{"id":17234,"date":"2019-12-18T09:10:05","date_gmt":"2019-12-18T17:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/12\/18\/news-10970\/"},"modified":"2019-12-18T09:10:05","modified_gmt":"2019-12-18T17:10:05","slug":"news-10970","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/12\/18\/news-10970\/","title":{"rendered":"Spelevo exploit kit debuts new social engineering trick"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 18 Dec 2019 16:00:00 +0000<\/strong><\/p>\n<p>2019 has been a busy year for exploit kits, despite the fact that they haven&#8217;t been considered a potent threat vector for years, especially on the consumer side. This time, we discovered the Spelevo exploit kit with its virtual pants down, attempting to capitalize on the popularity of adult websites to compromise more devices.<\/p>\n<p>The current Chromium-dominated browser market share favors social engineering attacks and other threats that do not require the use of exploits in order to infect users. However, we continue to see malvertising campaigns pushing drive-by downloads in our telemetry. The malicious adverts are placed on tier 2 adult websites that still drive a lot of traffic.<\/p>\n<p>Recently, we captured an unusual change with the Spelevo exploit kit where, after an attempt to trigger vulnerabilities in Internet Explorer and Flash Player, users were immediately redirected to a decoy adult site.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/graph.png\" data-rel=\"lightbox-0\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41633\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/attachment\/graph-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/graph.png\" data-orig-size=\"867,291\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"graph\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/graph-300x101.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/graph-600x201.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/graph.png\" alt=\"\" class=\"wp-image-41633\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/graph.png 867w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/graph-300x101.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/graph-600x201.png 600w\" sizes=\"(max-width: 867px) 100vw, 867px\" \/><\/a><figcaption>Figure 1: Exploit kit used in tandem with social engineering<\/figcaption><\/figure>\n<\/div>\n<p>Spelevo EK instructs the browser to load this site, which social engineers victims into installing a video codec in order to play a movie. This appears to be an effort from the Spelevo EK operator to double his chances of compromising new machines.<\/p>\n<h3>Spelevo EK changes its redirection URL<\/h3>\n<p>Based on our telemetry, there are a few campaigns run by threat actors converting traffic to adult sites into malware loads. In one campaign, we saw a malvertising attack on a site that draws close to 50 million visitors a month.<\/p>\n<figure class=\"wp-block-image\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/traffic.png\" data-rel=\"lightbox-1\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41604\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/attachment\/traffic-29\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/traffic.png\" data-orig-size=\"702,470\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/traffic-300x201.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/traffic-600x402.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/traffic.png\" alt=\"\" class=\"wp-image-41604\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/traffic.png 702w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/traffic-300x201.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/traffic-600x402.png 600w\" sizes=\"(max-width: 702px) 100vw, 702px\" \/><\/a><figcaption>Figure 2: Traffic view from EK to soc. engineering site<\/figcaption><\/figure>\n<p>We collected two main payloads coming directly from Spelevo EK:<\/p>\n<ul>\n<li>Ursnif\/Gozi<\/li>\n<li>Qbot\/Qakbot<\/li>\n<\/ul>\n<p>One thing that Spelevo EK did which was a little bit different from other exploit kits is <a rel=\"noreferrer noopener\" aria-label=\"redirect victims (opens in a new tab)\" href=\"https:\/\/blog.talosintelligence.com\/2019\/06\/spelevo-exploit-kit.html\" target=\"_blank\">redirect victims<\/a> to google.com post exploitation, typically after a 10-second delay:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh1.png\" data-rel=\"lightbox-2\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41605\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/attachment\/refresh1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh1.png\" data-orig-size=\"511,63\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"refresh1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh1-300x37.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh1.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh1.png\" alt=\"\" class=\"wp-image-41605\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh1.png 511w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh1-300x37.png 300w\" sizes=\"(max-width: 511px) 100vw, 511px\" \/><\/a><figcaption>Figure 3: Google redirect with 10 second delay<\/figcaption><\/figure>\n<\/div>\n<p>However, in this latest capture, we noticed that the script had been edited and that the time was increased to 60 seconds:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh2.png\" data-rel=\"lightbox-3\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41606\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/attachment\/refresh2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh2.png\" data-orig-size=\"508,107\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"refresh2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh2-300x63.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh2.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh2.png\" alt=\"\" class=\"wp-image-41606\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh2.png 508w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/refresh2-300x63.png 300w\" sizes=\"(max-width: 508px) 100vw, 508px\" \/><\/a><figcaption>Figure 4: Google redirect with 60 second delay<\/figcaption><\/figure>\n<\/div>\n<p>This change is important because it allows enough time for the exploit kit to run all the way and call the last URL part of the EK framework. Here, we noticed something new as well.<\/p>\n<p>Previously, the URL immediately following the payload had the following ending pattern: <em>&amp;00000111&amp;11<\/em>. Now, the new pattern is 32 characters followed by the letter &#8216;n&#8217;.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/redirect.png\" data-rel=\"lightbox-4\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41607\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/attachment\/redirect-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/redirect.png\" data-orig-size=\"736,284\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"redirect\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/redirect-300x116.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/redirect-600x232.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/redirect.png\" alt=\"\" class=\"wp-image-41607\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/redirect.png 736w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/redirect-300x116.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/redirect-600x232.png 600w\" sizes=\"(max-width: 736px) 100vw, 736px\" \/><\/a><figcaption>Figure 5: Redirection from EK to decoy adult site<\/figcaption><\/figure>\n<\/div>\n<p>Before the <em>refresh<\/em> tag comes into effect, the browser is redirected to a new location, which happens to be a decoy adult site.<\/p>\n<h3>Social engineering as backup<\/h3>\n<p>There is nothing special about this fake adult site, but it works really well in the context of the malvertising chain. Victims were already engaged with the content and may not even realize that an exploitation attempt just happened.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/Spelevo_adult.png\" data-rel=\"lightbox-5\" title=\"\"><img decoding=\"async\" data-attachment-id=\"41602\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/attachment\/spelevo_adult\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/Spelevo_adult.png\" data-orig-size=\"738,661\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Spelevo_adult\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/Spelevo_adult-300x269.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/Spelevo_adult-600x537.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/Spelevo_adult.png\" alt=\"\" class=\"wp-image-41602\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/Spelevo_adult.png 738w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/Spelevo_adult-300x269.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/Spelevo_adult-600x537.png 600w\" sizes=\"(max-width: 738px) 100vw, 738px\" \/><\/a><figcaption>Figure 6: Fake adult site tricking users with fake video codec<\/figcaption><\/figure>\n<\/div>\n<p>This time around, the site urges users to download a file called <em>lookatmyplayer_codec.exe<\/em>. Downloading video codecs to view media used to be fairly common back in the day, but isn&#8217;t really the case anymore. Yet, this kind of trick still works quite well and is an alternative method to compromise users.<\/p>\n<p>The fake codec turns out to be Qbot\/Qakbot, which is also one of the payloads distributed by Spelevo EK. In other words, the threat actor has two chances to infect victims: either via the exploit kit or fake codec.<\/p>\n<p>This is not the first time that exploit kit operators have included social engineering schemes. In 2017, Magnitude EK was seen pushing a <a rel=\"noreferrer noopener\" aria-label=\"fake Windows Defender notification (opens in a new tab)\" href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/magnitude-actor-social-engineering-scheme-windows-10\" target=\"_blank\">fake Windows Defender notification<\/a>, while Disdain EK was tricking users with a <a rel=\"noreferrer noopener\" aria-label=\"fake Flash Player update (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/11\/disdain-exploit-kit-served-side-social-engineering\/\" target=\"_blank\">fake Flash Player update<\/a>.<\/p>\n<p><a rel=\"noreferrer noopener\" aria-label=\"Malwarebytes (opens in a new tab)\" href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\">Malwarebytes<\/a> users are protected against both the exploit kit and payloads.<\/p>\n<h3>Indicators of compromise (IOCs)<\/h3>\n<p><strong>Ursnif\/Gozi<\/strong><\/p>\n<p>7212b70a0cdb4607f577e627211052e37ef01036e9231d9e286fc5e40974fd42<\/p>\n<p><strong>Qbot\/Qakbot<\/strong><\/p>\n<p>1814deb94c42647f946b271fe9fc2baa6adae71df2b84f4854d36eda69979f93<br \/>1bbde8cee82550d4d57e4d6ee8faa9cbcbc6bdabf5873e494c47a1eb671fb7b5<\/p>\n<p><strong>Decoy adult site<\/strong><\/p>\n<p>lookatmyvideo[.]com<br \/>185.251.38[.]70<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/\">Spelevo exploit kit debuts new social engineering trick<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 18 Dec 2019 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/' title='Spelevo exploit kit debuts new social engineering trick'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/shutterstock_553085224.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In order to maximize infection rate, threat actors are now launching the Spelevo exploit kit with a decoy adult site, social engineering users into downloading a malicious video player.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ek\/\" rel=\"tag\">EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kit\/\" rel=\"tag\">exploit kit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gozi\/\" rel=\"tag\">Gozi<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/qakbot\/\" rel=\"tag\">Qakbot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/qbot\/\" rel=\"tag\">Qbot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-engineering\/\" rel=\"tag\">Social Engineering<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spelevo\/\" rel=\"tag\">Spelevo<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ursnif\/\" rel=\"tag\">Ursnif<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/' title='Spelevo exploit kit debuts new social engineering trick'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/12\/spelevo-exploit-kit-debuts-new-social-engineering-trick\/\">Spelevo exploit kit debuts new social engineering trick<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10527,10534,12043,10531,23802,10740,10510,21791,10494,10842],"class_list":["post-17234","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ek","tag-exploit-kit","tag-gozi","tag-malvertising","tag-qakbot","tag-qbot","tag-social-engineering","tag-spelevo","tag-threat-analysis","tag-ursnif"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17234"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17234\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17234"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}