
{"id":1133,"date":"2021-03-24T14:25:47","date_gmt":"2021-03-24T13:25:47","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=1133"},"modified":"2021-03-24T14:25:48","modified_gmt":"2021-03-24T13:25:48","slug":"des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/","title":{"rendered":"Des hackers chinois espionnent les op\u00e9rateurs 5G aux Etats-Unis et en Europe"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/BB1eG8dw.img?h=451&amp;w=799&amp;m=6&amp;q=60&amp;o=f&amp;l=f\" alt=\"Des hackers chinois espionnent les op\u00e9rateurs\u00a05G aux Etats-Unis et en Europe\"\/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>Les chercheurs en s\u00e9curit\u00e9 de McAfee ont d\u00e9tect\u00e9 une campagne de cyberespionnage qui vise les principaux op\u00e9rateurs\u00a05G aux \u00c9tats-Unis, en Europe et en Asie du Sud-est. Les techniques utilis\u00e9es sont celles de Mustang Panda, alias RedDelta, un groupe de hackers pr\u00e9sum\u00e9s chinois qui existe depuis 2014 et qui s\u2019est attaqu\u00e9, entre autres, \u00e0 des cibles am\u00e9ricaines et mongoliennes.<\/strong><\/p>\n\n\n\n<p>Baptis\u00e9e \u00ab&nbsp;Op\u00e9ration Dianxun&nbsp;\u00bb, cette campagne actuelle semble avoir comme but de collecter des informations sur les technologies&nbsp;5G utilis\u00e9es par les op\u00e9rateurs.<\/p>\n\n\n\n<p>Pour y arriver, les hackers tentent de pi\u00e9ger certains salari\u00e9s de ces entreprises par le biais d\u2019un faux site de recrutement Huawei. Celui-ci va inciter la victime \u00e0 installer un faux lecteur Flash, qui va lui-m\u00eame t\u00e9l\u00e9charger et installer un second malware (DotNetLoader.exe).<\/p>\n\n\n\n<p>Par la suite, les hackers chinois installent une porte d\u00e9rob\u00e9e issue du&nbsp;<em>framework<\/em>&nbsp;Cobalt Strike. Celui-ci est normalement d\u00e9di\u00e9 aux tests d\u2019intrusion en entreprise, mais beaucoup de pirates l\u2019utilisent \u00e9galement.<\/p>\n\n\n\n<p><strong>Source&nbsp;<\/strong>:&nbsp;<a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-defenders-blog-operation-dianxun\/\" target=\"_blank\" rel=\"noreferrer noopener\">McAfee<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les chercheurs en s\u00e9curit\u00e9 de McAfee ont d\u00e9tect\u00e9 une campagne de cyberespionnage qui vise les principaux op\u00e9rateurs\u00a05G aux \u00c9tats-Unis, en Europe et en Asie du Sud-est. Les techniques utilis\u00e9es sont [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1134,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11],"tags":[],"class_list":["post-1133","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Des hackers chinois espionnent les op\u00e9rateurs 5G aux Etats-Unis et en Europe - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Des hackers chinois espionnent les op\u00e9rateurs 5G aux Etats-Unis et en Europe - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"Les chercheurs en s\u00e9curit\u00e9 de McAfee ont d\u00e9tect\u00e9 une campagne de cyberespionnage qui vise les principaux op\u00e9rateurs\u00a05G aux \u00c9tats-Unis, en Europe et en Asie du Sud-est. Les techniques utilis\u00e9es sont [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-24T13:25:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-24T13:25:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/03\/at-6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Des hackers chinois espionnent les op\u00e9rateurs 5G aux Etats-Unis et en Europe\",\"datePublished\":\"2021-03-24T13:25:47+00:00\",\"dateModified\":\"2021-03-24T13:25:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/\"},\"wordCount\":197,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/at-6.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/\",\"name\":\"Des hackers chinois espionnent les op\u00e9rateurs 5G aux Etats-Unis et en Europe - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/at-6.jpg\",\"datePublished\":\"2021-03-24T13:25:47+00:00\",\"dateModified\":\"2021-03-24T13:25:48+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/at-6.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/at-6.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/03\\\/24\\\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Des hackers chinois espionnent les op\u00e9rateurs 5G aux Etats-Unis et en Europe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Des hackers chinois espionnent les op\u00e9rateurs 5G aux Etats-Unis et en Europe - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/","og_locale":"fr_FR","og_type":"article","og_title":"Des hackers chinois espionnent les op\u00e9rateurs 5G aux Etats-Unis et en Europe - Parlons Techs - Store","og_description":"Les chercheurs en s\u00e9curit\u00e9 de McAfee ont d\u00e9tect\u00e9 une campagne de cyberespionnage qui vise les principaux op\u00e9rateurs\u00a05G aux \u00c9tats-Unis, en Europe et en Asie du Sud-est. Les techniques utilis\u00e9es sont [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-03-24T13:25:47+00:00","article_modified_time":"2021-03-24T13:25:48+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/03\/at-6.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Des hackers chinois espionnent les op\u00e9rateurs 5G aux Etats-Unis et en Europe","datePublished":"2021-03-24T13:25:47+00:00","dateModified":"2021-03-24T13:25:48+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/"},"wordCount":197,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/03\/at-6.jpg","articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/","url":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/","name":"Des hackers chinois espionnent les op\u00e9rateurs 5G aux Etats-Unis et en Europe - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/03\/at-6.jpg","datePublished":"2021-03-24T13:25:47+00:00","dateModified":"2021-03-24T13:25:48+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/03\/at-6.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/03\/at-6.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/03\/24\/des-hackers-chinois-espionnent-les-operateurs-5g-aux-etats-unis-et-en-europe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Des hackers chinois espionnent les op\u00e9rateurs 5G aux Etats-Unis et en Europe"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=1133"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1133\/revisions"}],"predecessor-version":[{"id":1135,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/1133\/revisions\/1135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/1134"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=1133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=1133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=1133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}