{"id":12803,"date":"2023-08-03T11:45:06","date_gmt":"2023-08-03T14:45:06","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=12803"},"modified":"2023-08-03T11:45:06","modified_gmt":"2023-08-03T14:45:06","slug":"eeuu-alerta-sobre-ciberamenazas-chinas","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=12803","title":{"rendered":"EEUU alerta sobre ciberamenazas chinas."},"content":{"rendered":"<p>La Evaluaci\u00f3n Anual de Amenazas 2023 de la Oficina del Director de Inteligencia Nacional se\u00f1ala que la Rep\u00fablica Popular China (RPC) probablemente represente hoy la amenaza de espionaje cibern\u00e9tico m\u00e1s amplia, activa y persistente para el gobierno y el sector privado de EE. UU y redes sociales. Las actividades cibern\u00e9ticas de China y la exportaci\u00f3n de tecnolog\u00edas relacionadas de su industria aumentan las amenazas de operaciones cibern\u00e9ticas agresivas contra los EE UU. Aseguran que China es capaz de lanzar ataques cibern\u00e9ticos que podr\u00edan interrumpir los servicios de infraestructura cr\u00edtica dentro de los Estados Unidos, incluidos oleoductos, gasoductos y sistemas ferroviarios.<\/p>\n<hr \/>\n<p>The Office of the Director of National Intelligence\u2019s 2023 Annual Threat Assessment makes clear the cyber threat posed by the People\u2019s Republic of China (PRC):\u00a0<em>\u201cChina probably currently represents the broadest, most active, and persistent cyber espionage threat to U.S. Government and private-sector networks. China\u2019s cyber pursuits and its industry\u2019s export of related technologies increase the threats of aggressive cyber operations against the U.S. homeland. . . China almost certainly is capable of launching cyber attacks that could disrupt critical infrastructure services within the United States, including against oil and gas pipelines, and rail systems.&#8221;<\/em><\/p>\n<p>In this context, every organization must take urgent action to understand and address known tactics, techniques, and procedures (TTPs) used by PRC cyber actors \u2013 including efforts to detect and prevent intrusions and respond to and recover from incidents, particularly by investing in the operational resilience of essential services. CISA and our partners in the U.S. government and around the world provide timely and actionable information about the PRC cyber threat to help organizations prioritize the most effective cybersecurity measures. As a starting point, organizations should:<\/p>\n<ul>\n<li>Review the Joint Cybersecurity Advisory on\u00a0<a title=\"Joint Cybersecurity Advisory on People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection\" href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-144a\" target=\"_blank\" rel=\"noopener\">People&#8217;s Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection<\/a>. This Advisory focuses on a tactic called Living off the land, or LOTL, a set of techniques used by cyber actors to maintain anonymity within IT infrastructures by abusing tools already present in the environment such as PowerShell, Windows Management Instrumentation (WMI), and file transfer protocol (FTP) clients. By using such native tools, this fileless attack makes it easier for cyber actors to sustain and advance attacks and evade detection from security teams. LOTL has been growing in use over the years by state-sponsored threat actors, cyber criminals, and penetration testing teams. In particular, CISA recommends that every organization take the following steps to reduce the risk of adversaries using LOTL techniques:\n<ul>\n<li>Establish a security baseline of normal host behavior and user activity to detect anomalous activity on endpoints.<\/li>\n<li>Isolate privileged administrator actions and locations to a manageable subset of locations, where effective baselines of \u201cwhere\u201d and \u201cwho\u201d can be established.<\/li>\n<li>Prioritize logging (e.g., command-line interface &#8220;CLI&#8221;) and close and\/or monitor high-risk ports (e.g., Remote Desktop Protocol, Server Message Block, File Transfer Protocol, Trivial File Transfer Protocol, Secure Shell, and Web Distributed Authoring and Versioning).<\/li>\n<\/ul>\n<\/li>\n<li>Prioritize mitigation of\u00a0<a title=\"Known Exploited Vulnerabilities Catalog\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener\">Known Exploited Vulnerabilities<\/a>, including those outlined in our joint\u00a0advisory on the\u00a0<a title=\"Joint Cybersecurity Advisory: Top CVEs Actively Exploited By People\u2019s Republic of China State-Sponsored Cyber Actors\" href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa22-279a\" target=\"_blank\" rel=\"noopener\">top Common Vulnerabilities and Exposures (CVEs)<\/a>\u00a0used since 2020 by PRC cyber actors.<\/li>\n<li>\n<ul>\n<li>Urgently report potential malicious activity to CISA or the FBI:\n<ul>\n<li>The easiest way is to go to\u00a0<a title=\"cisa.gov\" href=\"https:\/\/www.cisa.gov\/\">CISA.gov<\/a>\u00a0and click the \u201creport a cyber issue\u201d button right up top.<\/li>\n<li>You can also contact CISA\u2019s 24\/7 Operations Center:\u00a0<a title=\"Report\" href=\"https:\/\/www.cisa.gov\/report\">cisa.gov\/report<\/a>\u00a0|\u00a0<a class=\"mailto\" title=\"Email a JReport\" href=\"mailto:report@cisa.gov\" data-extlink=\"\">report@cisa.gov<\/a>\u00a0| 888-282-0870<\/li>\n<li>Contact your\u00a0local\u00a0<a title=\"FBI Field Office\" href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\">FBI field office<\/a>\u00a0or\u00a0<a title=\"IC3 Website\" href=\"https:\/\/www.ic3.gov\/\">IC3.gov<\/a>.<\/li>\n<\/ul>\n<\/li>\n<li><a title=\"Subscribe to Updates from CISA\" href=\"https:\/\/www.cisa.gov\/about\/contact-us\/subscribe-updates-cisa\">Sign up<\/a>\u00a0to receive CISA\u2019s cybersecurity alerts and advisories for timely notification of emerging campaigns and incidents. Review earlier advisories on PRC cyber threats outlined below. CISA particularly recommends reviewing the following advisories:\n<ul>\n<li><a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa22-158a\">People\u2019s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices<\/a>\u00a0for guidance on protecting against\u00a0Chinese malicious activity affecting critical networks.<\/li>\n<li><a title=\"CYBERSECURITY ADVISORY Technical Approaches to Uncovering and Remediating Malicious Activity\" href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa20-245a\">Technical Approaches to Uncovering and Remediating Malicious Activity<\/a>, which outlines steps to help organizations identify intrusions across their enterprise.<\/li>\n<\/ul>\n<\/li>\n<li>Sign up for CISA\u2019s free\u00a0<a title=\"Free Cybersecurity Services and Tools: Cyber Hygiene Vulnerability Scanning\" href=\"https:\/\/www.cisa.gov\/resources-tools\/services\/free-cybersecurity-services-and-tools-cyber-hygiene-vulnerability-scanning\">Vulnerability Scanning service<\/a>\u00a0to receive early warning when a vulnerability known to be exploited by PRC cyber actors or other malicious groups are identified on Internet-facing assets.<\/li>\n<li>Establish a relationship with a regional\u00a0<a title=\"CISA Cybersecurity Advisor\" href=\"https:\/\/www.cisa.gov\/about\/regions\">CISA Cybersecurity Advisor<\/a>\u00a0to access additional services, assessments, and guidance.<\/li>\n<\/ul>\n<div class=\"accordion_fold\">\n<p><em>CISA and Joint CISA Publications<\/em><\/p>\n<\/div>\n<div class=\"accordion_fold\">\n<div class=\"tablesaw-bar tablesaw-mode-stack\"><\/div>\n<table id=\"tablesaw-7185\" class=\"general-table tablesaw tablesaw-stack\" data-tablesaw-mode=\"stack\" data-tablesaw-minimap=\"\">\n<thead>\n<tr>\n<th role=\"columnheader\" data-tablesaw-priority=\"persist\"><strong>Publication Date<\/strong><\/th>\n<th role=\"columnheader\"><strong>Title<\/strong><\/th>\n<th role=\"columnheader\"><strong>Description<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><span class=\"tablesaw-cell-content\">May 24, 2023<\/span><\/td>\n<td>Joint Cybersecurity Advisory:\u00a0<a title=\"People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection\" href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-144a\">People&#8217;s Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection<\/a><\/td>\n<td>This Advisory focuses on a tactic called Living off the land, or LOTL, a set of techniques used by cyber actors to maintain anonymity within IT infrastructures by abusing tools already present in the environment.<\/p>\n<p>For more information, see:<\/p>\n<ul>\n<li>CISA:\u00a0<a href=\"https:\/\/www.cisa.gov\/news-events\/news\/us-and-international-partners-release-advisory-warning-prc-state-sponsored-cyber-activity\">U.S. and International Partners Release Advisory Warning of PRC State-Sponsored Cyber Activity<\/a><\/li>\n<li>Microsoft:\u00a0<a class=\"ext\" title=\"Volt Typhoon targets US critical infrastructure with living-off-the-land techniques\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/05\/24\/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques\/\" data-extlink=\"\">Volt Typhoon targets US critical infrastructure with living-off-the-land techniques<\/a><\/li>\n<li>Palo Alto Networks:\u00a0<a class=\"ext\" href=\"https:\/\/unit42.paloaltonetworks.com\/volt-typhoon-threat-brief\/\" data-extlink=\"\">Threat Brief: Attacks on Critical Infrastructure Attributed to Volt Typhoon<\/a><\/li>\n<li>Secureworks:\u00a0<a class=\"ext\" href=\"https:\/\/www.secureworks.com\/blog\/chinese-cyberespionage-group-bronze-silhouette-targets-us-government-and-defense-organizations\" data-extlink=\"\">Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations<\/a><\/li>\n<li>Splunk:\u00a0<a class=\"ext\" href=\"https:\/\/splunkresearch.com\/stories\/volt_typhoon\/\" data-extlink=\"\">Volt Typhoon<\/a><\/li>\n<li>Zyxel:\u00a0<a class=\"ext\" href=\"https:\/\/www.zyxel.com\/global\/en\/support\/security-advisories\/zyxels-guidance-for-the-recent-attacks-on-the-zywall-devices\" data-extlink=\"\">Guidance for the recent attacks on the ZyWALL devices<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">October 6, 2022<\/span><\/td>\n<td><a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-279a\">Joint Cybersecurity Advisory:\u00a0Top CVEs Actively Exploited By People\u2019s Republic of China State-Sponsored Cyber Actors<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">CISA, NSA, and FBI released an advisory to\u00a0provide\u00a0the top Common Vulnerabilities and Exposures (CVEs) used since 2020 by People\u2019s Republic of China (PRC).<\/span><\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">June 7, 2022<\/span><\/td>\n<td><a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa22-158a\">Joint Cybersecurity Advisory:\u00a0People\u2019s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">CISA, NSA, and FBI released an advisory\u00a0describing\u00a0the ways in which PRC\u00a0state-sponsored cyber actors continue to exploit publicly known vulnerabilities in order to establish a broad network of compromised infrastructure.\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">August 20, 2021<\/span><\/td>\n<td><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-200b\">Joint Cybersecurity Advisory: Chinese Observed TTPs<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">CISA, NSA, and FBI released an advisory describing Chinese cyber threat behavior and trends and provides mitigations to help protect the Federal Government; state, local, tribal, and territorial governments; critical infrastructure, defense industrial base, and private industry organizations.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">July 21, 2021<\/span><\/td>\n<td><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-201a\">Joint Cybersecurity Advisory: Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">CISA and FBI released an advisory providing information on a spearphishing and intrusion campaign conducted by state-sponsored Chinese actors that occurred from December 2011 to 2013, targeting U.S. oil and natural gas (ONG) pipeline companies.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">July 20, 2021<\/span><\/td>\n<td><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-200a\">Joint Cybersecurity Advisory: TTPs of Indicted APT40 Actors Associated with China\u2019s MSS Hainan State Security Department\u00a0<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">CISA and FBI released an advisory to help network defenders identify and remediate APT40 intrusions and established footholds. See the July 19, 2021,\u00a0<a href=\"https:\/\/www.justice.gov\/opa\/pr\/four-chinese-nationals-working-ministry-state-security-charged-global-computer-intrusion\">Department of Justice press release<\/a>.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">July 19, 2021<\/span><\/td>\n<td>Joint\u00a0<a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/CISA_Insights-Chinese_Cyber_Threat_Overview_for_Leaders-508C.pdf\">CISA Insights: Chinese Cyber Threat Overview for Leaders\u00a0<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">CISA, NSA, and FBI released a joint CISA Insights to help leaders understand this threat and how to reduce their organization&#8217;s risk of falling victim to cyber espionage and data theft.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">March 03, 2021<\/span><\/td>\n<td><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-062a\">CISA Alert: Mitigate Microsoft Exchange Server Vulnerabilities<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">CISA partners observed active exploitation of vulnerabilities in Microsoft Exchange Server products. This Alert includes tactics, techniques, and procedures and indicators of compromise associated with this activity. See the July 19, 2021\u00a0<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/07\/19\/the-united-states-joined-by-allies-and-partners-attributes-malicious-cyber-activity-and-irresponsible-state-behavior-to-the-peoples-republic-of-china\/\">White House Statement<\/a>.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">October 1, 2020<\/span><\/td>\n<td><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-275a\">CISA Alert: Potential for China Cyber Response to Heightened U.S.-China Tensions<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">In light of heightened tensions between the United States and China, CISA released an Alert providing specific Chinese government and affiliated cyber threat actor tactics, techniques, and procedures (TTPs). The Alert also includes recommended mitigations to the cybersecurity community to assist in the protection of our Nation\u2019s critical infrastructure.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">September 14, 2020<\/span><\/td>\n<td><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-258a\">Joint Cybersecurity Advisory: Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">CISA has consistently observed Chinese Ministry of State (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known TTPs to target U.S. government agencies. This advisory identifies some of the more common TTPs employed by cyber threat actors, including those affiliated with the Chinese MSS.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">August 3, 2020<\/span><\/td>\n<td><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar20-216a\">MAR-10292089-1.v2 \u2013 Chinese Remote Access Trojan: TAIDOOR<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">CISA, FBI, and DoD released a MAR describing Chinese government actors using malware variants in conjunction with proxy servers to maintain a presence on victim networks and to further network exploitation.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">May 13, 2020<\/span><\/td>\n<td><a href=\"https:\/\/www.cisa.gov\/publication\/fbi-cisa-psa-prc-targeting-covid-19-research-organizations\">CISA and FBI Joint Public Service Announcement: People\u2019s Republic of China (PRC) Targeting of COVID-19 Research Organizations<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">CISA and FBI issued a Public Service Announcement warning healthcare, pharmaceutical, and research sectors working on the COVID-19 response of likely targeting and attempted network compromise by the PRC.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">February 2019<\/span><\/td>\n<td><a class=\"ext\" href=\"https:\/\/www.youtube.com\/watch?v=RxE5drhj01w&amp;feature=youtu.be\" target=\"_blank\" rel=\"noopener\" data-extlink=\"\">CISA Webinar: Chinese Cyber Activity Targeting Managed Service Providers<\/a><\/p>\n<p><a href=\"https:\/\/us-cert.cisa.gov\/sites\/default\/files\/publications\/Chinese-Cyber-Activity-Targeting-Managed-Service-Providers.pdf\">CISA Webinar Slide Deck: Chinese Cyber Activity Targeting Managed Service Providers<\/a><\/td>\n<td>CISA provided a Webinar on Chinese state-sponsored cyber actors targeting managed service providers (MSPs) and their customers. This campaign is referred to as CLOUD HOPPER.<\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">October 3, 2018<\/span><\/td>\n<td><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/TA18-276B\">CISA Alert: Advanced Persistent Threat Activity Exploiting Managed Service Providers<\/a><\/p>\n<p><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/TA18-276A\">CISA Alert: Using Rigorous Credential Control to Mitigate Trusted Network Exploitation<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">These Alerts address the CLOUD HOPPER Campaign. Since May 2016, APT actors have used various TTPs to attempt to infiltrate the networks of global MSPs for the purposes of cyber espionage and intellectual property theft. APT actors have targeted victims in several U.S. critical infrastructure sectors, including IT, Energy, Healthcare and Public Health, Communications, and Critical Manufacturing.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span class=\"tablesaw-cell-content\">April 27, 2017<\/span><\/td>\n<td><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/TA17-117A\">CISA Alert: Intrusions Affecting Multiple Victims Across Multiple Sectors<\/a><\/td>\n<td><span class=\"tablesaw-cell-content\">This Alert provides information on a campaign in which Chinese government cyber threat actors exploited trust relationships between IT service providers\u2014such as MSPs and cloud service providers\u2014and their customers. Chinese cyber actors associated with the Chinese MSS carried out a campaign of cyber-enabled theft targeting global technology service providers and their customers. The actors gained access to multiple U.S. and global IT service providers and their customers in an effort to steal the intellectual property and sensitive data of companies located in at least 12 countries.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/li>\n<\/ul>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.cisa.gov\/topics\/cyber-threats-and-advisories\/advanced-persistent-threats\/china\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.cisa.gov<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La Evaluaci\u00f3n Anual de Amenazas 2023 de la Oficina del Director de Inteligencia Nacional se\u00f1ala que la Rep\u00fablica Popular China (RPC) probablemente represente hoy la&hellip; <\/p>\n","protected":false},"author":1,"featured_media":12804,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/12803"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12803"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/12803\/revisions"}],"predecessor-version":[{"id":12805,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/12803\/revisions\/12805"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/12804"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}