{"id":28632,"date":"2024-03-28T07:21:37","date_gmt":"2024-03-28T07:21:37","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=28632"},"modified":"2026-04-17T18:07:38","modified_gmt":"2026-04-17T18:07:38","slug":"bitter-apt-targets-chinese-government-agency","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/bitter-apt-targets-chinese-government-agency\/","title":{"rendered":"BITTER APT Targets Chinese Government Agency"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><\/p>\n\n\n\n<p>On February 1, 2024, the APT Group BITTER launched a spear-phishing attack on a Chinese government agency. <\/p>\n\n\n\n<p><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/botnet-trend-report-2019-15\/\" target=\"_blank\" rel=\"noreferrer noopener\">BITTER<\/a>, also known as APT-C-08 or T-APT-17, has been actively targeting countries such as China and Pakistan, focusing on industries like government, power, and military to steal sensitive information, driven by strong political motives.<\/p>\n\n\n\n<p>In this incident, the BITTER threat actor sent spear-phishing emails to specific key personnel. Once the email was opened, a scheduled task was created on the victim&acirc;&euro;&trade;s computer, activating every 18 minutes. This allowed the Trojan file to control the target host completely and carry out data theft.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Incident Discovery, Analysis, and Identification<\/strong><\/h2>\n\n\n\n<p>The agency detected abnormal external connections in its internal network system and suspected that a computer was remotely controlled. The agency contacted NSFOCUS for emergency investigation and analysis.<\/p>\n\n\n\n<p>The NSFOCUS emergency response team, through internet behavior management and firewall records, found access records to a malicious domain &acirc;&euro;&oelig;northgenstudios.com&acirc;&euro; during the critical time period. However, no other malicious activities related to this domain were discovered.<\/p>\n\n\n\n<p>The query result from NSFOCUS Threat Intelligence shows that the malicious domain was traced to the IP address 195.230.22.7. This is a cluster platform mapping over a thousand domains. Expanding the search timeframe revealed an abnormal outbound connection from a host IP address 10.11.x.x within the client&acirc;&euro;&trade;s office intranet, along with six instances of external connections to the malicious domain. Upon careful inspection, multiple msi xxx.tmp files were found in the anti-virus engine&acirc;&euro;&trade;s logs of the host, and two malicious samples that were successfully identified unveiled the entire attack chain:<\/p>\n\n\n\n<p>The threat actor used the CHM format as an attachment to entice employees in core key positions to open it and create scheduled tasks. Subsequently, the task accessed the malicious domain &acirc;&euro;&oelig;northgenstudios.com&acirc;&euro; and downloaded msixxx.tmp files. These tmp. files were implanted with the Havoc Trojan and then connected to dtzappaccount.com, corresponding to the IP address 45.66.248.66.<\/p>\n\n\n\n<p>Correlation analysis with historical samples indicated that this APT attack was carried out by the APT Group BITTER.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Attack Event Reconstruction<\/strong><\/h2>\n\n\n\n<p>Based on log and sample analysis, the emergency response team reconstructed the entire attack and response process:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\" start=\"1\">\n<li><strong>Targeted Email Delivery: <\/strong> On January 23, 2024, a core employee of the government agency received a phishing email disguised as being from a higher-level government department.<\/li>\n\n\n\n<li><strong>Trojan Implantation: <\/strong>The victim opened the attachment, making the Trojan be implanted successfully and first automatically accessed the remote C2 server, then implanted a new Trojan.<\/li>\n\n\n\n<li><strong>Data Theft:<\/strong> The victim&acirc;&euro;&trade;s host accessed the remote control server for data transmission, causing an abnormally large increase in traffic volume, which went unnoticed by the client unfortunately.<\/li>\n\n\n\n<li><strong>Clue Discovery: <\/strong>The NSFOCUS emergency response team received a call for help and conducted an urgent inspection. Leveraging NSFOCUS threat intelligence, abnormal external connections were detected.<\/li>\n\n\n\n<li><strong>Attack Source Tracking: <\/strong>Through forensic analysis on the host side, extraction of Trojan files, and sample behavior analysis, the NSFOCUS emergency response team identified that APT Group BITTER carried out the attack. Immediate action was taken to remove the Trojan and reinforce the system.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Security Recommendation<\/h2>\n\n\n\n<p>Prevention is better than cure. It&acirc;&euro;&trade;s best to have proactive detection capabilities against APTs, mining, ransomware, botnets, worms, Trojans, etc., to avoid losses. Early threat detection and deployment of defense measures can be achieved through real-time threat intelligence, multi-dimensional correlation analysis and comprehensive investigation.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Proactive-Threat-Discovery-Solution.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"464\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Proactive-Threat-Discovery-Solution-1024x464.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-28633\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Proactive-Threat-Discovery-Solution-1024x464.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Proactive-Threat-Discovery-Solution-300x136.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Proactive-Threat-Discovery-Solution-768x348.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Proactive-Threat-Discovery-Solution-1536x696.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Proactive-Threat-Discovery-Solution-600x272.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Proactive-Threat-Discovery-Solution-200x91.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Proactive-Threat-Discovery-Solution.png 1700w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Proactive Threat Discovery Solution<\/figcaption><\/figure>\n<\/div><\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>On February 1, 2024, the APT Group BITTER launched a spear-phishing attack on a Chinese government agency. BITTER, also known as APT-C-08 or T-APT-17, has been actively targeting countries such as China and Pakistan, focusing on industries like government, power, and military to steal sensitive information, driven by strong political motives. In this incident, the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":28635,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-28632","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BITTER APT Targets Chinese Government Agency - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BITTER APT Targets Chinese Government Agency - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"On February 1, 2024, the APT Group BITTER launched a spear-phishing attack on a Chinese government agency. BITTER, also known as APT-C-08 or T-APT-17, has\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-28T07:21:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Feature-Image-e1711610064278.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"BITTER APT Targets Chinese Government Agency - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"On February 1, 2024, the APT Group BITTER launched a spear-phishing attack on a Chinese government agency. BITTER, also known as APT-C-08 or T-APT-17, has\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Feature-Image-e1711610064278.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"BITTER APT Targets Chinese Government Agency\",\"datePublished\":\"2024-03-28T07:21:37+00:00\",\"dateModified\":\"2026-04-17T18:07:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/\"},\"wordCount\":587,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Feature-Image-e1711610064278.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/\",\"name\":\"BITTER APT Targets Chinese Government Agency - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Feature-Image-e1711610064278.jpg\",\"datePublished\":\"2024-03-28T07:21:37+00:00\",\"dateModified\":\"2026-04-17T18:07:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Feature-Image-e1711610064278.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Feature-Image-e1711610064278.jpg\",\"width\":400,\"height\":395,\"caption\":\"Green geometric mandala with floral pattern.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bitter-apt-targets-chinese-government-agency\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BITTER APT Targets Chinese Government Agency\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BITTER APT Targets Chinese Government Agency - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/","og_locale":"pt_BR","og_type":"article","og_title":"BITTER APT Targets Chinese Government Agency - NSFOCUS","og_description":"On February 1, 2024, the APT Group BITTER launched a spear-phishing attack on a Chinese government agency. BITTER, also known as APT-C-08 or T-APT-17, has","og_url":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/","og_site_name":"NSFOCUS","article_published_time":"2024-03-28T07:21:37+00:00","article_modified_time":"2026-04-17T18:07:38+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Feature-Image-e1711610064278.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"BITTER APT Targets Chinese Government Agency - NSFOCUS","twitter_description":"On February 1, 2024, the APT Group BITTER launched a spear-phishing attack on a Chinese government agency. BITTER, also known as APT-C-08 or T-APT-17, has","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Feature-Image-e1711610064278.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"BITTER APT Targets Chinese Government Agency","datePublished":"2024-03-28T07:21:37+00:00","dateModified":"2026-04-17T18:07:38+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/"},"wordCount":587,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Feature-Image-e1711610064278.jpg","articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/","url":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/","name":"BITTER APT Targets Chinese Government Agency - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Feature-Image-e1711610064278.jpg","datePublished":"2024-03-28T07:21:37+00:00","dateModified":"2026-04-17T18:07:38+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Feature-Image-e1711610064278.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/03\/Feature-Image-e1711610064278.jpg","width":400,"height":395,"caption":"Green geometric mandala with floral pattern."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/bitter-apt-targets-chinese-government-agency\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"BITTER APT Targets Chinese Government Agency"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/28632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=28632"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/28632\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/28635"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=28632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=28632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=28632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}