{"id":9914,"date":"2020-01-16T01:26:33","date_gmt":"2020-01-16T01:26:33","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9914"},"modified":"2026-04-17T18:07:50","modified_gmt":"2026-04-17T18:07:50","slug":"cybersecurity-insights-13","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/cybersecurity-insights-13\/","title":{"rendered":"Cybersecurity Insights-13"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong>Distribution of IoT-based Family Samples<\/strong><\/h2>\n<p>We analyzed IoT-based malicious family samples captured by NSFOCUS threat hunting systems (see Figure 7-1), those captured by NSFOCUS Threat Intelligence (NTI) and those captured by VirusTotal (see Figure 7-2). The two figures, though presenting different data sources, both indicate that Gafgyt and Mirai take the first two places on the top list. We can see that IoT-based malware families tend to behave in a similar way. This is likely due to the source code of Gafgyt and Mirai families being published on the internet and can be modified at will. Their variants mainly change the C&amp;C address and attack method, which is what tools-kids always do. Arguably, most attackers are tool users, with little technical expertise.<!--more--><\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-9915\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"629\" height=\"365\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-1.jpg 629w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-1-300x174.jpg 300w\" sizes=\"(max-width: 629px) 100vw, 629px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9916\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"630\" height=\"367\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-2.jpg 630w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-2-300x175.jpg 300w\" sizes=\"(max-width: 630px) 100vw, 630px\" \/><\/a><\/p>\n<p>The analysis of captured data shows that IoT-based botnets function as centralized services in a managed way. Most attackers can now simply rent DDoS services to launch attacks, without the need of building botnets on their own. Furthermore, malware developers continue to update their infection code with new exploitation methods, in a bid to compromise more botnet hosts to launch larger bandwidth attacks.<\/p>\n<h2><strong>IoT-based Cryptomining<\/strong><\/h2>\n<p>In April 2018, 200,000 MikroTik routers were hit by malicious attacks and compromised into participating in bot activity.<\/p>\n<p>By October 2018, Coinhive had controlled over 26,000 IoT devices, most of which were MikroTik routers distributed in Brazil. IoT devices are difficult to upgrade and fix, which is a greatest challenge to overcome in securing the IoT.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9917\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"735\" height=\"96\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-3.jpg 735w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-3-300x39.jpg 300w\" sizes=\"(max-width: 735px) 100vw, 735px\" \/><\/a><\/p>\n<p>As listed in 0, , the number of these IoT devices decreased compared with April 2018, but they still remain dangerous.<\/p>\n<p>Analysis of the distribution of controlled IoT devices by type and vendor.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9918\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"696\" height=\"325\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-4.jpg 696w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-4-300x140.jpg 300w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>We found that over 90% of the IoT devices controlled by the Coinhive family were routers, 96% of which were MikroTik routers. See Figure 7-3.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9919\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-5.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"607\" height=\"345\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-5.jpg 607w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/0116-5-300x171.jpg 300w\" sizes=\"(max-width: 607px) 100vw, 607px\" \/><\/a><\/p>\n<p>As of April 2018, Brazil is home to the most MikroTik routers controlled by the Coinhive family. The vulnerability was discovered in March 2018 and by April massive cryptomining activities were seen throughout the country. By October, Coinhive had controlled a great number of IoT devices, which indicated that the IoT devices were not patched. Typical users have both a lack of security awareness in general and little knowledge about IoT devices in particular. It is bad enough that IoT vendors fail to provide automatic or other update mechanisms to ensure proactive security.<\/p>\n<p>To be continued.<\/p>\n<h2><\/h2>\n<p><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Distribution of IoT-based Family Samples We analyzed IoT-based malicious family samples captured by NSFOCUS threat hunting systems (see Figure 7-1), those captured by NSFOCUS Threat Intelligence (NTI) and those captured by VirusTotal (see Figure 7-2). The two figures, though presenting different data sources, both indicate that Gafgyt and Mirai take the first two places on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9469,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[5,15],"tags":[],"class_list":["post-9914","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos-mitigation","category-research-reports"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Insights-13 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Insights-13 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Distribution of IoT-based Family Samples We analyzed IoT-based malicious family samples captured by NSFOCUS threat hunting systems (see Figure 7-1), those\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-16T01:26:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersecurity Insights-13 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Distribution of IoT-based Family Samples We analyzed IoT-based malicious family samples captured by NSFOCUS threat hunting systems (see Figure 7-1), those\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Cybersecurity Insights-13\",\"datePublished\":\"2020-01-16T01:26:33+00:00\",\"dateModified\":\"2026-04-17T18:07:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/\"},\"wordCount\":390,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Cybersecurity-Insights.jpg\",\"articleSection\":[\"DDoS Mitigation\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/\",\"name\":\"Cybersecurity Insights-13 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Cybersecurity-Insights.jpg\",\"datePublished\":\"2020-01-16T01:26:33+00:00\",\"dateModified\":\"2026-04-17T18:07:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Cybersecurity-Insights.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/Cybersecurity-Insights.jpg\",\"width\":540,\"height\":381,\"caption\":\"Cybersecurity insights cover with green design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/cybersecurity-insights-13\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Insights-13\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Insights-13 - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Cybersecurity Insights-13 - NSFOCUS","og_description":"Distribution of IoT-based Family Samples We analyzed IoT-based malicious family samples captured by NSFOCUS threat hunting systems (see Figure 7-1), those","og_url":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/","og_site_name":"NSFOCUS","article_published_time":"2020-01-16T01:26:33+00:00","article_modified_time":"2026-04-17T18:07:50+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Cybersecurity Insights-13 - NSFOCUS","twitter_description":"Distribution of IoT-based Family Samples We analyzed IoT-based malicious family samples captured by NSFOCUS threat hunting systems (see Figure 7-1), those","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Cybersecurity Insights-13","datePublished":"2020-01-16T01:26:33+00:00","dateModified":"2026-04-17T18:07:50+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/"},"wordCount":390,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","articleSection":["DDoS Mitigation","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/","url":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/","name":"Cybersecurity Insights-13 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","datePublished":"2020-01-16T01:26:33+00:00","dateModified":"2026-04-17T18:07:50+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/10\/Cybersecurity-Insights.jpg","width":540,"height":381,"caption":"Cybersecurity insights cover with green design."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/cybersecurity-insights-13\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Insights-13"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9914"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9914\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/9469"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}