{"id":839,"date":"2020-05-14T19:00:02","date_gmt":"2020-05-14T17:00:02","guid":{"rendered":"https:\/\/lab52.io\/blog\/?p=839"},"modified":"2020-05-14T19:00:04","modified_gmt":"2020-05-14T17:00:04","slug":"the-energy-reserves-in-the-eastern-mediterranean-sea-and-a-malicious-campaign-of-apt10-against-turkey","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/the-energy-reserves-in-the-eastern-mediterranean-sea-and-a-malicious-campaign-of-apt10-against-turkey\/","title":{"rendered":"The energy reserves in the Eastern Mediterranean Sea and a malicious campaign of APT10 against Turkey"},"content":{"rendered":"\n<p>Energy reserves in the\nEastern Mediterranean Sea and the \u201cMEDEAST\u201d gas pipeline:<\/p>\n\n\n\n<p>The Mediterranean Sea\nhas become an increasingly relevant geostrategic topic for the Ministries of\nForeign Affairs of Turkey, Greece, Cyprus, Israel and even China due to the\ncontroversies generated during the last decade for the discoveries of natural\ngas resources located in the Eastern Mediterranean seas of States such Israel,\nCyprus and Egypt ([1]).<\/p>\n\n\n\n<p>The presence of\nTurkish troops in Libya and Syria, and the Franco-Greek alliance to avoid\nTurkish intrusions in the maritime territory of Greece show the relevance and\nglobal interest in energy resources in the area.<\/p>\n\n\n\n<p>As it could be seen in\nthe following map, part of the geostrategic conflict is focused on the Turkish\nEEZ. Turkey carried out an agreement with Libya which tries to carry out an\nexpansion of its exclusive maritime economic zones ([2]).<\/p>\n\n\n\n<p>It is relevant to clarify that an EEZ is a maritime zone prescribed by the United Nations Convention on the law of the sea over which a state has special rights regarding the exploration and exploitation of sea resources, including the production of energy through the water and wind ([3]) ([17]):<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-1-1024x678.png\" alt=\"\" class=\"wp-image-840\" width=\"674\" height=\"446\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-1-1024x678.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-1-300x199.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-1-768x508.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-1.png 1136w\" sizes=\"(max-width: 674px) 100vw, 674px\" \/><figcaption>  <em>Illustration 1. Expansion of Turkish EEZ<\/em> <br><\/figcaption><\/figure><\/div>\n\n\n\n<p>The expansion that the Turkish government tries to carry out could increase the geopolitical risk among Cypriots, Greeks and even Israeli governments. The military presence in the area by those States could be seen in the map shown above. The strategy of increasing Turkey&#8217;s EEZ would leave without an important part of the continental shelf Athens ([4]). In addition, Cyprus is significantly affected by this EEZ\u2019s expansion as there is an occupation of the Cyprus\u2019 EEZ area. Furthermore, the President Erdogan has publicly declared that his oil exploration projects in the coast of Cyprus will not cease. Turkey tries to stablish a zone of EEZ controlled by the Turkish influence which would be represented as in the following map ([5]): <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-2.png\" alt=\"\" class=\"wp-image-841\" width=\"559\" height=\"704\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-2.png 597w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-2-238x300.png 238w\" sizes=\"(max-width: 559px) 100vw, 559px\" \/><figcaption><em>Illustration 2. Expansion of the Turkish EEZ and location of energy resources<\/em> <br><\/figcaption><\/figure><\/div>\n\n\n\n<p>In the previous map,\nyou can see which energy exploration areas are located in Israel, Cyprus and\nEgypt. Moreover, these States give diplomatic support to Cyprus and Greece regarding\nthe expansion\u2019s conflict of the Turkish EEZ.<\/p>\n\n\n\n<p>Furthermore, the 27<sup>th<\/sup> of February of 2020, Greece, Cyprus and Israel signed an agreement to build up a gas pipeline to transport gas to Europe from the Leviathan gas reserves located in Israel. Moreover, in the near future there is the intention of joining to the pipeline the extractions from the Cypriot gas reserves, Aphrodite and Calypso ([6]).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-3.png\" alt=\"\" class=\"wp-image-842\" width=\"402\" height=\"491\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-3.png 439w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-3-246x300.png 246w\" sizes=\"(max-width: 402px) 100vw, 402px\" \/><figcaption> <em>Illustration 3. Mediterranean Gas Pipeline<\/em> <br><\/figcaption><\/figure><\/div>\n\n\n\n<p>Turkey has displaced\nseveral warships to the coast of Cyprus in order to carry out gas exploration\nprojects. The Eastern European gas pipeline reduces the geopolitical power of\nTurkey as it tries to exclude Turkey from any participation in it. This\n&#8220;pipeline&#8221; has been called &#8220;EastMed&#8221; ([6]). However, during March, Turkey will put an\noffshore drilling vessel in order to continue with its oil exploration projects\nin the EEZ waters of Greece, Cyprus and the EU in order to try to acquire in\nthe future the role of gas supplier for the EU ([8]).<\/p>\n\n\n\n<p>Interests and\ninfluence of China in the Mediterranean area:<\/p>\n\n\n\n<p>China, unlike the US\ndiplomatic-military expansionism, has focused its expansionist strategy on the\ndiplomatic-commercial strategy. For China, one of its geo-strategically key\nregions, has been the Port of Piraeus of Greece. The Greek government tendered\nfor the next 35 years the 67% of the Port&#8217;s operations to COSCO (China Ocean\nShipping Company) for 368.5 million and 350\nmillion of euros to be invested in the Piraeus\u2019 port infrastructure ([9]).<\/p>\n\n\n\n<p>The Port of Piraeus\nrepresents a potential gate of all the commercial flow that comes from the OBOR\nsea route. In addition, during November of 2019, China and Greece signed up 16\ncooperation agreements of different matters, including trade and energy\ninvestments ([10]).<\/p>\n\n\n\n<p>On the other hand,\nCyprus signed an agreement with a consortium led by China to build up the first\nnatural gas import terminal in Cyprus. The terminal is designed to convert\nimported liquefied gas into a gaseous form to be used in energy plants ([11]). The construction is being developed by China\nPetroleum Pipeline Engineering, Metron, Hudong-Zhngua Shipbuilding and\nWilhelmsen Ship Management. Construction is expected to be done in 2022.<\/p>\n\n\n\n<p>Regarding the\ninternational security, China investigates Turkey&#8217;s relation with the Uighur\ncommunity. The Uyghurs are Turkish-speaking people from the interior of Asia\nand mostly of them have Muslim religious confession. The Uyghurs live in\nnorthwestern China, in the Uyghur autonomous region of Xinjiang and are\nconsidered a threat to the People&#8217;s Republic of China as they are considered\nlargely jihadist terrorists ([12]).<\/p>\n\n\n\n<p>Turkey is the country\nthat has given the most international support to the Uyghur community. Currently,\nup to 45,000 Uyghur refugees live in Turkey on a temporary visa or even with a\npermanent residence permit ([13]). <\/p>\n\n\n\n<p>Turkey&#8217;s foreign\naffairs policies are misaligned from those of China. &nbsp;The possible obstruction of the OBOR route to\nthe Port of Piraeus and the collaborative policies with the Uyghur community in\nthe Xinjiang region of China could damage their diplomatic relations.<\/p>\n\n\n\n<p>Due to the diplomatic confrontations and conflicting interests of the two countries, China could carry out cyber espionage operations against Turkish organizations and institutions linked to diplomacy, defense, energy, telecommunications and foreign trade. Its main objective could be to collect confidential information in order to gain advantages within the future geostrategic movements of Turkey and the rest of the actors involved in the conflicts over the energy resources located in the Mediterranean Sea.<\/p>\n\n\n\n<p> Malicious campaign against Turkish organizations:<\/p>\n\n\n\n<p>A malicious campaign allegedly attributed to APT10 against Turkish organizations from various sectors such as telecommunications and finance has been identified by Adeo in January of 2020 ([14]). APT10 is a group presumably attributed to the Ministry of State Security of China ([15]). In addition, it is a group that usually targets organizations from various sectors such as defense, energy, health, telecommunications, governments, military, shipping and IT ([16]).<\/p>\n\n\n\n<p>It has been identified that APT10 usually carries out malicious campaigns\nagainst organizations that could damage the China&#8217;s State interests into the global\nmarket. On the other hand, it has also been detected that APT10 usually carries\nout malicious campaigns against organizations that support foundations which carry\nout aid projects with ethnic groups that may be a potential threat against the\nChinese national security, as the case of the Uyghur community.<\/p>\n\n\n\n<p>Moreover, in this campaign has been identified several similarities with\nthe TTP published in other APT10 reports in 2019 ([14]). In this case, it was identified that this campaign began in 2016 and\nthe initial access was carried out with the exploitation of a public web application.<\/p>\n\n\n\n<p>Summary of the\nexecuted Kill Chain ([14]):<\/p>\n\n\n\n<p>\u2022 Initial access:<\/p>\n\n\n\n<p>The attackers deployed the following China Chopper4, JspSpy5 webshells\nto obtain a foothold on the victim&#8217;s network that they used to execute commands\nto upload files to the target machines.<\/p>\n\n\n\n<p>\u2022 Reconnaissance, execution and theft of credentials:<\/p>\n\n\n\n<p>In the reconnaissance phase, a series of commands were launched to\ncollect information from users, domains and shared folders. The hostile actor\nused legitimate tools of the Windows operating systems for the reconnaissance stage,\nsuch as &#8220;ipconfig.exe&#8221;, &#8220;whoami.exe&#8221;, &#8220;net.exe&#8221;,\n&#8220;ping.exe&#8221;, &#8220;powershell.exe&#8221; and &#8221; BloodHound\n\u201d(bloodHound is not a legitimate binary from Microsoft). The attacker used an\nadvanced tool called &#8220;dns.exe&#8221; to list all the machines that were\nregistered in a particular domain.<\/p>\n\n\n\n<p>Regarding the execution, the hostile actor implemented \u201chTran\u201d backdoor to\nbe able to exfiltrate information. In previous malicious APT10 campaigns against\nTurkey, this executable file was seen with the name &#8220;java.exe&#8221; on\ncompromised hosts.<\/p>\n\n\n\n<p>Hostile actors loaded a malicious DLL into the memory of a legitimate\nbinary. The final payload is injected into the legitimate process &#8220;svchost.exe&#8221;.\nIt was identified that this payload was a PlugX variant or a CobaltStrike\nBeacon as a post-exploitation framework.<\/p>\n\n\n\n<p>To carry out the theft of credentials the hostile actor used the\nfollowing tools: &#8220;QuarksPWdump&#8221; and &#8220;Mimikatz&#8221;.<\/p>\n\n\n\n<p>\u2022 Lateral movements<\/p>\n\n\n\n<p>Through the lateral movements they were able to compromise critical\nservers and gain access as a domain administrator. The group used NTLM hashes\nto move laterally. They used the tools &#8220;net.exe&#8221;,\n&#8220;wmic.exe&#8221;, &#8220;psexec.exe&#8221;, &#8220;smbexec&#8221;, and \u201cwmiexec&#8221;.<\/p>\n\n\n\n<p>\u2022 Persistence<\/p>\n\n\n\n<p>The advanced group established persistence in certain servers that were\nof their interest and deployed a remote access Trojans such as\n&#8220;QuasarRAT&#8221; and &#8220;PlugX&#8221;, moreover penetration or\n&#8220;pentesting&#8221; tools such as &#8220;Cobalt Strike&#8221; and &#8220;kerberos&#8221;.<\/p>\n\n\n\n<p>\u2022 C&amp;C connections<\/p>\n\n\n\n<p>Hostile actors used two different ways to keep connections with C&amp;C servers. Once the vulnerability was exploited to establish itself on the public server, the group moved to the &#8220;terminal server&#8221;. To establish communications with the other hosts in the internal network, they installed an SMB beacon on the \u201cterminal server\u201d, using it as a bridge between the internal network and the C&amp;C server.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-4.png\" alt=\"\" class=\"wp-image-843\" width=\"377\" height=\"154\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-4.png 701w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-4-300x123.png 300w\" sizes=\"(max-width: 377px) 100vw, 377px\" \/><figcaption> <em>Illustration 4. First C&amp;C communication method<\/em> <\/figcaption><\/figure><\/div>\n\n\n\n<p>However, the group established a different method for hosts that had direct access or had a proxy. In this case they used the http protocol to establish the communications with the C&amp;C.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-5.png\" alt=\"\" class=\"wp-image-844\" width=\"349\" height=\"146\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-5.png 738w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-5-300x125.png 300w\" sizes=\"(max-width: 349px) 100vw, 349px\" \/><figcaption>  <em>Illustration 5. Second C&amp;C communication method<\/em> <\/figcaption><\/figure><\/div>\n\n\n\n<p>In the following chart, there are the TTPs developed by APT10 during this malicious campaign against the Turkish organizations ([16]) ([14]):<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-6.png\" alt=\"\" class=\"wp-image-845\" width=\"605\" height=\"473\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-6.png 946w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-6-300x235.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/IL-6-768x601.png 768w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><figcaption>  <em>Illustration 6. TTP used in the APT10 campaign<\/em> <\/figcaption><\/figure><\/div>\n\n\n\n<p>Recommendations:<\/p>\n\n\n\n<p>It is recommendable that the organizations from the defense sector,\ngovernments, energy, telecommunications and finance linked to projects that may\naffect the interests of China apply the maximum prevention to this increase of\nmalicious campaigns from APT groups presumably linked to China.<\/p>\n\n\n\n<p>It is recommended to apply the IOC of the APT identified as a threat by\ntheir intelligence provider LAB52 as soon as possible.<\/p>\n\n\n\n<p>It is recommended to keep the operating systems, services and tools used\nin the organization updated with the latest security patches.<\/p>\n\n\n\n<p>It is recommended to establish security policies (GPOs) to control accesses and actions carried out in those systems and \/ or services that are exposed to the internet.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Conclusions:<\/p>\n\n\n\n<p>Since the last decade, Turkey has acquired an important influence in the energy geopolitics of the Eastern Mediterranean Sea. The Turkish foreign policies has hindered the China&#8217;s international trade strategies. Furthermore, the diplomatic Turkish support to certain Chinese ethnic groups that are considerate as a threat against the Chinese national security, could provoke that Turkey becomes a target of groups like APT10 which presumably are linked to the Ministry of State Security of China. APT10 is a group that has a wide range of targets. The organizations from sectors of interest for the government of China and the organizations that have some kind of link with the commercial development of the OBOR route could be susceptible to being targeted by groups such as APT10. <\/p>\n\n\n\n<p>References:<\/p>\n\n\n\n<p>[1] <a href=\"https:\/\/www.mei.edu\/publications\/turkeys-eastern-mediterranean-quagmire\">https:\/\/www.mei.edu\/publications\/turkeys-eastern-mediterranean-quagmire<\/a><\/p>\n\n\n\n<p>[2] <a href=\"https:\/\/www.petroleum-economist.com\/\">https:\/\/www.petroleum-economist.com\/<\/a><\/p>\n\n\n\n<p>[3] <a href=\"https:\/\/greece.greekreporter.com\/2018\/10\/12\/greece-egypt-aim-to-strangulate-turkey-in-east-med-turkish-daily-claims\/\">https:\/\/greece.greekreporter.com\/2018\/10\/12\/greece-egypt-aim-to-strangulate-turkey-in-east-med-turkish-daily-claims\/<\/a><\/p>\n\n\n\n<p>[4] <a href=\"https:\/\/moderndiplomacy.eu\/2019\/12\/20\/the-exclusive-economic-zone-between-libya-and-turkey\/\">https:\/\/moderndiplomacy.eu\/2019\/12\/20\/the-exclusive-economic-zone-between-libya-and-turkey\/<\/a><\/p>\n\n\n\n<p>[5] <a href=\"https:\/\/www.ozelburoistihbarat.com\/kitalar-bolgeler-akdeniz-karadeniz-ege-marmara\/dogu-akdenizde-tartisma-harita-uydu-goruntuleri-eren-talha-altun-12708\">https:\/\/www.ozelburoistihbarat.com\/kitalar-bolgeler-akdeniz-karadeniz-ege-marmara\/dogu-akdenizde-tartisma-harita-uydu-goruntuleri-eren-talha-altun-12708<\/a><\/p>\n\n\n\n<p>[6] Kontakos P. (2018) Blue economy\nenterpreneurship in Offshore Energy in Cyprus and Greece. Journal of\nInternational Scientific Publications<\/p>\n\n\n\n<p>[7] <a href=\"https:\/\/www.welt.de\/wirtschaft\/article204725766\/EastMed-Das-ist-Europas-neue-Problem-Pipeline.html\">https:\/\/www.welt.de\/wirtschaft\/article204725766\/EastMed-Das-ist-Europas-neue-Problem-Pipeline.html<\/a><\/p>\n\n\n\n<p>[8] <a href=\"https:\/\/www.turkishminute.com\/2020\/02\/19\/turkey-buys-third-drilling-ship-for-mediterranean-gas-exploration-erdogan\/\">https:\/\/www.turkishminute.com\/2020\/02\/19\/turkey-buys-third-drilling-ship-for-mediterranean-gas-exploration-erdogan\/<\/a><\/p>\n\n\n\n<p>[9]<a href=\"https:\/\/www.cidob.org\/en\/publications\/publication_series\/notes_internacionals\/n1_156\/china_moors_in_the_mediterranean_a_sea_of_opportunities_for_europe\">https:\/\/www.cidob.org\/en\/publications\/publication_series\/notes_internacionals\/n1_156\/china_moors_in_the_mediterranean_a_sea_of_opportunities_for_europe<\/a><\/p>\n\n\n\n<p>[10] <a href=\"https:\/\/www.aljazeera.com\/news\/2019\/11\/greece-china-hail-strategic-partnership-eu-191111170150762.html\">https:\/\/www.aljazeera.com\/news\/2019\/11\/greece-china-hail-strategic-partnership-eu-191111170150762.html<\/a><\/p>\n\n\n\n<p>[11] <a href=\"http:\/\/www.ekathimerini.com\/247559\/article\/ekathimerini\/news\/chinese-led-consortium-to-build-cyprus-gas-import-terminal\">http:\/\/www.ekathimerini.com\/247559\/article\/ekathimerini\/news\/chinese-led-consortium-to-build-cyprus-gas-import-terminal<\/a><\/p>\n\n\n\n<p>[12] <a href=\"https:\/\/www.icij.org\/investigations\/china-cables\/china-cables-who-are-the-uighurs-and-why-mass-detention\/\">https:\/\/www.icij.org\/investigations\/china-cables\/china-cables-who-are-the-uighurs-and-why-mass-detention\/<\/a><\/p>\n\n\n\n<p>[13] <a href=\"https:\/\/www.voanews.com\/extremism-watch\/uighurs-concerned-china-luring-turkey-silence-xinjiang\">https:\/\/www.voanews.com\/extremism-watch\/uighurs-concerned-china-luring-turkey-silence-xinjiang<\/a><\/p>\n\n\n\n<p>[14] Adeo IT Consulting\nServices. January 2020. APT10 Threat Analysis Report. <a href=\"https:\/\/adeo.com.tr\/en\/adeo_annual_threat_report\/\">https:\/\/adeo.com.tr\/en\/adeo_annual_threat_report\/<\/a> <\/p>\n\n\n\n<p>[15] <a href=\"https:\/\/www.justice.gov\/opa\/pr\/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion\">https:\/\/www.justice.gov\/opa\/pr\/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion<\/a><\/p>\n\n\n\n<p>[16] <a href=\"https:\/\/attack.mitre.org\/\">https:\/\/attack.mitre.org\/<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0  <\/p>\n\n\n\n<p>[17] <a href=\"https:\/\/www.un.org\/depts\/los\/convention_agreements\/texts\/unclos\/part5.htm\">https:\/\/www.un.org\/depts\/los\/convention_agreements\/texts\/unclos\/part5.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Energy reserves in the Eastern Mediterranean Sea and the \u201cMEDEAST\u201d gas pipeline: The Mediterranean Sea has become an increasingly relevant geostrategic topic for the Ministries of Foreign Affairs of Turkey, Greece, Cyprus, Israel and even China due to the controversies generated during the last decade for the discoveries of natural gas resources located in the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":847,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[4,23,6,24],"class_list":{"0":"post-839","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorised","8":"tag-apt","9":"tag-apt10","10":"tag-cyberthreat","11":"tag-energy","12":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/Post-de-turquia-600x400.jpg","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/05\/Post-de-turquia-600x600.jpg","author_info":{"display_name":"Dex","author_link":"https:\/\/lab52.io\/blog\/author\/dex\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/839"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=839"}],"version-history":[{"count":5,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/839\/revisions"}],"predecessor-version":[{"id":851,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/839\/revisions\/851"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/847"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}