{"id":1434,"date":"2016-02-29T21:00:24","date_gmt":"2016-03-01T02:00:24","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/"},"modified":"2022-03-02T08:42:10","modified_gmt":"2022-03-02T13:42:10","slug":"cyber-threats-and-the-finance-sector","status":"publish","type":"post","link":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/","title":{"rendered":"Cyber threats and the finance sector"},"content":{"rendered":"<p><a href=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2015Feb29_Security_A.jpg\"><img decoding=\"async\" class=\"alignleft size-full wp-image-27048\" src=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2015Feb29_Security_A.jpg\" alt=\"2015Feb29_Security_A\" width=\"170\" height=\"170\" \/><\/a>The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them. Here are 7 new threats and tactics, techniques and procedures (TTP\u2019s) that security professionals should know about.<\/p>\n<h3>Extortion<\/h3>\n<p>The cyber criminal Armada Collective gained notoriety for being the first to utilize distributed denial-of-service (DDoS) attacks. This occurs when multiple systems flood a targeted system to temporarily or completely disrupt service. They evolved the idea further and started to extort Bitcoins from victims who were initially notified of their vulnerability. If they didn\u2019t comply with the ransom demands of the criminals, they would flood their systems until the victim&#8217;s network would shut down completely.<\/p>\n<h3>Social media attacks<\/h3>\n<p>This involved criminals using fake profiles to gather information for social engineering purposes. Fortunately, both Facebook and Twitter began to proactively monitoring for suspicious activity and started notifying users if they had been targeted by the end of 2015. However, you should still have your guard up when someone you don\u2019t know, or even a friend or colleague, starts asking you suspicious questions.<\/p>\n<h3>Spear phishing<\/h3>\n<p>Phishers thrive off familiarity. They send out emails that seem to come from a business or someone that you know asking for credit card\/bank account numbers. In 2015, phishers went to the next level and began whaling. This normally involved spoofing executives\u2019 emails (often CEO\u2019s) to dupe the finance departments to transfer large sums of money to fraudulent accounts.<\/p>\n<h3>Point-of-sale malware<\/h3>\n<p>POS malware is written to steal customer payment (especially credit card) data from retail checkout systems. They are a type of memory scraper that operates by instantly detecting unencrypted type 2 credit card data and is then sent to the attacker\u2019s computer to be sold on underground sites.<\/p>\n<h3>ATM malware<\/h3>\n<p>GreenDispenser is an ATM-specific malware that infects ATM\u2019s and allows criminals to extract large sums of money while avoiding detection. Recently reverse ATM attacks have also emerged, this is when compromised POS terminals and money mules to reverse transactions after money being withdrawn or sent to another bank account.<\/p>\n<h3>Credential theft<\/h3>\n<p>Dridex, a well known credential-stealing software, is a multifunctional malware package that leverages obfuscated macros in Microsoft Office and extensible markup language files to infect systems. The goal is to infect computers, steal credentials, and obtain money from victims\u2019 bank accounts. It operates primarily as a banking Trojan where it is generally distributed through phishing email messages.<\/p>\n<h3>Other sophisticated threats<\/h3>\n<p>Various TTP\u2019s can be combined to extracted data on a bigger scale. Targeting multiple geographies and sectors at once, this method normally involves an organized crime syndicate or someone with a highly sophisticated setup. For example, the group Carbanak primarily targeted financial institutions by infiltrating internal networks and installing software that would drain ATM\u2019s of cash.<\/p>\n<p>The creation of defensive measures requires extensive knowledge of the lurking threats and our team of experts is up-to-date on the latest security information. If you have any questions, feel free to contact us to find out more about TTP\u2019s and other weapons in the hacker\u2019s toolbox.<\/p>\n<div class=\"autoblogfoot\">Published with permission from TechAdvisory.org. <a href=\"https:\/\/www.techadvisory.org\/2016\/02\/cyber-threats-and-the-finance-sector\/\">Source.<\/a><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them. Here are 7 new threats and tactics, techniques and [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":1436,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[1378,951,952,953,954,955,956,957,958,959,960,961,19,962,500],"class_list":["post-1434","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-2015feb29_security_a","tag-account","tag-attack","tag-bank","tag-crime","tag-customer","tag-cyber","tag-financial","tag-industry","tag-money","tag-safety","tag-sector","tag-security","tag-target","tag-threat"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber threats and the finance sector<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber threats and the finance sector\" \/>\n<meta property=\"og:description\" content=\"The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them. Here are 7 new threats and tactics, techniques and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-01T02:00:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-02T13:42:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2015Feb29_Security_A_PH.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TechSolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechSolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/\"},\"author\":{\"name\":\"TechSolutions\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\"},\"headline\":\"Cyber threats and the finance sector\",\"datePublished\":\"2016-03-01T02:00:24+00:00\",\"dateModified\":\"2022-03-02T13:42:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/\"},\"wordCount\":552,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2015Feb29_Security_A_PH.jpg\",\"keywords\":[\"2015feb29_security_a\",\"account\",\"attack\",\"bank\",\"crime\",\"customer\",\"cyber\",\"financial\",\"industry\",\"money\",\"safety\",\"sector\",\"security\",\"target\",\"threat\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/\",\"name\":\"Cyber threats and the finance sector\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2015Feb29_Security_A_PH.jpg\",\"datePublished\":\"2016-03-01T02:00:24+00:00\",\"dateModified\":\"2022-03-02T13:42:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#primaryimage\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2015Feb29_Security_A_PH.jpg\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2015Feb29_Security_A_PH.jpg\",\"width\":900,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber threats and the finance sector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\",\"name\":\"TechSolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"caption\":\"TechSolutions\"},\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber threats and the finance sector","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Cyber threats and the finance sector","og_description":"The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them. Here are 7 new threats and tactics, techniques and [&hellip;]","og_url":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_published_time":"2016-03-01T02:00:24+00:00","article_modified_time":"2022-03-02T13:42:10+00:00","og_image":[{"width":900,"height":300,"url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2015Feb29_Security_A_PH.jpg","type":"image\/jpeg"}],"author":"TechSolutions","twitter_card":"summary_large_image","twitter_creator":"@TechSolutionsDE","twitter_site":"@TechSolutionsDE","twitter_misc":{"Written by":"TechSolutions","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#article","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/"},"author":{"name":"TechSolutions","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f"},"headline":"Cyber threats and the finance sector","datePublished":"2016-03-01T02:00:24+00:00","dateModified":"2022-03-02T13:42:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/"},"wordCount":552,"commentCount":0,"publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2015Feb29_Security_A_PH.jpg","keywords":["2015feb29_security_a","account","attack","bank","crime","customer","cyber","financial","industry","money","safety","sector","security","target","threat"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/","url":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/","name":"Cyber threats and the finance sector","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#primaryimage"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2015Feb29_Security_A_PH.jpg","datePublished":"2016-03-01T02:00:24+00:00","dateModified":"2022-03-02T13:42:10+00:00","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#primaryimage","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2015Feb29_Security_A_PH.jpg","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2015Feb29_Security_A_PH.jpg","width":900,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/blog\/cyber-threats-and-the-finance-sector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"Cyber threats and the finance sector"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]},{"@type":"Person","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f","name":"TechSolutions","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","caption":"TechSolutions"},"url":"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1434"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=1434"}],"version-history":[{"count":1,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1434\/revisions"}],"predecessor-version":[{"id":3784,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1434\/revisions\/3784"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media\/1436"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=1434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/categories?post=1434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/tags?post=1434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}