{"id":46828,"date":"2022-02-03T11:55:00","date_gmt":"2022-02-03T10:55:00","guid":{"rendered":"https:\/\/www.soitron.com\/?p=46828"},"modified":"2022-06-02T14:58:36","modified_gmt":"2022-06-02T13:58:36","slug":"hackerske-skupiny-verbuju-do-fiktivnych-firiem","status":"publish","type":"post","link":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/","title":{"rendered":"Hackersk\u00e9 skupiny verbuj\u00fa odborn\u00edkov do fikt\u00edvnych kyberbezpe\u010dnostn\u00fdch firiem"},"content":{"rendered":"\n<p><strong>Tr\u00fafalos\u0165 hackersk\u00fdch skup\u00edn nepozn\u00e1 hranice. V honbe za financiami nev\u00e1haj\u00fa zamestna\u0165 nov\u00fdch softv\u00e9rov\u00fdch in\u017einierov, ktor\u00ed by im pod z\u00e1mienkou penetra\u010dn\u00e9ho testovania pomohli vykona\u0165 \u00fatoky ransomware. Za t\u00fdmto \u00fa\u010delom zakladaj\u00fa \u201elegit\u00edmne\u201c spolo\u010dnosti, ktor\u00fdch predmetom podnikania m\u00e1 by\u0165 kybernetick\u00e1 bezpe\u010dnos\u0165. Ale pozor, opak je pravdou! Schopnosti IT odborn\u00edkov s\u00fa nevedomky zneu\u017e\u00edvan\u00e9 k tomu, aby objavili bezpe\u010dnostn\u00e9 slabiny, ktor\u00e9 by sa dali kyberzlo\u010dincami n\u00e1sledne vyu\u017ei\u0165.<\/strong><\/p>\n\n\n\n<p>T\u00fato skuto\u010dnos\u0165 dokazuje pr\u00edpad ruskej hackerskej skupiny FIN7, ktor\u00e1 existuje od roku 2015 a jej celkov\u00e1 \u201etrhov\u00e1 kapitaliz\u00e1cia\u201c sa odhaduje u\u017e na miliardu dol\u00e1rov. Pod\u013ea v\u00fdskumn\u00edkov z poradenskej jednotky Gemini Advisory spolo\u010dnosti Recorded Future skupina zalo\u017eila a viedla firmu Bastion Secure \u2013 so s\u00eddlom na skuto\u010dnej adrese, nieko\u013ek\u00fdmi pobo\u010dkami po celom svete, telef\u00f3nnymi \u010d\u00edslami, vlastn\u00fdmi firemn\u00fdmi webov\u00fdmi str\u00e1nkami a v\u0161etko bolo podporen\u00e9 v\u00fdsledkami v Google vyh\u013ead\u00e1va\u010di a pozit\u00edvnymi referenciami, zastre\u0161en\u00fdmi renomovan\u00fdmi svetov\u00fdmi firmami. <em>\u201eFirma Bastion Secure pre s\u00fakromn\u00e9 spolo\u010dnosti a organiz\u00e1cie z verejn\u00e9ho sektora mala poskytova\u0165 slu\u017eby v oblasti penetra\u010dn\u00fdch testov, \u010do je met\u00f3da overenia zabezpe\u010denia po\u010d\u00edta\u010dov\u00fdch zariaden\u00ed, syst\u00e9mov alebo aplik\u00e1ci\u00ed,\u201c<\/em> <strong>vysvet\u013euje<\/strong> <strong>Martin Lohnert, \u0161pecialista pre oblas\u0165 kyberbezpe\u010dnosti v technologickej spolo\u010dnosti Soitron.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tret\u00edm krokom vo v\u00fdberovom riaden\u00ed je \u00fatok<\/h2>\n\n\n\n<p>Fikt\u00edvna spolo\u010dnos\u0165 ale bola iba z\u00e1sterkou pre zverej\u0148ovanie inzer\u00e1tov na pracovn\u00fdch port\u00e1loch s cie\u013eom naja\u0165 na r\u00f4zne poz\u00edcie expertov na kybernetick\u00fa bezpe\u010dnos\u0165. Pracovn\u00e9 ponuky l\u00e1kali softv\u00e9rov\u00fdch in\u017einierov, syst\u00e9mov\u00fdch administr\u00e1torov, \u010di C++, Python a PHP program\u00e1torov. Na t\u00fdch, ktor\u00ed sa prihl\u00e1sili, \u010dakal trojf\u00e1zov\u00fd pohovor:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Prv\u00e9 kolo:<\/strong> \u017eiadatelia o zamestnanie absolvovali videopohovor s HR z\u00e1stupcom Bastion Secure. Po \u00faspe\u0161nom absolvovan\u00ed do\u0161lo k podp\u00edsaniu dohody o ml\u010danlivosti.<\/li><li><strong>Druh\u00e9 kolo:<\/strong> zamestnanci dostali od spolo\u010dnosti legit\u00edmne n\u00e1stroje potrebn\u00e9 k penetra\u010dn\u00e9mu testovaniu, aby mohli plni\u0165 \u00falohy.<\/li><li><strong>Tretie kolo:<\/strong> zamestnanci dostali zadanie, v ktorom boli vyzvan\u00ed, aby urobili penetra\u010dn\u00fd test pre jedn\u00e9ho zo z\u00e1kazn\u00edkov Bastion Secure.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Zodpovednos\u0165 v tomto pr\u00edpade nesie tester<\/h2>\n\n\n\n<p>Je potrebn\u00e9 zd\u00f4razni\u0165, \u017ee v tomto procese sa nikde neobjavili \u017eiadne pr\u00e1vne dokumenty opr\u00e1v\u0148uj\u00face testera penetra\u010dn\u00fd test spravi\u0165, ako je v tak\u00fdchto pr\u00edpadoch zvykom. <em>\u201eT\u00fdm existuje riziko, \u017ee ak by bol tester odhalen\u00fd, mohol by by\u0165 st\u00edhan\u00fd pod\u013ea platnej legislat\u00edvy \u0161t\u00e1tu, v ktorom testovan\u00e1 spolo\u010dnos\u0165 p\u00f4sob\u00ed. On ako jednotlivec, nie hackersk\u00fd gang, pre ktor\u00fd pracoval. Bol by to toti\u017e on, kto pokusy o \u00fatok vykon\u00e1va,\u201c<\/em> <strong>zd\u00f4raz\u0148uje Martin Lohnert<\/strong>.<\/p>\n\n\n\n<p>Z\u00e1stupcovia Bastion Secure od t\u00fdchto svojich zamestnancov \u010falej po\u017eadovali, aby v pr\u00edpade \u00faspe\u0161n\u00e9ho preniknutia do podnikov\u00e9ho syst\u00e9mu h\u013eadali predov\u0161etk\u00fdm firemn\u00e9 d\u00e1ta, vr\u00e1tane z\u00e1loh. V\u0161etko vlastne zodpovedalo krokom, ktor\u00e9 sa vykon\u00e1vaj\u00fa pri pokuse o \u00fatok ransomware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zamestna\u0165 testerov je lacnej\u0161ie a \u013eah\u0161ie<\/h2>\n\n\n\n<p>Pokia\u013e ide o d\u00f4vody, pre\u010do zlo\u010dineck\u00e1 skupina ako FIN7 za\u0161la tak \u010faleko, aby zalo\u017eila falo\u0161n\u00fa bezpe\u010dnostn\u00fa spolo\u010dnos\u0165, odpove\u010f je jednoduch\u00e1. <em>\u201eNaja\u0165 \u010dloveka pre neleg\u00e1lne aktivity nie je v\u00f4bec \u013eahk\u00e9. \u0160ikovn\u00fdch pen-testerov je nedostatok a na trhu s\u00fa atrakt\u00edvne ponuky od renomovan\u00fdch firiem, kde im rozhodne nehroz\u00ed trestn\u00e9 st\u00edhanie. Pre FIN7 bude preto \u013eah\u0161ie a lacnej\u0161ie z\u00edska\u0165 takto ni\u010d netu\u0161iacich zamestnancov ne\u017e spolupracova\u0165 s in\u00fdmi hackersk\u00fdmi skupinami alebo hackermi prijat\u00fdmi z darknetu, ktor\u00ed by mo\u017eno po\u017eadovali ur\u010dit\u00e9 percento zo zisku,\u201c<\/em><strong> prezradzuje Martin Lohnert.<\/strong> V\u00fdkupn\u00e9 po\u017eadovan\u00e9 od napadnut\u00fdch firiem m\u00f4\u017ee v niektor\u00fdch pr\u00edpadoch dosiahnu\u0165 mili\u00f3ny americk\u00fdch dol\u00e1rov.<\/p>\n\n\n\n<p>Taktika zalo\u017eenia falo\u0161nej bezpe\u010dnostnej firmy nie je v\u00f4bec nov\u00e1. Samotn\u00e1 skupina FIN7 ju u\u017e vyu\u017eila v roku 2010, ke\u010f pou\u017e\u00edvala \u010fal\u0161iu falo\u0161n\u00fa bezpe\u010dnostn\u00fa firmu s n\u00e1zvom Combi Security. <em>\u201eAlarmuj\u00face na tomto pr\u00edklade je v\u0161ak to, \u017ee v dne\u0161nej dobe pr\u00e1ce z domu, \u013eud\u00ed, h\u013eadaj\u00facich pr\u00e1cu \u010di mo\u017enos\u0165 priv\u00fdrobku, \u010dastokr\u00e1t nenapadne verifikova\u0165 z\u00e1kazky zamestn\u00e1vate\u013ea. A u\u017e v\u00f4bec ich nemus\u00ed napadn\u00fa\u0165, k \u010domu v\u0161etk\u00e9mu m\u00f4\u017eu by\u0165 zneu\u017eit\u00ed. Automaticky predpokladaj\u00fa, \u017ee spolo\u010dnos\u0165, ktor\u00e1 o nich m\u00e1 z\u00e1ujem, je legit\u00edmna, a teda jej d\u00f4veruj\u00fa vo v\u0161etkom. Vr\u00e1tane toho, \u017ee od svojho z\u00e1kazn\u00edka m\u00e1 povolenie vykon\u00e1va\u0165 penetra\u010dn\u00e9 testy,\u201c<\/em> <strong>uzatv\u00e1ra Martin Lohnert.<\/strong><\/p>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Tr\u00fafalos\u0165 hackersk\u00fdch skup\u00edn nepozn\u00e1 hranice. V honbe za financiami nev\u00e1haj\u00fa zamestna\u0165 nov\u00fdch softv\u00e9rov\u00fdch in\u017einierov, ktor\u00ed by im pod z\u00e1mienkou penetra\u010dn\u00e9ho testovania pomohli vykona\u0165 \u00fatoky ransomware. Za t\u00fdmto \u00fa\u010delom zakladaj\u00fa \u201elegit\u00edmne\u201c spolo\u010dnosti, ktor\u00fdch predmetom podnikania m\u00e1 by\u0165 kybernetick\u00e1 bezpe\u010dnos\u0165. Ale pozor, opak je pravdou! Schopnosti IT odborn\u00edkov s\u00fa nevedomky zneu\u017e\u00edvan\u00e9 k tomu, aby objavili bezpe\u010dnostn\u00e9 slabiny, [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":46832,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[33,351],"tags":[295],"news_categories":[370],"class_list":["post-46828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-clanky","category-bezpecnost","tag-kyberneticka-bezpecnost","news_categories-bezpecnost"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackersk\u00e9 skupiny verbuj\u00fa do fikt\u00edvnych kyberbezpe\u010dnostn\u00fdch firiem<\/title>\n<meta name=\"description\" content=\"Zalo\u017eenie falo\u0161nej bezpe\u010dnostnej firmy nie je novinka. Hackeri l\u00e1kaj\u00fa odborn\u00edkov a ich schopnosti vyu\u017e\u00edjvaj\u00fa k odhaleniu bezpe\u010dnostn\u00fdch slab\u00edn\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackersk\u00e9 skupiny verbuj\u00fa do fikt\u00edvnych kyberbezpe\u010dnostn\u00fdch firiem\" \/>\n<meta property=\"og:description\" content=\"Zalo\u017eenie falo\u0161nej bezpe\u010dnostnej firmy nie je novinka. Hackeri l\u00e1kaj\u00fa odborn\u00edkov a ich schopnosti vyu\u017e\u00edjvaj\u00fa k odhaleniu bezpe\u010dnostn\u00fdch slab\u00edn\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/\" \/>\n<meta property=\"og:site_name\" content=\"Soitron\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-03T10:55:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-02T13:58:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2022\/02\/pexels-cottonbro-5473957-1280x1920-e1644317622129.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1056\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Natalia Jurakova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"Natalia Jurakova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 min\u00faty\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackersk\u00e9 skupiny verbuj\u00fa do fikt\u00edvnych kyberbezpe\u010dnostn\u00fdch firiem","description":"Zalo\u017eenie falo\u0161nej bezpe\u010dnostnej firmy nie je novinka. Hackeri l\u00e1kaj\u00fa odborn\u00edkov a ich schopnosti vyu\u017e\u00edjvaj\u00fa k odhaleniu bezpe\u010dnostn\u00fdch slab\u00edn","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"sk_SK","og_type":"article","og_title":"Hackersk\u00e9 skupiny verbuj\u00fa do fikt\u00edvnych kyberbezpe\u010dnostn\u00fdch firiem","og_description":"Zalo\u017eenie falo\u0161nej bezpe\u010dnostnej firmy nie je novinka. Hackeri l\u00e1kaj\u00fa odborn\u00edkov a ich schopnosti vyu\u017e\u00edjvaj\u00fa k odhaleniu bezpe\u010dnostn\u00fdch slab\u00edn","og_url":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/","og_site_name":"Soitron","article_published_time":"2022-02-03T10:55:00+00:00","article_modified_time":"2022-06-02T13:58:36+00:00","og_image":[{"width":1280,"height":1056,"url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2022\/02\/pexels-cottonbro-5473957-1280x1920-e1644317622129.jpg","type":"image\/jpeg"}],"author":"Natalia Jurakova","twitter_card":"summary_large_image","twitter_misc":{"Autor":"Natalia Jurakova","Predpokladan\u00fd \u010das \u010d\u00edtania":"3 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/#article","isPartOf":{"@id":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/"},"author":{"name":"Natalia Jurakova","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/da4bfcbfdc7cb1175aef5d403061c986"},"headline":"Hackersk\u00e9 skupiny verbuj\u00fa odborn\u00edkov do fikt\u00edvnych kyberbezpe\u010dnostn\u00fdch firiem","datePublished":"2022-02-03T10:55:00+00:00","dateModified":"2022-06-02T13:58:36+00:00","mainEntityOfPage":{"@id":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/"},"wordCount":812,"publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"image":{"@id":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2022\/02\/pexels-cottonbro-5473957-1280x1920-e1644317622129.jpg","keywords":["Kybernetick\u00e1 bezpe\u010dnos\u0165"],"articleSection":["\u010cl\u00e1nky","Kybernetick\u00e1 bezpe\u010dnos\u0165"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/","url":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/","name":"Hackersk\u00e9 skupiny verbuj\u00fa do fikt\u00edvnych kyberbezpe\u010dnostn\u00fdch firiem","isPartOf":{"@id":"https:\/\/new.soitron.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/#primaryimage"},"image":{"@id":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2022\/02\/pexels-cottonbro-5473957-1280x1920-e1644317622129.jpg","datePublished":"2022-02-03T10:55:00+00:00","dateModified":"2022-06-02T13:58:36+00:00","description":"Zalo\u017eenie falo\u0161nej bezpe\u010dnostnej firmy nie je novinka. Hackeri l\u00e1kaj\u00fa odborn\u00edkov a ich schopnosti vyu\u017e\u00edjvaj\u00fa k odhaleniu bezpe\u010dnostn\u00fdch slab\u00edn","breadcrumb":{"@id":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/#primaryimage","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2022\/02\/pexels-cottonbro-5473957-1280x1920-e1644317622129.jpg","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2022\/02\/pexels-cottonbro-5473957-1280x1920-e1644317622129.jpg","width":1280,"height":1056,"caption":"kyberneticka bezpecnost hacker"},{"@type":"BreadcrumbList","@id":"https:\/\/new.soitron.com\/sk\/hackerske-skupiny-verbuju-do-fiktivnych-firiem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.soitron.com\/"},{"@type":"ListItem","position":2,"name":"Hackersk\u00e9 skupiny verbuj\u00fa odborn\u00edkov do fikt\u00edvnych kyberbezpe\u010dnostn\u00fdch firiem"}]},{"@type":"WebSite","@id":"https:\/\/new.soitron.com\/#website","url":"https:\/\/new.soitron.com\/","name":"Soitron","description":"Soitron je IT firma s viac ako 30 ro\u010dnou trad\u00edciou.","publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.soitron.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/new.soitron.com\/#organization","name":"Soitron","url":"https:\/\/new.soitron.com\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","width":224,"height":56,"caption":"Soitron"},"image":{"@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/da4bfcbfdc7cb1175aef5d403061c986","name":"Natalia Jurakova","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1acd0f0b322c56059c32d84e222e637666ee594f4a6dde61c2fc4ac19b571a9c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1acd0f0b322c56059c32d84e222e637666ee594f4a6dde61c2fc4ac19b571a9c?s=96&d=mm&r=g","caption":"Natalia Jurakova"},"url":"https:\/\/new.soitron.com\/sk\/author\/naty\/"}]}},"_links":{"self":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts\/46828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/comments?post=46828"}],"version-history":[{"count":0,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts\/46828\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/media\/46832"}],"wp:attachment":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/media?parent=46828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/categories?post=46828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/tags?post=46828"},{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/news_categories?post=46828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}