{"id":2117,"date":"2016-03-28T09:00:09","date_gmt":"2016-03-28T09:00:09","guid":{"rendered":"http:\/\/staging.nsfocusglobal.com\/?p=2117"},"modified":"2016-03-28T09:00:09","modified_gmt":"2016-03-28T09:00:09","slug":"ddos-motivations-madness-part-2","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/ddos-motivations-madness-part-2\/","title":{"rendered":"DDoS \u2013 Motivations for the Madness, Part 2"},"content":{"rendered":"<div class=\"title\">\n<p class=\"info\"><strong>Track: General Security<\/strong><\/p>\n<\/div>\n<p class=\"info\"><em>Author: Stephen Gates,\u00a0Chief Research Intelligence Analyst, NSFOCUS<\/em><\/p>\n<p><a href=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime.jpg\" rel=\"attachment wp-att-2118\"><img fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-2118 alignright\" src=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-300x300.jpg\" alt=\"DDoS motivations\" width=\"352\" height=\"352\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-300x300.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-1024x1024.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-150x150.jpg 150w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-768x768.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime.jpg 1418w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/><\/a>In an earlier blog post I described some of the threat actors and the motivations that often fuel DDoS attacks.<\/p>\n<p>Continuing with this theme, another prominent motivation reared its ugly head in the late 2000s.\u00a0 <em>Cyber hacktivism<\/em>, as it is called today, is still one of the most observed motivations for DDoS attacks.\u00a0 People who claim to have a substantiated reason for launching attacks, based upon their personal, social, moral, or political agenda, launch attacks daily against a host of helpless victims.\u00a0 The reasons behind the attacks can be based on just about anything that someone doesn\u2019t like.\u00a0 One recent example was an attack on Nissan from a group protesting Japan\u2019s stance and policies with respect to Marine life.<!--more--><\/p>\n<p>The next motivation is all about money. \u00a0Today, attackers motivated by <em>extortion<\/em> send emails to organization all over the globe, warning of a pending DDoS attack. \u00a0Asking for as little as 40 bitcoins to be deposited in online account, those that pay the ransom normally won\u2019t get attacked.\u00a0 Those that don\u2019t pay will likely wish they had; especially if they have no DDoS defenses in place.\u00a0 This motivation is a serious threat, and the payoffs will likely increase tenfold if people are receptive to paying the ransoms.\u00a0 In addition, copycat actors will likely follow others using this motivation for future attacks.<\/p>\n<p>The final motivation today is called <em>Dark DDoS<\/em>.\u00a0 Threat actors in this case, use DDoS attacks as smoke screens to hide their <em>other<\/em> insidious activity.\u00a0 This activity includes network and application breaches and normally includes data exfiltration. Attackers understand that hiding as much of their activity as possible, allows their activity to often go unnoticed.\u00a0\u00a0 Flooding logging systems with nothing but DDoS alarms, helps attackers achieve these goals.<\/p>\n<p>As we have seen here, the motivations for attacks are broad and complex. \u00a0Those with no defenses in place, or those that rely solely on traditional approaches, are helping to fuel the fire. As long as the attacks are successful, hackers will continue to take organization offline and steal valuable data. NSFOCUS works with service providers, hosting providers, gamers, and enterprises daily to help defeat the effects of DDoS attacks.\u00a0 Although these attack vectors and the motivations will not go away anytime soon, organizations with the right defenses can completely protect themselves from DDoS attacks.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/SBB5039.jpg\" rel=\"attachment wp-att-2189\"><img decoding=\"async\" class=\"alignleft wp-image-2189\" src=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/SBB5039-240x300.jpg\" alt=\"Stephen Gates\" width=\"150\" height=\"188\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/SBB5039-240x300.jpg 240w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/SBB5039-819x1024.jpg 819w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/SBB5039-768x960.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/SBB5039.jpg 1200w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><em><strong>Steve\u00a0<\/strong><\/em>is a key research intelligence analyst with NSFOCUS IBD. He has been instrumental in solving the DDoS problem for service providers, hosting providers, and enterprises in North America and abroad. Steve has more than 25 years of computer networking and security experience with an extensive background in the deployment and implementation of next-generation security solutions. In his last role, Steve served as the Chief Security Evangelist for Corero Network Security before joining the NSFOCUS team. Steve is a recognized Subject Matter Expert on DDoS attack tools and methodologies, including next-generation defense approaches. You can usually find Steve providing insight, editorial, industry thought leadership, and presentations covering the latest security topics at RSA, SecureWorld, SANs, Black Hat, IANS, ISSA, InfraGard, ISACA, etc.<\/p>\n<p>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Track: General Security Author: Stephen Gates,\u00a0Chief Research Intelligence Analyst, NSFOCUS In an earlier blog post I described some of the threat actors and the motivations that often fuel DDoS attacks. Continuing with this theme, another prominent motivation reared its ugly head in the late 2000s.\u00a0 Cyber hacktivism, as it is called today, is still one [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35865,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-2117","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS \u2013 Motivations for the Madness, Part 2 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS \u2013 Motivations for the Madness, Part 2 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Track: General Security Author: Stephen Gates,\u00a0Chief Research Intelligence Analyst, NSFOCUS In an earlier blog post I described some of the threat actors\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-28T09:00:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-300x300-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"DDoS \u2013 Motivations for the Madness, Part 2 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Track: General Security Author: Stephen Gates,\u00a0Chief Research Intelligence Analyst, NSFOCUS In an earlier blog post I described some of the threat actors\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-300x300-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"DDoS \u2013 Motivations for the Madness, Part 2\",\"datePublished\":\"2016-03-28T09:00:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/\"},\"wordCount\":525,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/Cyber-crime-300x300-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/\",\"name\":\"DDoS \u2013 Motivations for the Madness, Part 2 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/Cyber-crime-300x300-1.jpg\",\"datePublished\":\"2016-03-28T09:00:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/Cyber-crime-300x300-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/Cyber-crime-300x300-1.jpg\",\"width\":300,\"height\":300,\"caption\":\"Cybercrime illustration with hacker and digital elements.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ddos-motivations-madness-part-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS \u2013 Motivations for the Madness, Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS \u2013 Motivations for the Madness, Part 2 - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"DDoS \u2013 Motivations for the Madness, Part 2 - NSFOCUS","og_description":"Track: General Security Author: Stephen Gates,\u00a0Chief Research Intelligence Analyst, NSFOCUS In an earlier blog post I described some of the threat actors","og_url":"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/","og_site_name":"NSFOCUS","article_published_time":"2016-03-28T09:00:09+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-300x300-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"DDoS \u2013 Motivations for the Madness, Part 2 - NSFOCUS","twitter_description":"Track: General Security Author: Stephen Gates,\u00a0Chief Research Intelligence Analyst, NSFOCUS In an earlier blog post I described some of the threat actors","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-300x300-1.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"DDoS \u2013 Motivations for the Madness, Part 2","datePublished":"2016-03-28T09:00:09+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/"},"wordCount":525,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-300x300-1.jpg","articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/","url":"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/","name":"DDoS \u2013 Motivations for the Madness, Part 2 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-300x300-1.jpg","datePublished":"2016-03-28T09:00:09+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-300x300-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/03\/Cyber-crime-300x300-1.jpg","width":300,"height":300,"caption":"Cybercrime illustration with hacker and digital elements."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/ddos-motivations-madness-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"DDoS \u2013 Motivations for the Madness, Part 2"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/2117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=2117"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/2117\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35865"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=2117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=2117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=2117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}