{"id":1910,"date":"2016-11-02T15:28:51","date_gmt":"2016-11-02T15:28:51","guid":{"rendered":"https:\/\/tsisupport.com\/?p=1910"},"modified":"2021-07-19T00:33:38","modified_gmt":"2021-07-19T04:33:38","slug":"lessons-recent-ddos-attack","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=1910","title":{"rendered":"DDOS Mitigation Strategies: Lessons From a Recent DDOS Attack"},"content":{"rendered":"<p style=\"text-align: justify;\">Last month, huge parts of our internet essentially shut down; from Amazon, Twitter, and Spotify, to Netflix and Reddit.\u00a0 One of the biggest takeaways from the attack is the realization of just how susceptible our fragile internet truly is.\u00a0 The graph below shows just how quickly and to what extent the United States\u2019 internet was wiped out.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8483\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/yl5dau1wout0grk0y9vf.gif\" alt=\"\" width=\"500\" height=\"281\" \/><\/p>\n<p style=\"text-align: justify;\">Understanding how the attack occurred, the root cause, and the best ways to help protect from future attacks are all critical questions that need answers.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>What Caused the Outage:<\/strong>\u00a0\u00a0<\/span>The cause of the outage was due to a distributed denial of service (DDoS) attack on Dyn, a major Doman Name Servers (DNS) provider.\u00a0 Breaking the process down goes something like this:<\/p>\n<ul>\n<li style=\"text-align: justify;\">Domain Name Servers (DNS) act as a switchboard operator, directing a request for a site to a specific webpage, ensuring that you reach the correct website you enter in the browser.<\/li>\n<li style=\"text-align: justify;\">DNS Providers (like Dyn) handles these requests and responsible for managing traffic. Dyn is a major host so any attack directed toward their servers can bring down all the customers they care for.<\/li>\n<li style=\"text-align: justify;\">DDoS occurrences at the most rudimentary level attack by sending large quantities of junk data to a recipient, which in this case, were Dyn DNS servers. The server becomes overwhelmed by the amount of information being received and begins to slow down significantly, or in some cases, totally shut down.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">For an organization like Dyn, the attack was almost certainly more complex in order to successfully bypass internal advanced DDoS mitigation systems.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8485 size-full\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/Mirai-DDos.fw_.png\" alt=\"\" width=\"625\" height=\"315\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/Mirai-DDos.fw_.png 625w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/Mirai-DDos.fw_-300x151.png 300w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #800000;\">Enter Mirai Bot:<\/span> <\/strong>It should be noted that an attack of this magnitude didn\u2019t exactly come out of the blue.\u00a0 Back in September, a full DDoS attack targeted the website of security blogger Brian Krebs after he discussed the feasibility of a full-scale DDoS attacks. The attack utilized source code released by a hacker earlier in the month codenamed Mirai, a malware strain capable of transmitting data at nearly 620 GBPS. Kreb\u2019s site went completely offline until Google stepped in offering protection under their <a href=\"https:\/\/projectshield.withgoogle.com\/public\/\" target=\"_blank\" rel=\"noopener noreferrer\">Project Shield<\/a> initiative.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8484\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/IOT.fw_.png\" alt=\"\" width=\"625\" height=\"315\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/IOT.fw_.png 625w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/IOT.fw_-300x151.png 300w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>The Internet of Things (IOT): <\/strong><\/span>Kreb later released an article outlining where the power behind Mirai comes from; the Internet of Things (IoT).\u00a0 IoT\u2019s are the \u201csmart\u201d or \u201cconnected\u201d devices surrounding our daily lives; from a heart monitor implant to the smart lock that allows you to unlock\/lock your front door.\u00a0 Any device capable of autonomously transmitting data to control remotely is considered a part of the IoT domain.<\/p>\n<p style=\"text-align: justify;\">Specifically, Mirai was built to use tens of thousands \u2013 if not millions \u2013 of hackable IoT devices, left with their protected default passwords.\u00a0 By controlling these devices, Mirai was capable sending so many site requests, it overwhelmed servers of a provider as large as Dyn.<\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #800000;\">Tips from the Experts:<\/span> <\/strong>Following the unprecedented attack, the Department of Homeland Security <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA16-288A\" target=\"_blank\" rel=\"noopener noreferrer\">issued a warning<\/a> to users and administrators on steps to follow to ensure your IoT devices are not hacked:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Ensure all default passwords are changed to strong passwords. Default usernames and passwords for most devices can easily be found on the internet, making devices with default passwords extremely vulnerable.<\/li>\n<li>Update IoT devices with the latest security patches as soon as they are made available.<\/li>\n<li>Disable Universal Plug &amp; Play (UPnP) on routers unless necessary.<\/li>\n<li>Purchase IoT devices from companies with a reputation for providing secure devices.<\/li>\n<li>Be aware of the capabilities of the devices and appliances installed in your home or business. If a device comes with a default password or an open Wi-Fi connection, change the password and only allow it to operate on a home network with a secured Wi-Fi router.<\/li>\n<li>Understand the capabilities of any medical devices intended for at-home use. If the devices transmit data or can be operated remotely, it has the potential to be infected.<\/li>\n<li>Monitor Internet Protocol (IP) port 2323\/TCP and port 23\/TCP for attempts to gain unauthorized control over IoT devices using the network terminal (Telnet) protocol.<\/li>\n<li>Look for suspicious traffic on port 48101. Infected devices often attempt to spread malware by using 48101 to send results to the threat actor.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Learn More: <\/strong><\/span>To learn more on how to properly protect your network and identify vulnerable devices used in DDoS attacks, <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">Contact Us<\/a> today!<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Last month, huge parts of our internet essentially shut down; from Amazon, Twitter, and Spotify, to Netflix and Reddit.\u00a0 One of the biggest takeaways from the attack is the realization of just how susceptible our fragile internet truly is.\u00a0 The graph below shows just how quickly and to what extent the United States\u2019 internet was&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8481,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[291,292,129],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DDOS Attack Prevention | Lessons From a Recent DDOS Attack | TSI<\/title>\n<meta name=\"description\" content=\"Learn the key takeaways from a recent DDOS attack that shut down large portions of the internet. Read our DDOS mitigation strategies and stay safe.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDOS Attack Prevention | Lessons From a Recent DDOS Attack | TSI\" \/>\n<meta property=\"og:description\" content=\"Learn the key takeaways from a recent DDOS attack that shut down large portions of the internet. Read our DDOS mitigation strategies and stay safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=1910\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-02T15:28:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-19T04:33:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/DDOS-Attack-Header.fw_-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1910\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1910\",\"name\":\"DDOS Attack Prevention | Lessons From a Recent DDOS Attack | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1910#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1910#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/DDOS-Attack-Header.fw_-1140x380-1.png\",\"datePublished\":\"2016-11-02T15:28:51+00:00\",\"dateModified\":\"2021-07-19T04:33:38+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Learn the key takeaways from a recent DDOS attack that shut down large portions of the internet. Read our DDOS mitigation strategies and stay safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1910#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=1910\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1910#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/DDOS-Attack-Header.fw_-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/DDOS-Attack-Header.fw_-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1910#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDOS Mitigation Strategies: Lessons From a Recent DDOS Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDOS Attack Prevention | Lessons From a Recent DDOS Attack | TSI","description":"Learn the key takeaways from a recent DDOS attack that shut down large portions of the internet. Read our DDOS mitigation strategies and stay safe.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"DDOS Attack Prevention | Lessons From a Recent DDOS Attack | TSI","og_description":"Learn the key takeaways from a recent DDOS attack that shut down large portions of the internet. Read our DDOS mitigation strategies and stay safe.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=1910","og_site_name":"TSI Support","article_published_time":"2016-11-02T15:28:51+00:00","article_modified_time":"2021-07-19T04:33:38+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/DDOS-Attack-Header.fw_-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1910","url":"https:\/\/tsisupport.com\/tsistaging\/?p=1910","name":"DDOS Attack Prevention | Lessons From a Recent DDOS Attack | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1910#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1910#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/DDOS-Attack-Header.fw_-1140x380-1.png","datePublished":"2016-11-02T15:28:51+00:00","dateModified":"2021-07-19T04:33:38+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Learn the key takeaways from a recent DDOS attack that shut down large portions of the internet. Read our DDOS mitigation strategies and stay safe.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1910#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=1910"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1910#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/DDOS-Attack-Header.fw_-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/11\/DDOS-Attack-Header.fw_-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1910#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"DDOS Mitigation Strategies: Lessons From a Recent DDOS Attack"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1910"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1910"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1910\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8481"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}