
{"id":338,"date":"2020-12-08T10:33:31","date_gmt":"2020-12-08T09:33:31","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=338"},"modified":"2020-12-08T10:33:32","modified_gmt":"2020-12-08T09:33:32","slug":"comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/","title":{"rendered":"Comment les hackers de l&rsquo;ex-KGB utilisent Dropbox pour nous espionner"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/BB1bBq4h.img?h=451&amp;w=799&amp;m=6&amp;q=60&amp;o=f&amp;l=f\" alt=\"Comment les hackers de l'ex-KGB utilisent Dropbox pour nous espionner\"\/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>Les pirates russes ont notamment siphonn\u00e9 les ordinateurs du minist\u00e8re des Affaires \u00e9trang\u00e8res d\u2019un pays de l\u2019Union europ\u00e9enne.<\/strong><\/p>\n\n\n\n<p>Les chercheurs en s\u00e9curit\u00e9 d\u2019Eset ont d\u00e9couvert une\u00a0<em>backdoor<\/em>\u00a0baptis\u00e9e Crutch qui aurait \u00e9t\u00e9 utilis\u00e9e par le groupe de pirates Turla pour espionner, entre autres, plusieurs machines du minist\u00e8re des Affaires \u00e9trang\u00e8res d\u2019un pays de l\u2019Union europ\u00e9enne. Les services secrets estoniens estiment que le groupe Turla est une \u00e9manation du FSB, le service secret russe qui a succ\u00e9d\u00e9 au KGB.<\/p>\n\n\n\n<p>La particularit\u00e9 de Crutch est l\u2019usage d\u2019un compte Dropbox pour exfiltrer les donn\u00e9es glan\u00e9es sur les machines cibl\u00e9es. Dans certaines versions de la backdoor, ce compte Dropbox servait aussi de canal de commande et contr\u00f4le.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/BB1bBjcl.img?h=519&amp;w=768&amp;m=6&amp;q=60&amp;o=f&amp;l=f\" alt=\"Image\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/img-s-msn-com.akamaized.net\/tenant\/amp\/entityid\/BB1bBco9.img?h=505&amp;w=768&amp;m=6&amp;q=60&amp;o=f&amp;l=f\" alt=\"Image\"\/><\/figure>\n\n\n\n<p>Eset a trouv\u00e9 deux m\u00e9thodes d\u2019installation diff\u00e9rentes, dont une fond\u00e9e sur l\u2019outil open source PowerShell Empire.&nbsp;<em>\u00ab&nbsp;Cette d\u00e9couverte montre que le groupe Turla dispose de ressources consid\u00e9rables pour exploiter un arsenal vaste et diversifi\u00e9&nbsp;\u00bb<\/em>, concluent les chercheurs d\u2019Eset.<\/p>\n\n\n\n<p><strong>Source&nbsp;<\/strong>:&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2020\/12\/02\/turla-crutch-keeping-back-door-open\/\" target=\"_blank\" rel=\"noreferrer noopener\">Eset<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les pirates russes ont notamment siphonn\u00e9 les ordinateurs du minist\u00e8re des Affaires \u00e9trang\u00e8res d\u2019un pays de l\u2019Union europ\u00e9enne. Les chercheurs en s\u00e9curit\u00e9 d\u2019Eset ont d\u00e9couvert une\u00a0backdoor\u00a0baptis\u00e9e Crutch qui aurait \u00e9t\u00e9 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":339,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,11],"tags":[45],"class_list":["post-338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cybersecurite","tag-hacker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment les hackers de l&#039;ex-KGB utilisent Dropbox pour nous espionner - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment les hackers de l&#039;ex-KGB utilisent Dropbox pour nous espionner - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"Les pirates russes ont notamment siphonn\u00e9 les ordinateurs du minist\u00e8re des Affaires \u00e9trang\u00e8res d\u2019un pays de l\u2019Union europ\u00e9enne. Les chercheurs en s\u00e9curit\u00e9 d\u2019Eset ont d\u00e9couvert une\u00a0backdoor\u00a0baptis\u00e9e Crutch qui aurait \u00e9t\u00e9 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-08T09:33:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-08T09:33:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2020\/12\/pt-46.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Comment les hackers de l&rsquo;ex-KGB utilisent Dropbox pour nous espionner\",\"datePublished\":\"2020-12-08T09:33:31+00:00\",\"dateModified\":\"2020-12-08T09:33:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/\"},\"wordCount\":199,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/pt-46.jpg\",\"keywords\":[\"Hacker\"],\"articleSection\":[\"Actualit\u00e9\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/\",\"name\":\"Comment les hackers de l'ex-KGB utilisent Dropbox pour nous espionner - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/pt-46.jpg\",\"datePublished\":\"2020-12-08T09:33:31+00:00\",\"dateModified\":\"2020-12-08T09:33:32+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/pt-46.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/pt-46.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/08\\\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment les hackers de l&rsquo;ex-KGB utilisent Dropbox pour nous espionner\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment les hackers de l'ex-KGB utilisent Dropbox pour nous espionner - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment les hackers de l'ex-KGB utilisent Dropbox pour nous espionner - Parlons Techs - Store","og_description":"Les pirates russes ont notamment siphonn\u00e9 les ordinateurs du minist\u00e8re des Affaires \u00e9trang\u00e8res d\u2019un pays de l\u2019Union europ\u00e9enne. Les chercheurs en s\u00e9curit\u00e9 d\u2019Eset ont d\u00e9couvert une\u00a0backdoor\u00a0baptis\u00e9e Crutch qui aurait \u00e9t\u00e9 [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/","og_site_name":"Parlons Techs - Store","article_published_time":"2020-12-08T09:33:31+00:00","article_modified_time":"2020-12-08T09:33:32+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2020\/12\/pt-46.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Comment les hackers de l&rsquo;ex-KGB utilisent Dropbox pour nous espionner","datePublished":"2020-12-08T09:33:31+00:00","dateModified":"2020-12-08T09:33:32+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/"},"wordCount":199,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2020\/12\/pt-46.jpg","keywords":["Hacker"],"articleSection":["Actualit\u00e9","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/","url":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/","name":"Comment les hackers de l'ex-KGB utilisent Dropbox pour nous espionner - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2020\/12\/pt-46.jpg","datePublished":"2020-12-08T09:33:31+00:00","dateModified":"2020-12-08T09:33:32+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2020\/12\/pt-46.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2020\/12\/pt-46.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/08\/comment-les-hackers-de-lex-kgb-utilisent-dropbox-pour-nous-espionner\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Comment les hackers de l&rsquo;ex-KGB utilisent Dropbox pour nous espionner"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=338"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/338\/revisions"}],"predecessor-version":[{"id":340,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/338\/revisions\/340"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/339"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}