{"id":6621,"date":"2021-07-13T19:51:06","date_gmt":"2021-07-14T00:51:06","guid":{"rendered":"https:\/\/www.webfxonline.com\/?p=6621"},"modified":"2021-07-16T13:48:22","modified_gmt":"2021-07-16T18:48:22","slug":"the-full-story-of-the-stunning-rsa-hack-can-finally-be-told","status":"publish","type":"post","link":"https:\/\/www.webfxonline.com\/?p=6621","title":{"rendered":"The Full Story of the Stunning RSA Hack Can Finally Be Told"},"content":{"rendered":"\n<p><strong>In 2011, Chinese spies stole the crown jewels of cybersecurity\u2014stripping protections from firms and government agencies worldwide. Here\u2019s how it happened.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"414\" src=\"https:\/\/www.webfxonline.com\/wp-content\/uploads\/2021\/07\/61e9f4aff62006125841a4cab3def784.jpg\" alt=\"\" class=\"wp-image-6627\" srcset=\"https:\/\/www.webfxonline.com\/wp-content\/uploads\/2021\/07\/61e9f4aff62006125841a4cab3def784.jpg 620w, https:\/\/www.webfxonline.com\/wp-content\/uploads\/2021\/07\/61e9f4aff62006125841a4cab3def784-300x200.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/figure>\n\n\n\n<p>AMID ALL THE&nbsp;sleepless hours that Todd Leetham spent hunting ghosts inside his company\u2019s network in early 2011, the experience that sticks with him most vividly all these years later is the moment he caught up with them. Or almost did.<\/p>\n\n\n\n<p>It was a spring evening, he says, three days\u2014maybe four, time had become a blur\u2014after he had first begun tracking the hackers who were rummaging through the computer systems of RSA, the corporate security giant where he worked. Leetham\u2014a bald, bearded, and curmudgeonly analyst one coworker described to me as a \u201ccarbon-based hacker-finding machine\u201d\u2014had been glued to his laptop along with the rest of the company\u2019s incident response team, assembled around the company\u2019s glass-encased operations center in a nonstop, 24-hours-a-day hunt. And with a growing sense of dread, Leetham had finally traced the intruders\u2019 footprints to their final targets: the secret keys known as \u201cseeds,\u201d a collection of numbers that represented a foundational layer of the security promises RSA made to its customers, including tens of millions of users in government and military agencies, defense contractors, banks, and countless corporations around the world.<\/p>\n\n\n\n<p>RSA kept those seeds on a single, well-protected server, which the company called the \u201cseed warehouse.\u201d They served as a crucial ingredient in one of RSA&#8217;s core products: SecurID tokens\u2014little fobs you carried in a pocket and pulled out to prove your identity by entering the six-digit codes that were constantly updated on the fob&#8217;s screen. If someone could steal the seed values stored in that warehouse, they could potentially clone those SecurID tokens and silently break the two-factor authentication they offered, allowing hackers to instantly bypass that security system anywhere in the world, accessing anything from bank accounts to national security secrets.<\/p>\n\n\n\n<p>Now, staring at the network logs on his screen, it looked to Leetham like these keys to RSA\u2019s global kingdom had already been stolen.<\/p>\n\n\n\n<p>Leetham saw with dismay that the hackers had spent nine hours methodically siphoning the seeds out of the warehouse server and sending them via file-transfer protocol to a hacked server hosted by Rackspace, a cloud-hosting provider. But then he spotted something that gave him a flash of hope: The logs included the stolen username and password for that hacked server. The thieves had left their hiding place wide open, in plain sight. Leetham connected to the faraway Rackspace machine and typed in the stolen credentials. And there it was: The server\u2019s directory still contained the entire pilfered seed collection as a compressed .rar file.<\/p>\n\n\n\n<p>Using hacked credentials to log into a server that belongs to another company and mess with the data stored there is, Leetham admits, an unorthodox move at best\u2014and a violation of US hacking laws at worst. But looking at RSA\u2019s stolen holiest of holies on that Rackspace server, he didn\u2019t hesitate. \u201cI was going to take the heat,\u201d he says. \u201cEither way, I&#8217;m saving our shit.\u201d He typed in the command to delete the file and hit enter.<\/p>\n\n\n\n<p>Moments later, his computer\u2019s command line came back with a response: \u201cFile not found.\u201d He examined the Rackspace server\u2019s contents again. It was empty. Leetham\u2019s heart fell through the floor: The hackers had pulled the seed database off the server seconds before he was able to delete it.<\/p>\n\n\n\n<p>After hunting these data thieves day and night, he had \u201ctaken a swipe at their jacket as they were running out the door,\u201d as he says today. They had slipped through his fingers, escaping into the ether with his company\u2019s most precious information. And though Leetham didn\u2019t yet know it, those secrets were now in the hands of the Chinese military.<\/p>\n\n\n\n<p>THE RSA BREACH,&nbsp;when it became public days later, would redefine the cybersecurity landscape. The company\u2019s nightmare was a wake-up call not only for the information security industry\u2014the worst-ever hack of a cybersecurity firm to date\u2014but also a warning to the rest of the world. Timo Hirvonen, a researcher at security firm F-Secure, which published an&nbsp;outside analysis of the breach, saw it as a disturbing demonstration of the growing threat posed by a new class of state-sponsored hackers. \u201cIf a security company like RSA cannot protect itself,\u201d Hirvonen remembers thinking at the time, \u201chow can the rest of the world?\u201d<\/p>\n\n\n\n<p>The question was quite literal. The theft of the company&#8217;s seed values meant that a critical safeguard had been removed from thousands of its customers\u2019 networks. RSA&#8217;s SecurID tokens were designed so that institutions from banks to the Pentagon could demand a second form of authentication from their employees and customers beyond a username and password\u2014something physical in their pocket that they could prove they possessed, thus proving their identity. Only after typing in the code that appeared on their SecurID token (a code that typically changed every 60 seconds) could they gain access to their account.<\/p>\n\n\n\n<p>The SecurID seeds that RSA generated and carefully distributed to its customers allowed those customers\u2019 network administrators to set up servers that could generate the same codes, then check the ones users entered into login prompts to see if they were correct. Now, after stealing those seeds, sophisticated cyberspies had the keys to generate those codes without the physical tokens, opening an avenue into any account for which someone\u2019s username or password was guessable, had already been stolen, or had been reused from another compromised account. RSA had added an extra, unique padlock to millions of doors around the internet, and these hackers now potentially knew the combination to every one.<\/p>\n\n\n\n<p>This past December, when it became public that the company SolarWinds was hacked by Russian spies, the world woke up to the notion of a \u201csupply chain attack\u201d: a technique in which an adversary compromises a point of vulnerability in a software or hardware supplier positioned upstream from\u2014and out of sight of\u2014its target, a blind spot in the victim&#8217;s view of their cybersecurity risks. The Kremlin operatives who hacked SolarWinds hid espionage code in an IT management tool called Orion, used by as many as 18,000 companies and institutions globally.<\/p>\n\n\n\n<p>Using the SolarWinds supply chain compromise, Russia\u2019s foreign intelligence agency, known as the SVR,&nbsp;penetrated deep into at least nine US federal agencies, including the State Department, the US Treasury, the Department of Justice, and NASA. In another world-shaking supply chain attack just a few years earlier, Russia\u2019s military intelligence agency, known as the GRU, hijacked a piece of obscure Ukrainian accounting software to push out a data-destroying worm known as NotPetya,&nbsp;inflicting $10 billion in damage worldwide in the worst cyberattack in history.<\/p>\n\n\n\n<p>For those with a longer memory, though, the RSA breach was the original massive supply chain attack. State cyberspies\u2014who were later revealed to be working in the service of China\u2019s People\u2019s Liberation Army\u2014penetrated infrastructure relied on across the globe to protect the internet. And in doing so, they pulled the rug out from under the entire world\u2019s model of digital security. \u201cIt opened my eyes to supply chain attacks,\u201d says Mikko Hypponen, chief research officer at F-Secure, who worked with Hirvonen on the company&#8217;s analysis of the RSA breach. \u201cIt changed my view of the world: the fact that, if you can\u2019t break into your target, you find the technology that they use and break in there instead.\u201d<\/p>\n\n\n\n<p>In the decade that followed, many key RSA executives involved in the company\u2019s breach have held their silence, bound by 10-year nondisclosure agreements. Now those agreements have expired, allowing them to tell me their stories in new detail. Their accounts capture the experience of being targeted by sophisticated state hackers who patiently and persistently take on their most high-value networked targets on a global scale, where an adversary sometimes understands the interdependencies of its victims\u2019 systems better than victims do themselves, and is willing to exploit those hidden relationships.<\/p>\n\n\n\n<p>After 10 years of rampant state-sponsored hacking and supply chain hijacks, the RSA breach can now be seen as the herald of our current era of digital insecurity\u2014and a lesson about how a determined adversary can undermine the things we trust most.<\/p>\n\n\n\n<p>ON MARCH 8,&nbsp;2011, a brisk late-winter day, Todd Leetham finished a smoke break and was walking back into RSA\u2019s headquarters in Bedford, Massachusetts\u2014a pair of connected buildings on the edge of a forest in the Boston suburbs\u2014when a systems administrator pulled him aside and asked him to take a look at something strange.<\/p>\n\n\n\n<p>The admin had noticed that one user had accessed a server from a PC that the user didn\u2019t typically work on, and that the permissions setting on the account seemed unusual. A technical director investigating the anomalous login with Leetham and the admin asked Bill Duane, a veteran RSA engineer, to take a look. To Duane, who was busy working on a cryptographic algorithm at the time, the anomaly hardly looked like cause for alarm. \u201cI frankly thought this administrator was crazy,\u201d he remembers. \u201cFortunately he was stubborn enough to insist that something was wrong.\u201d<\/p>\n\n\n\n<p>Leetham and the company\u2019s security incident responders started to trace the aberrant behavior and analyze the forensics of every machine the anomalous account had touched. They began to see more telltale oddities in employees\u2019 credentials, stretching back days. The admin had been right. &#8220;Sure enough,\u201d Duane says, \u201cthis was the tip of the iceberg.\u201d<\/p>\n\n\n\n<p>Over the next several days, the security team at RSA\u2019s security operations center\u2014a NASA- style control room with rows of desks and monitors covering one wall\u2014meticulously traced the interlopers\u2019 fingerprints. The RSA staffers began putting in nearly 20-hour workdays, driven by the chilling knowledge that the breach they were tracking was still unfolding. Management demanded updates on their findings every four hours, day or night.<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>In 2011, Chinese spies stole the crown jewels of cybersecurity\u2014stripping protections from firms and government agencies worldwide. Here\u2019s how it happened. AMID ALL THE&nbsp;sleepless hours that Todd Leetham spent hunting ghosts inside his company\u2019s network <a class=\"mh-excerpt-more\" href=\"https:\/\/www.webfxonline.com\/?p=6621\" title=\"The Full Story of the Stunning RSA Hack Can Finally Be Told\">[read more]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":6627,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":{"0":"post-6621","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Full Story of the Stunning RSA Hack Can Finally Be Told -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.webfxonline.com\/?p=6621\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Full Story of the Stunning RSA Hack Can Finally Be Told -\" \/>\n<meta property=\"og:description\" content=\"In 2011, Chinese spies stole the crown jewels of cybersecurity\u2014stripping protections from firms and government agencies worldwide. Here\u2019s how it happened. AMID ALL THE&nbsp;sleepless hours that Todd Leetham spent hunting ghosts inside his company\u2019s network [read more]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.webfxonline.com\/?p=6621\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/webfxonline\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-14T00:51:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-16T18:48:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.webfxonline.com\/wp-content\/uploads\/2021\/07\/61e9f4aff62006125841a4cab3def784.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webfxadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webfxadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.webfxonline.com\/?p=6621#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.webfxonline.com\/?p=6621\"},\"author\":{\"name\":\"webfxadmin\",\"@id\":\"https:\/\/www.webfxonline.com\/#\/schema\/person\/b895cf119df5f037917aca0a8c00b3db\"},\"headline\":\"The Full Story of the Stunning RSA Hack Can Finally Be Told\",\"datePublished\":\"2021-07-14T00:51:06+00:00\",\"dateModified\":\"2021-07-16T18:48:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.webfxonline.com\/?p=6621\"},\"wordCount\":1685,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.webfxonline.com\/#organization\"},\"articleSection\":[\"Tech\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.webfxonline.com\/?p=6621#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.webfxonline.com\/?p=6621\",\"url\":\"https:\/\/www.webfxonline.com\/?p=6621\",\"name\":\"The Full Story of the Stunning RSA Hack Can Finally Be Told -\",\"isPartOf\":{\"@id\":\"https:\/\/www.webfxonline.com\/#website\"},\"datePublished\":\"2021-07-14T00:51:06+00:00\",\"dateModified\":\"2021-07-16T18:48:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.webfxonline.com\/?p=6621#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.webfxonline.com\/?p=6621\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.webfxonline.com\/?p=6621#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.webfxonline.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Full Story of the Stunning RSA Hack Can Finally Be Told\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.webfxonline.com\/#website\",\"url\":\"https:\/\/www.webfxonline.com\/\",\"name\":\"\",\"description\":\"Website &amp; Graphic Design Services\",\"publisher\":{\"@id\":\"https:\/\/www.webfxonline.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.webfxonline.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.webfxonline.com\/#organization\",\"name\":\"webfxonline\",\"url\":\"https:\/\/www.webfxonline.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.webfxonline.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.webfxonline.com\/wp-content\/uploads\/2021\/12\/fx_icon-1.png\",\"contentUrl\":\"https:\/\/www.webfxonline.com\/wp-content\/uploads\/2021\/12\/fx_icon-1.png\",\"width\":180,\"height\":184,\"caption\":\"webfxonline\"},\"image\":{\"@id\":\"https:\/\/www.webfxonline.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/webfxonline\",\"https:\/\/www.youtube.com\/user\/webfxonline\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.webfxonline.com\/#\/schema\/person\/b895cf119df5f037917aca0a8c00b3db\",\"name\":\"webfxadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.webfxonline.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/63ce40becaaf51b192474cfbe3f194e33d8d254c0a6c9edf2e9acfd7afc92e23?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/63ce40becaaf51b192474cfbe3f194e33d8d254c0a6c9edf2e9acfd7afc92e23?s=96&d=mm&r=g\",\"caption\":\"webfxadmin\"},\"sameAs\":[\"https:\/\/www.webfxonline.com\"],\"url\":\"https:\/\/www.webfxonline.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Full Story of the Stunning RSA Hack Can Finally Be Told -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.webfxonline.com\/?p=6621","og_locale":"en_US","og_type":"article","og_title":"The Full Story of the Stunning RSA Hack Can Finally Be Told -","og_description":"In 2011, Chinese spies stole the crown jewels of cybersecurity\u2014stripping protections from firms and government agencies worldwide. Here\u2019s how it happened. AMID ALL THE&nbsp;sleepless hours that Todd Leetham spent hunting ghosts inside his company\u2019s network [read more]","og_url":"https:\/\/www.webfxonline.com\/?p=6621","article_publisher":"https:\/\/www.facebook.com\/webfxonline","article_published_time":"2021-07-14T00:51:06+00:00","article_modified_time":"2021-07-16T18:48:22+00:00","og_image":[{"width":620,"height":414,"url":"https:\/\/www.webfxonline.com\/wp-content\/uploads\/2021\/07\/61e9f4aff62006125841a4cab3def784.jpg","type":"image\/jpeg"}],"author":"webfxadmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webfxadmin","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.webfxonline.com\/?p=6621#article","isPartOf":{"@id":"https:\/\/www.webfxonline.com\/?p=6621"},"author":{"name":"webfxadmin","@id":"https:\/\/www.webfxonline.com\/#\/schema\/person\/b895cf119df5f037917aca0a8c00b3db"},"headline":"The Full Story of the Stunning RSA Hack Can Finally Be Told","datePublished":"2021-07-14T00:51:06+00:00","dateModified":"2021-07-16T18:48:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.webfxonline.com\/?p=6621"},"wordCount":1685,"commentCount":0,"publisher":{"@id":"https:\/\/www.webfxonline.com\/#organization"},"articleSection":["Tech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.webfxonline.com\/?p=6621#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.webfxonline.com\/?p=6621","url":"https:\/\/www.webfxonline.com\/?p=6621","name":"The Full Story of the Stunning RSA Hack Can Finally Be Told -","isPartOf":{"@id":"https:\/\/www.webfxonline.com\/#website"},"datePublished":"2021-07-14T00:51:06+00:00","dateModified":"2021-07-16T18:48:22+00:00","breadcrumb":{"@id":"https:\/\/www.webfxonline.com\/?p=6621#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.webfxonline.com\/?p=6621"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.webfxonline.com\/?p=6621#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.webfxonline.com\/"},{"@type":"ListItem","position":2,"name":"The Full Story of the Stunning RSA Hack Can Finally Be Told"}]},{"@type":"WebSite","@id":"https:\/\/www.webfxonline.com\/#website","url":"https:\/\/www.webfxonline.com\/","name":"","description":"Website &amp; Graphic Design Services","publisher":{"@id":"https:\/\/www.webfxonline.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.webfxonline.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.webfxonline.com\/#organization","name":"webfxonline","url":"https:\/\/www.webfxonline.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webfxonline.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.webfxonline.com\/wp-content\/uploads\/2021\/12\/fx_icon-1.png","contentUrl":"https:\/\/www.webfxonline.com\/wp-content\/uploads\/2021\/12\/fx_icon-1.png","width":180,"height":184,"caption":"webfxonline"},"image":{"@id":"https:\/\/www.webfxonline.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/webfxonline","https:\/\/www.youtube.com\/user\/webfxonline"]},{"@type":"Person","@id":"https:\/\/www.webfxonline.com\/#\/schema\/person\/b895cf119df5f037917aca0a8c00b3db","name":"webfxadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webfxonline.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/63ce40becaaf51b192474cfbe3f194e33d8d254c0a6c9edf2e9acfd7afc92e23?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/63ce40becaaf51b192474cfbe3f194e33d8d254c0a6c9edf2e9acfd7afc92e23?s=96&d=mm&r=g","caption":"webfxadmin"},"sameAs":["https:\/\/www.webfxonline.com"],"url":"https:\/\/www.webfxonline.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/www.webfxonline.com\/index.php?rest_route=\/wp\/v2\/posts\/6621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.webfxonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.webfxonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.webfxonline.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webfxonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6621"}],"version-history":[{"count":3,"href":"https:\/\/www.webfxonline.com\/index.php?rest_route=\/wp\/v2\/posts\/6621\/revisions"}],"predecessor-version":[{"id":6628,"href":"https:\/\/www.webfxonline.com\/index.php?rest_route=\/wp\/v2\/posts\/6621\/revisions\/6628"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.webfxonline.com\/index.php?rest_route=\/wp\/v2\/media\/6627"}],"wp:attachment":[{"href":"https:\/\/www.webfxonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.webfxonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.webfxonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}