{"id":1222,"date":"2021-09-03T07:50:53","date_gmt":"2021-09-03T07:50:53","guid":{"rendered":"https:\/\/news.nucleon.sh\/?p=1222"},"modified":"2021-09-03T07:50:54","modified_gmt":"2021-09-03T07:50:54","slug":"intelligence-briefing-73","status":"publish","type":"post","link":"https:\/\/news.nucleon.sh\/ko\/2021\/09\/03\/intelligence-briefing-73\/","title":{"rendered":"Intelligence Briefing #73"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Welcome to the Nucleon Cyber Intelligence podcast.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This podcast will give you a summary of the latest news related to cyber intelligence and proactive cyber security in only a few minutes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The podcast is aimed at professionals who are short on time, or for anyone who would like to know a bit more about what is REALLY happening out there in the cyber world.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The focus of this podcast will be on the latest cyber events for non-technical people; anyone can listen and understand.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-soundcloud wp-block-embed-soundcloud\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"CyberCure Ep 73 by Cyber Intelligence Briefing\" width=\"660\" height=\"400\" scrolling=\"no\" frameborder=\"no\" src=\"https:\/\/w.soundcloud.com\/player\/?visual=true&#038;url=https%3A%2F%2Fapi.soundcloud.com%2Ftracks%2F1098069598&#038;show_artwork=true&#038;maxheight=990&#038;maxwidth=660&#038;secret_token=s-o9KcvqOE3E0\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Several times this year, <strong>LinkedIn<\/strong> seems to have experienced massive data scrape conducted by a malicious actor.\u00a0<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">An archive of data collected from hundreds of millions of LinkedIn user profiles surfaced on a hacker forum, where it\u2019s currently being sold for an undisclosed sum. This time, the author of the forum post is purportedly selling information gathered from 600 million LinkedIn profiles. Latest LinkedIn leak They also claim that the data is new and \u201cbetter\u201d than that collected during the previous scrapes. On the Latest LinkedIn leak in 2021, samples from the archive shared by the author include full names, email addresses, links to the users\u2019 social media accounts, and other data points that users had publicly listed on their LinkedIn profiles.\u00a0<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While not deeply sensitive, the information could still be used by malicious actors to quickly and easily find new targets based on the criminals\u2019 preferred methods of social engineering.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>LinkedIn\u2019s<\/strong> refusal to treat malicious scraping as a security problem can potentially allow cybercriminals to gather data on new victims with impunity. The social media platform, however, is of a different opinion on the matter: \u201cOur teams have investigated a set of alleged LinkedIn data that has been posted for sale. We want to be clear that this is not a data breach and no private LinkedIn member data was exposed,\u201d LinkedIn said in its statement regarding a previous data scrape, where malicious actors collected data from <strong>700 million profiles<\/strong>.\u00a0<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Even though LinkedIn\u2019s representatives are correct in saying that no private data was exposed, collecting publicly available information on a mass scale can still put users at risk of spam and phishing attacks.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Judging from the samples shared by the author, the archive appears to contain a variety of publicly available <strong>professional information gathered from LinkedIn<\/strong> profiles, including: LinkedIn IDs, Full names, Email addresses, Phone numbers, LinkedIn profile URLs Links to other social media profiles Genders Birth dates Locations Professional titles and other work-related data The sample provided by the forum post author contains 632,699 LinkedIn profile entries, which include 154,204 user email addresses.\u00a0<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Scraping can be dangerous because it allows criminals to easily find new targets Even though the data gathered from 600 million LinkedIn profiles was not acquired as a result of a breach, allowing third parties to mass scrape LinkedIn user profiles can result in those users being attacked by malicious actors in a variety of ways.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For example, phishers and spammers often use data acquired from scrapers to find new victims: they can extract scraped public contact details and use them for robocalls, spam lists, and social engineering attacks, whereby phishers and scammers can try to manipulate users into revealing their personal information and banking details.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This is why many web applications use scraping mitigation tools that help protect against hostile data collection by bots and threat actors.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>What Can you do if you\u2019ve been affected?\u00a0<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>If you suspect that your LinkedIn profile data might have been scraped by the threat actor, we recommend you: Remove your email address and phone number from your public LinkedIn profile to avoid them being scraped by a malicious third party in the future.\u00a0<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Change the password of your LinkedIn and email accounts.\u00a0<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Enable two-factor authentication on all your online accounts.\u00a0<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Beware of suspicious messages on social media and connection requests from strangers.\u00a0<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Consider using a password manager to create unique strong passwords and store them securely.\u00a0<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">In addition, beware of phishing emails and text messages. Again, don\u2019t click on anything suspicious or respond to anyone you don\u2019t know.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"371\" data-attachment-id=\"1227\" data-permalink=\"https:\/\/news.nucleon.sh\/ko\/2021\/09\/03\/intelligence-briefing-73\/linkedin-icon-line-connection-of-circuit-board\/\" data-orig-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?fit=4096%2C2304&amp;ssl=1\" data-orig-size=\"4096,2304\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;LinkedIn Icon Line Connection of Circuit Board&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;LinkedIn Icon Line Connection of Circuit Board&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"LinkedIn Icon Line Connection of Circuit Board\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;LinkedIn Icon Line Connection of Circuit Board&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?fit=660%2C371&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=660%2C371&#038;ssl=1\" alt=\"\" class=\"wp-image-1227\" srcset=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=2048%2C1152&amp;ssl=1 2048w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=1200%2C675&amp;ssl=1 1200w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=10%2C6&amp;ssl=1 10w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=432%2C243&amp;ssl=1 432w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=396%2C223&amp;ssl=1 396w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=1120%2C630&amp;ssl=1 1120w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=660%2C371&amp;ssl=1 660w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=391%2C220&amp;ssl=1 391w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?resize=1320%2C743&amp;ssl=1 1320w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/linkedin-icon-line-connection-circuit-board.jpg?w=1980&amp;ssl=1 1980w\" sizes=\"auto, (max-width: 600px) 91vw, (max-width: 900px) 600px, (max-width: 1060px) 50vw, (max-width: 1200px) 520px, (max-width: 1400px) 43vw, 600px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"wp-block-paragraph\">Notorious <strong>North<\/strong> <strong>Korean hacking group<\/strong> impersonates Airbus, General Motors and Rheinmetall to lure potential victims into downloading malware.<br>Researchers have been tracking Lazarus activity for months published new report by<strong> AT&#038;T<\/strong> Labs.\u00a0<br>According to the report\u2019s author, emails sent to prospective engineering candidates by the group purport to be from known defense contractors<strong> Airbus, General Motors<\/strong> (GM) and <strong>Rheinmetall<\/strong>.\u00a0<br>Attached to the emails are Windows documents containing macro-based malware, \u201cwhich has been developed and improved during the course of this campaign and from one target to another,\u201d the report wrote.\u00a0<br>\u00a0<br>The campaign is just the latest by <strong>Lazarus<\/strong> that targets the defense industry. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In February, researchers linked a 2020 spear phishing campaign to the stealing of critical data from defense companies by leveraging an advanced malware called Threat Needle.\u00a0<br>\u00a0<br>The new campaign was identified when Twitter users reported several documents that were linked to Lazarus group using, GM and Airbus as lures.<br>The campaigns using the three new documents have similarities in command and control (C&#038;C) communication but different ways of executing malicious activity, researchers found.\u00a0<br><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Lazarus distributed two malicious documents related to Rheinmetall, a German engineering company focused on the defense and automotive industries. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">However, the second included \u201cmore elaborate content,\u201d and thus likely went unnoticed by victims.\u00a0<br>Given the historically prolific nature of Lazarus\u2014named \u201cthe most active\u201d threat group of 2020 by <strong>Kaspersky<\/strong> \u2014the latest attack against engineers \u201cis not expected to be the last,\u201d the report noted. \u201cAttack lures, potentially targeting engineering professionals in government organizations, showcase the importance of tracking Lazarus and their evolution,\u201d the report said.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"440\" data-attachment-id=\"1228\" data-permalink=\"https:\/\/news.nucleon.sh\/ko\/2021\/09\/03\/intelligence-briefing-73\/shot-from-the-back-to-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays\/\" data-orig-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?fit=7360%2C4912&amp;ssl=1\" data-orig-size=\"7360,4912\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;4&quot;,&quot;credit&quot;:&quot;NICK FILIPPOV&quot;,&quot;camera&quot;:&quot;NIKON D810&quot;,&quot;caption&quot;:&quot;Shot from the Back to Hacker Breaking into Corporate financial Data Servers from His Underground Hideout.&quot;,&quot;created_timestamp&quot;:&quot;1610904906&quot;,&quot;copyright&quot;:&quot;BW PROject&quot;,&quot;focal_length&quot;:&quot;35&quot;,&quot;iso&quot;:&quot;64&quot;,&quot;shutter_speed&quot;:&quot;0.016666666666667&quot;,&quot;title&quot;:&quot;Shot from the Back to Hacker Breaking into Corporate Data Servers from His Underground Hideout. Place Has Dark Atmosphere, Multiple Displays&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Shot from the Back to Hacker Breaking into Corporate Data Servers from His Underground Hideout. Place Has Dark Atmosphere, Multiple Displays\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Shot from the Back to Hacker Breaking into Corporate financial Data Servers from His Underground Hideout.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?fit=660%2C440&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=660%2C440&#038;ssl=1\" alt=\"\" class=\"wp-image-1228\" srcset=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=768%2C513&amp;ssl=1 768w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=1536%2C1025&amp;ssl=1 1536w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=2048%2C1367&amp;ssl=1 2048w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=1200%2C801&amp;ssl=1 1200w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=10%2C7&amp;ssl=1 10w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=432%2C288&amp;ssl=1 432w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=396%2C264&amp;ssl=1 396w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=1120%2C747&amp;ssl=1 1120w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=660%2C440&amp;ssl=1 660w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=330%2C220&amp;ssl=1 330w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?resize=1320%2C881&amp;ssl=1 1320w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/shot-from-back-hacker-breaking-into-corporate-data-servers-from-his-underground-hideout-place-has-dark-atmosphere-multiple-displays.jpg?w=1980&amp;ssl=1 1980w\" sizes=\"auto, (max-width: 600px) 91vw, (max-width: 900px) 600px, (max-width: 1060px) 50vw, (max-width: 1200px) 520px, (max-width: 1400px) 43vw, 600px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"wp-block-paragraph\">That\u2019s it for this podcast, stay safe and see you in the next podcast.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"http:\/\/www.nucleoncyber.com\" target=\"_blank\" rel=\"noreferrer noopener\">Don\u2019t forget to visit www.nucleoncyber.com<\/a> for the latest podcasts on cyber intelligence.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">++++++<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the Nucleon Cyber Intelligence podcast. This podcast will give you a summary of the latest news related to cyber intelligence and proactive cyber security in only a few minutes. The podcast is aimed at professionals who are short on time, or for anyone who would like to know a bit more about what [&hellip;]<\/p>\n","protected":false},"author":143072865,"featured_media":1229,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_crdt_document":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false,"jetpack_post_was_ever_published":false},"categories":[646263560],"tags":[41054,61188,337,3956,4333,21013,1142,699,684292421,684292422,684292311,684292420,684292423,684292402],"class_list":["post-1222","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercure-ai","tag-airbus","tag-hackers","tag-health","tag-korea","tag-north-korea","tag-phishing","tag-podcast","tag-usa","tag-att","tag-gm","tag-lazarus","tag-linkedin","tag-rheinmetall","tag-stealth","entry-image--landscape"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/09\/chiang-mai-thailand-dec-12-2020-women-holds-apple-iphone-xs-with-linkedin-application-screen-linkedin-is-photo-sharing-app-smartphones.jpg?fit=4572%2C2729&ssl=1","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paa2yX-jI","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts\/1222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/users\/143072865"}],"replies":[{"embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/comments?post=1222"}],"version-history":[{"count":7,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts\/1222\/revisions"}],"predecessor-version":[{"id":1232,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts\/1222\/revisions\/1232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/media\/1229"}],"wp:attachment":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/media?parent=1222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/categories?post=1222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/tags?post=1222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}