-json\/wp\/v2\/media\/1390"}],"wp:attachment":[{"href":"https:\/\/www.webuildsolutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=1572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.webuildsolutions.com\/index.php\/wp-json\/wp\/v2\/categories?post=1572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.webuildsolutions.com\/index.php\/wp-json\/wp\/v2\/tags?post=1572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}