{"id":1359,"date":"2016-09-07T20:00:10","date_gmt":"2016-09-08T00:00:10","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/"},"modified":"2022-03-02T08:42:09","modified_gmt":"2022-03-02T13:42:09","slug":"fantom-the-latest-cybersecurity-spectre","status":"publish","type":"post","link":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/","title":{"rendered":"Fantom: the latest cybersecurity spectre"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-full wp-image-28353\" src=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016September7_MicrosoftWindowsNewsAndTips_A.jpg\" alt=\"2016September7_MicrosoftWindowsNewsAndTips_A\" width=\"170\" height=\"170\" \/>It\u2019s hard to deny how quickly the different types of ransomware multiply &#8212; they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like many other things, these technologically menacing forces are like \u201ca wolf in sheep\u2019s clothing\u201d &#8212; impending danger lurks beneath the most seemingly innocent guises.<\/p>\n<p>AVG security researcher Jakub Kroustek recently spotted Fantom coded atop an EDA2, a ransomware-building kit that was open-sourced but eventually taken down. EDA2 contained certain flaws that allowed researchers to obtain decryption keys from its C&amp;C server, yet these flaws have since disappeared, indicating that Fantom coders might have found and fixed them before anyone else had a chance to.<\/p>\n<p>Very little is known as to how Fantom is distributed. As for the method of deployment, cybercriminals plant the file onto the target\u2019s computer via spam email or exploit kits. Fantom-infected files are named <em>criticalupdate01.exe<\/em>; they utilize a \u201cWindows Security Update\u201d to prompt targets into running the file.<\/p>\n<p>After activation, the ransomware starts by locking the user\u2019s screen while displaying fake Windows Update graphics, complete with a fully-functioning percentage-based loading timer that mirrors the original Windows Update screen. However, beneath this pleasant facade, Fantom is encrypting your files right before your eyes. Luckily, the temporary lock screen is removable before it reaches 100% &#8212; simply press CTRL+F4. Unfortunately, the encryption process remains intact.<\/p>\n<p>The MalwareHunterTeam states, \u201cThe ransomware uses classic ransomware encryption by locking files using an AES-128 key and then encrypting this key with a dual RSA key, with the private key stored on the crook&#8217;s server, and a public key left on the user&#8217;s PC.\u201d<\/p>\n<p>In order to retrieve the private key to unlock your files, you must contact the perpetrators by email. The email address is listed in the ransom note that appears after the process of encryption is complete. Fantom displays ransom notes in the form of HTML and TXT files, while changing the user\u2019s desktop with a custom screenshot that lists the contact details. Lastly, after completing all its operations, Fantom cleans after itself by running two batch scripts wiping all the installation files clean.<\/p>\n<p>Ransomware isn\u2019t new, but the ways that cybercriminals utilize them are. Who would\u2019ve thought that the ever so familiar Windows Update window has fallen prey to malicious intent? Pretend that you\u2019re the Little Red Riding Hood and that the wolf is the ransomware that cybercriminals have disguised as your grandmother. They no longer wait to trap you, instead, they wait for you to walk straight into one instead.<\/p>\n<p>The issue of ransomware is as extensive as it is meticulous. If you have any questions about Fantom or would like to request more information, feel free to get in touch with us! Give us a call or send us an email. Our dedicated staff are more than happy to help.<\/p>\n<div class=\"autoblogfoot\">Published with permission from TechAdvisory.org. <a href=\"https:\/\/www.techadvisory.org\/2016\/09\/fantom-the-latest-cybersecurity-spectre\/\">Source.<\/a><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s hard to deny how quickly the different types of ransomware multiply &#8212; they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":1361,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68],"tags":[1285,52,634,1244,267,1286,1287,1288,1289,386,500,270,1290,264],"class_list":["post-1359","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-windows","tag-2016september7_microsoftwindowsnewsandtips_a","tag-cybersecurity","tag-data","tag-downtime","tag-encryption","tag-fake","tag-fantom","tag-file","tag-ruse","tag-smb","tag-threat","tag-update","tag-vulnerability","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fantom: the latest cybersecurity spectre<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fantom: the latest cybersecurity spectre\" \/>\n<meta property=\"og:description\" content=\"It\u2019s hard to deny how quickly the different types of ransomware multiply &#8212; they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-08T00:00:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-02T13:42:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016September7_MicrosoftWindowsNewsAndTips_A_PH.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TechSolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechSolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/\"},\"author\":{\"name\":\"TechSolutions\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\"},\"headline\":\"Fantom: the latest cybersecurity spectre\",\"datePublished\":\"2016-09-08T00:00:10+00:00\",\"dateModified\":\"2022-03-02T13:42:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/\"},\"wordCount\":523,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016September7_MicrosoftWindowsNewsAndTips_A_PH.jpg\",\"keywords\":[\"2016september7_microsoftwindowsnewsandtips_a\",\"cybersecurity\",\"data\",\"downtime\",\"encryption\",\"fake\",\"fantom\",\"file\",\"ruse\",\"smb\",\"threat\",\"update\",\"vulnerability\",\"windows\"],\"articleSection\":[\"Windows\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/\",\"name\":\"Fantom: the latest cybersecurity spectre\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016September7_MicrosoftWindowsNewsAndTips_A_PH.jpg\",\"datePublished\":\"2016-09-08T00:00:10+00:00\",\"dateModified\":\"2022-03-02T13:42:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#primaryimage\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016September7_MicrosoftWindowsNewsAndTips_A_PH.jpg\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016September7_MicrosoftWindowsNewsAndTips_A_PH.jpg\",\"width\":900,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fantom: the latest cybersecurity spectre\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\",\"name\":\"TechSolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"caption\":\"TechSolutions\"},\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fantom: the latest cybersecurity spectre","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Fantom: the latest cybersecurity spectre","og_description":"It\u2019s hard to deny how quickly the different types of ransomware multiply &#8212; they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like [&hellip;]","og_url":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_published_time":"2016-09-08T00:00:10+00:00","article_modified_time":"2022-03-02T13:42:09+00:00","og_image":[{"width":900,"height":300,"url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016September7_MicrosoftWindowsNewsAndTips_A_PH.jpg","type":"image\/jpeg"}],"author":"TechSolutions","twitter_card":"summary_large_image","twitter_creator":"@TechSolutionsDE","twitter_site":"@TechSolutionsDE","twitter_misc":{"Written by":"TechSolutions","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#article","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/"},"author":{"name":"TechSolutions","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f"},"headline":"Fantom: the latest cybersecurity spectre","datePublished":"2016-09-08T00:00:10+00:00","dateModified":"2022-03-02T13:42:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/"},"wordCount":523,"commentCount":0,"publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016September7_MicrosoftWindowsNewsAndTips_A_PH.jpg","keywords":["2016september7_microsoftwindowsnewsandtips_a","cybersecurity","data","downtime","encryption","fake","fantom","file","ruse","smb","threat","update","vulnerability","windows"],"articleSection":["Windows"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/","url":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/","name":"Fantom: the latest cybersecurity spectre","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#primaryimage"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016September7_MicrosoftWindowsNewsAndTips_A_PH.jpg","datePublished":"2016-09-08T00:00:10+00:00","dateModified":"2022-03-02T13:42:09+00:00","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#primaryimage","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016September7_MicrosoftWindowsNewsAndTips_A_PH.jpg","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016September7_MicrosoftWindowsNewsAndTips_A_PH.jpg","width":900,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/blog\/fantom-the-latest-cybersecurity-spectre\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"Fantom: the latest cybersecurity spectre"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]},{"@type":"Person","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f","name":"TechSolutions","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","caption":"TechSolutions"},"url":"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1359"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=1359"}],"version-history":[{"count":1,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1359\/revisions"}],"predecessor-version":[{"id":3811,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1359\/revisions\/3811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media\/1361"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=1359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/categories?post=1359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/tags?post=1359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}