{"id":7039,"date":"2014-01-15T15:18:30","date_gmt":"2014-01-15T15:18:30","guid":{"rendered":"http:\/\/www.bsk-consulting.de\/?p=766"},"modified":"2022-03-25T14:12:05","modified_gmt":"2022-03-25T13:12:05","slug":"malware-welle-januar-2014","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/","title":{"rendered":"Malware Welle &#8211; Januar 2014"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.4.3&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;]Derzeit rollt eine interessante Mail-Welle durch Deutschland und adressiert vor allem deutsche Unternehmen.\u00a0Es handelt sich wie \u00fcblich um eine Rechnung von &#8220;Telekom\/Vodafon\/Volksbank&#8221;, die als Link in der Mail hinterlegt ist.<br \/>\n<div id=\"attachment_774\" style=\"width: 449px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-774\" class=\"size-full wp-image-774\" alt=\"Telekom Rechnung Januar\" src=\"\/wp-content\/uploads\/2014\/01\/ishot-140115-194425.png\" width=\"439\" height=\"357\" \/><p id=\"caption-attachment-774\" class=\"wp-caption-text\">Telekom Rechnung mit Link auf Cridex Malware<\/p><\/div><br \/>\nDer Link verweist nicht auf eine EXE oder ZIP sondern auf ein directory.\u00a0Zur\u00fcckgeliefert wird beim Aufruf aber ein ZIP File. Im ZIP befindet sich eine Executable, die bis vor einigen Stunden noch von keinem AV Hersteller erkannt wurde.<br \/>\nAuch jetzt ist die Erkennungsrate noch relativ schlecht.<br \/>\nDir URLs kann man in ProxyLogs eventuell an folgenden Strings erkennen<\/p>\n<h2>URL Strings<\/h2>\n<p>\/volksbank\/<br \/>\n\/telekom\/<br \/>\n\/vodafon\/<br \/>\n\/NTTCable\/<\/p>\n<h2>TLDs<\/h2>\n<p>Die TLDs waren h\u00e4ufig \u2013 aber nicht immer &#8211; \u201c.ru\u201d Domains.<\/p>\n<h2>Sandboxing<\/h2>\n<p>Die \u00fcblichen Sandboxen haben Probleme mit der Analyse des Samples.<\/p>\n<h2>Virustotal Report<\/h2>\n<p><a href=\"https:\/\/www.virustotal.com\/en\/file\/519120e4ff6524353247dbac3f66e6ddad711d384e317923a5bb66c16601743e\/analysis\/\">https:\/\/www.virustotal.com\/en\/file\/519120e4ff6524353247dbac3f66e6ddad711d384e317923a5bb66c16601743e\/analysis\/<\/a><\/p>\n<h2>YARA Rule (u.a. f\u00fcr FireEye geeignet)<\/h2>\n<p><code><br \/>\nrule Malware_Cridex_Generic {<br \/>\nmeta:<br \/>\ndescription = \"Rule matching Cridex-C Malware distributed in a German Campaign, January 2014 (Vodafone, Telekom, Volksbank bills)\"<br \/>\nauthor = \"F. Roth\"<br \/>\ndate = \"2014-01-15\"<br \/>\nreference = \"https:\/\/www.virustotal.com\/en\/file\/519120e4ff6524353247dbac3f66e6ddad711d384e317923a5bb66c16601743e\/analysis\/\"<br \/>\nhash = \"86d3e008b8f5983c374a4859739f7de4\"<br \/>\nstrings:<br \/>\n$c1 = \"NEWDEV.dll\" fullword<br \/>\n$c2 = \"COMUID.dll\" fullword<br \/>\n$a1 = \"\\\\&gt;:t; brIs\" fullword<br \/>\n$a2 = \"C:\\\\RcbmbtJK\" fullword<br \/>\ncondition:<br \/>\n1 of ($a*) or all of ($c*)<br \/>\n}<br \/>\n<\/code><\/p>\n<h2>User Agent &#8211; harter Indikator<\/h2>\n<p>TLP Green &#8211; nur auf Anfrage<\/p>\n<h2>C2 Server<\/h2>\n<p>TLP Green &#8211; nur auf Anfrage<\/p>\n<h2>Informationen zur Malware-Kampagne<\/h2>\n<p><a href=\"http:\/\/blog.mxlab.eu\/2014\/01\/14\/fake-email-from-t-mobile-with-online-invoice-for-january-2014-leads-to-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/blog.mxlab.eu\/2014\/01\/14\/fake-email-from-t-mobile-with-online-invoice-for-january-2014-leads-to-malware\/<\/a>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Derzeit rollt eine interessante Mail-Welle durch Deutschland und adressiert vor allem deutsche Unternehmen.\u00a0Es handelt sich wie \u00fcblich um eine Rechnung von &#8220;Telekom\/Vodafon\/Volksbank&#8221;, die als Link in der Mail hinterlegt ist. Der Link verweist nicht auf eine EXE oder ZIP sondern auf ein directory.\u00a0Zur\u00fcckgeliefert wird beim Aufruf aber ein ZIP File. Im ZIP befindet sich eine Executable, die bis vor einigen Stunden noch von keinem AV Hersteller erkannt wurde. Auch jetzt ist die Erkennungsrate noch relativ schlecht. Dir URLs kann man in ProxyLogs eventuell an folgenden Strings erkennen URL Strings \/volksbank\/ \/telekom\/ \/vodafon\/ \/NTTCable\/ TLDs Die TLDs waren h\u00e4ufig \u2013 aber nicht immer &#8211; \u201c.ru\u201d Domains. Sandboxing Die \u00fcblichen Sandboxen haben Probleme mit der Analyse des Samples. Virustotal Report https:\/\/www.virustotal.com\/en\/file\/519120e4ff6524353247dbac3f66e6ddad711d384e317923a5bb66c16601743e\/analysis\/ YARA Rule (u.a. f\u00fcr FireEye geeignet) rule Malware_Cridex_Generic { meta: description = &#8220;Rule matching Cridex-C Malware distributed in a German Campaign, January 2014 (Vodafone, Telekom, Volksbank bills)&#8221; author = &#8220;F. Roth&#8221; date = &#8220;2014-01-15&#8221; reference = &#8220;https:\/\/www.virustotal.com\/en\/file\/519120e4ff6524353247dbac3f66e6ddad711d384e317923a5bb66c16601743e\/analysis\/&#8221; hash = &#8220;86d3e008b8f5983c374a4859739f7de4&#8221; strings: $c1 = &#8220;NEWDEV.dll&#8221; fullword $c2 = &#8220;COMUID.dll&#8221; fullword $a1 = &#8220;\\\\&gt;:t; brIs&#8221; fullword $a2 = &#8220;C:\\\\RcbmbtJK&#8221; fullword condition: 1 of ($a*) or all of ($c*) } User Agent &#8211; harter Indikator TLP Green &#8211; nur auf Anfrage C2 Server TLP [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Derzeit rollt eine interessante Mail-Welle durch Deutschland und adressiert vor allem deutsche Unternehmen.\u00a0Es handelt sich wie \u00fcblich um eine Rechnung von \"Telekom\/Vodafon\/Volksbank\", die als Link in der Mail hinterlegt ist.\r\n[caption id=\"attachment_774\" align=\"alignnone\" width=\"439\"]<a href=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2014\/01\/ishot-140115-194425.png\"><img class=\"size-full wp-image-774\" alt=\"Telekom Rechnung Januar\" src=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2014\/01\/ishot-140115-194425.png\" width=\"439\" height=\"357\" \/><\/a> Telekom Rechnung mit Link auf Cridex Malware[\/caption]\r\nDer Link verweist nicht auf eine EXE oder ZIP sondern auf ein directory.\u00a0Zur\u00fcckgeliefert wird beim Aufruf aber ein ZIP File. Im ZIP befindet sich eine Executable, die bis vor einigen Stunden noch von keinem AV Hersteller erkannt wurde.\r\nAuch jetzt ist die Erkennungsrate noch relativ schlecht.\r\nDir URLs kann man in ProxyLogs eventuell an folgenden Strings erkennen\r\n<h2>URL Strings<\/h2>\r\n\/volksbank\/\r\n\/telekom\/\r\n\/vodafon\/\r\n\/NTTCable\/\r\n<h2>TLDs<\/h2>\r\nDie TLDs waren h\u00e4ufig \u2013 aber nicht immer - \u201c.ru\u201d Domains.\r\n<h2>Sandboxing<\/h2>\r\nDie \u00fcblichen Sandboxen haben Probleme mit der Analyse des Samples.\r\n<h2>Virustotal Report<\/h2>\r\n<a href=\"https:\/\/www.virustotal.com\/en\/file\/519120e4ff6524353247dbac3f66e6ddad711d384e317923a5bb66c16601743e\/analysis\/\">https:\/\/www.virustotal.com\/en\/file\/519120e4ff6524353247dbac3f66e6ddad711d384e317923a5bb66c16601743e\/analysis\/<\/a>\r\n<h2>YARA Rule (u.a. f\u00fcr FireEye geeignet)<\/h2>\r\n<code>\r\nrule Malware_Cridex_Generic {\r\nmeta:\r\ndescription = \"Rule matching Cridex-C Malware distributed in a German Campaign, January 2014 (Vodafone, Telekom, Volksbank bills)\"\r\nauthor = \"F. Roth\"\r\ndate = \"2014-01-15\"\r\nreference = \"https:\/\/www.virustotal.com\/en\/file\/519120e4ff6524353247dbac3f66e6ddad711d384e317923a5bb66c16601743e\/analysis\/\"\r\nhash = \"86d3e008b8f5983c374a4859739f7de4\"\r\nstrings:\r\n$c1 = \"NEWDEV.dll\" fullword\r\n$c2 = \"COMUID.dll\" fullword\r\n$a1 = \"\\>:t; brIs\" fullword\r\n$a2 = \"C:\\RcbmbtJK\" fullword\r\ncondition:\r\n1 of ($a*) or all of ($c*)\r\n}\r\n<\/code>\r\n<h2>User Agent - harter Indikator<\/h2>\r\nTLP Green - nur auf Anfrage\r\n<h2>C2 Server<\/h2>\r\nTLP Green - nur auf Anfrage\r\n<h2>Informationen zur Malware-Kampagne<\/h2>\r\n<a href=\"http:\/\/blog.mxlab.eu\/2014\/01\/14\/fake-email-from-t-mobile-with-online-invoice-for-january-2014-leads-to-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/blog.mxlab.eu\/2014\/01\/14\/fake-email-from-t-mobile-with-online-invoice-for-january-2014-leads-to-malware\/<\/a>","_et_gb_content_width":"","footnotes":""},"categories":[327],"tags":[422,423,424,425,124,426,427,428,429,430,72],"class_list":["post-7039","post","type-post","status-publish","format-standard","hentry","category-alert","tag-anhang","tag-cridex","tag-januar","tag-mail","tag-malware","tag-rechnung","tag-spam","tag-telekom","tag-vodafon","tag-volksbank","tag-zip"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware Welle - Januar 2014 - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Malware Welle &#8211; Januar 2014\",\"datePublished\":\"2014-01-15T15:18:30+00:00\",\"dateModified\":\"2022-03-25T13:12:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/\"},\"wordCount\":265,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"keywords\":[\"Anhang\",\"Cridex\",\"Januar\",\"Mail\",\"malware\",\"Rechnung\",\"SPAM\",\"Telekom\",\"Vodafon\",\"Volksbank\",\"zip\"],\"articleSection\":[\"Alert\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/\",\"name\":\"Malware Welle - Januar 2014 - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2014-01-15T15:18:30+00:00\",\"dateModified\":\"2022-03-25T13:12:05+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Welle - Januar 2014 - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Malware Welle &#8211; Januar 2014","datePublished":"2014-01-15T15:18:30+00:00","dateModified":"2022-03-25T13:12:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/"},"wordCount":265,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"keywords":["Anhang","Cridex","Januar","Mail","malware","Rechnung","SPAM","Telekom","Vodafon","Volksbank","zip"],"articleSection":["Alert"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/","url":"https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/","name":"Malware Welle - Januar 2014 - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2014-01-15T15:18:30+00:00","dateModified":"2022-03-25T13:12:05+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2014\/01\/15\/malware-welle-januar-2014\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/7039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=7039"}],"version-history":[{"count":3,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/7039\/revisions"}],"predecessor-version":[{"id":7586,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/7039\/revisions\/7586"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=7039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=7039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=7039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}