{"id":11088,"date":"2020-08-10T01:12:00","date_gmt":"2020-08-10T01:12:00","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=11088"},"modified":"2026-04-17T18:07:48","modified_gmt":"2026-04-17T18:07:48","slug":"botnet-trend-report-2019-5","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/botnet-trend-report-2019-5\/","title":{"rendered":"Botnet Trend Report -5"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\"><strong>Spear Phishing and Malicious Documents<\/strong><\/h2>\n\n\n\n<p>In the past few years, including malicious attachments in emails has become one of the most common methods that APT groups and various cybercriminal groups use to launch spear phishing attacks. Compared with previous years, 2019 saw more spear phishing attacks with a bigger impact, which was linked with the following facts.<\/p>\n\n\n\n<!--more-->\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Increase in Email Account Leaks<\/strong><\/li><\/ul>\n\n\n\n<p>To conduct a spear phishing attack, a bad actor needs to first collect email accounts as phishing mail recipients.<\/p>\n\n\n\n<p>In 2019, database leak events frequently made headlines. For example, MongoDB and ElasticSearch, which are databases supposed to be used in LANs, may be exposed to external users if configured improperly. In February, Coinmama, an Israeli cryptocurrency transaction platform, was reported to suffer an information breach, having email addresses and passwords of 450,000 registered users leaked and sold on the dark web[4]. In March, researchers from Security Discovery discovered that a MongoDB database of Verifications IO, an email marketing company, was publicly accessible with over 800 million email addresses. The Russian cybersecurity company Group-IB found that email account information of employees from different government and education departments of Singapore was published on extranets. In July, Sephora, a cosmetics, makeup, and skin care product supplier, had account information of clients from different countries, including email addresses, stolen in a database<br>leak attack.<\/p>\n\n\n\n<p>The examples given above make it evident that email databases can become a fat prey to cybercriminal groups.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Evolution of Social Engineering Attacks<\/strong><\/li><\/ul>\n\n\n\n<p>In the past few years, spear phishing attacks have evolved in such a way as to be able to more accurately victimize targets. After obtaining an email address, an attacker tends to carefully craft an email subject to increasing the chance of the email or even the attachment being opened.<\/p>\n\n\n\n<p>Moreover, attackers may use forged addresses instead of real ones, adding to the difficulty of tracing the real source.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Diversification of Payload Types<\/strong><\/li><\/ul>\n\n\n\n<p>According to sample statistics of attachment types used in spear phishing attacks in 2019, Office documents were obviously the dominant type of payloads, followed by PDF and ISO files and compressed packages.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"402\" height=\"292\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0810-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-11089\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0810-1.jpg 402w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0810-1-300x218.jpg 300w\" sizes=\"(max-width: 402px) 100vw, 402px\" \/><\/figure><\/div>\n\n\n\n<p>Besides Office, file types used as malicious payloads of emails in 2019 included PDF, compressed packages, and ISO images.<\/p>\n\n\n\n<p>In the latter half of 2018 a new attack method emerged, that is, using ISO images as malicious attachments. Windows 8 and later come with a virtual CD drive. Users can load an ISO file by only a double click, making this type of files an ideal carrier of malicious payloads.<\/p>\n\n\n\n<p>Likewise, ZIP and RAR packages may also contain malicious files, such as executables and VBS, JavaScript, and PowerShell scripts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>By exploiting weak passwords, various vulnerabilities, and spam, attackers can break system protections, directly or indirectly planting malware to conduct cybercrimes for illegal gains.<\/p>\n\n\n\n<p>Vulnerabilities in Windows and Linux\/Iotdevices are seldom fixed in time.<\/p>\n\n\n\n<p>It is not hard to imagine that these hardware devices, which are exposed on the Internet with delayed upgrades and maintenance, will end up victims of the ever-evolving attack techniques and become members of botnet armies constructed by malware families, giving rise to such threats as DDoS attacks, ransomware attacks, cryptojacking, information thefts, and adware bundling.<\/p>\n\n\n\n<p><em>To be continued.<\/em><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Spear Phishing and Malicious Documents In the past few years, including malicious attachments in emails has become one of the most common methods that APT groups and various cybercriminal groups use to launch spear phishing attacks. Compared with previous years, 2019 saw more spear phishing attacks with a bigger impact, which was linked with the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10927,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6,15],"tags":[119],"class_list":["post-11088","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","category-research-reports","tag-botnet-trend-report"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Botnet Trend Report -5 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Botnet Trend Report -5 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Spear Phishing and Malicious Documents In the past few years, including malicious attachments in emails has become one of the most common methods that APT\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T01:12:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0713-1.png\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Botnet Trend Report -5 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Spear Phishing and Malicious Documents In the past few years, including malicious attachments in emails has become one of the most common methods that APT\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0713-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Botnet Trend Report -5\",\"datePublished\":\"2020-08-10T01:12:00+00:00\",\"dateModified\":\"2026-04-17T18:07:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/\"},\"wordCount\":529,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/0713-1.png\",\"keywords\":[\"Botnet Trend Report\"],\"articleSection\":[\"Emergency Response\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/\",\"name\":\"Botnet Trend Report -5 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/0713-1.png\",\"datePublished\":\"2020-08-10T01:12:00+00:00\",\"dateModified\":\"2026-04-17T18:07:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/0713-1.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/0713-1.png\",\"width\":570,\"height\":481,\"caption\":\"botnet 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/botnet-trend-report-2019-5\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Botnet Trend Report -5\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Botnet Trend Report -5 - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/","og_locale":"pt_BR","og_type":"article","og_title":"Botnet Trend Report -5 - NSFOCUS","og_description":"Spear Phishing and Malicious Documents In the past few years, including malicious attachments in emails has become one of the most common methods that APT","og_url":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/","og_site_name":"NSFOCUS","article_published_time":"2020-08-10T01:12:00+00:00","article_modified_time":"2026-04-17T18:07:48+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0713-1.png","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Botnet Trend Report -5 - NSFOCUS","twitter_description":"Spear Phishing and Malicious Documents In the past few years, including malicious attachments in emails has become one of the most common methods that APT","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0713-1.png","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Botnet Trend Report -5","datePublished":"2020-08-10T01:12:00+00:00","dateModified":"2026-04-17T18:07:48+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/"},"wordCount":529,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0713-1.png","keywords":["Botnet Trend Report"],"articleSection":["Emergency Response","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/","url":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/","name":"Botnet Trend Report -5 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0713-1.png","datePublished":"2020-08-10T01:12:00+00:00","dateModified":"2026-04-17T18:07:48+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0713-1.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/07\/0713-1.png","width":570,"height":481,"caption":"botnet 1"},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/botnet-trend-report-2019-5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Botnet Trend Report -5"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=11088"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/11088\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10927"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=11088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=11088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=11088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}