{"id":67679,"date":"2020-04-29T15:03:18","date_gmt":"2020-04-29T13:03:18","guid":{"rendered":"https:\/\/www.hiig.de\/?p=67679"},"modified":"2023-03-28T17:06:21","modified_gmt":"2023-03-28T15:06:21","slug":"state-sponsored-cyber-activities-in-coronavirus-times","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/","title":{"rendered":"State-sponsored cyber activities in Coronavirus times"},"content":{"rendered":"\n<p><em>The coronavirus pandemic has created a gold mine for cybercriminal activities, including those sponsored by states, generating digital chaos. However, amid this chaos, a light at the end of the tunnel may be seen, involving interactions between states and society.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>The coronavirus pandemic has increased the online presence of people as a result of the social distance measures, making society more dependable on digital infrastructure. Not only home-office seems to be the \u201cnew normal,\u201d but also some services, such as grocery\u2019s or medical supplies delivery, were forced to deal with a huge online demand quickly. The speed on digitalization of some services, as those examples, converted them into new digital vulnerabilities, once their security barriers were not properly settled and cyberattacks could easily disrupt society\u2019s functioning through them. Besides the move to less secure environments (either by lack of preparation or lack of cybersecurity awareness), such as private homes, made available to malicious actors more access points to digital systems. The increase of these access points is due to the availability of more people online that can be lured to make security mistakes, giving to cybercriminals the opportunity needed to operate and usually achieve financial gains. The pandemic in this way has generated a mine of gold for malicious actors as people\u2019s fear or curiosity toward the virus outbreak makes them more susceptible to psychological manipulation, allowing cyberattacks through<a href=\"https:\/\/www.imperva.com\/learn\/application-security\/social-engineering-attack\/\"> social engineering<\/a> to happen.<\/p>\n\n\n\n<p>However, the cybercriminal activity related to COVID-19 is not restricted to individuals trying to obtain financial gains. There have been some findings on suspected state-sponsored groups conducting cyber operations. The<a href=\"https:\/\/www.thalesgroup.com\/sites\/default\/files\/database\/document\/2020-03\/2020-03-24_COVID-19_CYBER_THREAT_ASSESSMENT_(ENG).pdf?_ga=2.232378909.32754110.1587568300-183827954.1586936406\"> Thales<\/a> group\u2019s Cyber Threat Intelligence Center and the threat intelligence company,<a href=\"https:\/\/intsights.com\/resources\/covid-19-cyber-threat-impact-report\"> IntSights<\/a>, showed in their reports that more state-sponsored groups are using COVI-19 as part of their espionage campaigns. The reports showed that, in essence, the malicious actors emulate a trusted source and offer documents with COVID-19 information, luring their targets into opening these documents and, without knowing, downloading a hidden malware. Once downloaded, the malware provides remote control of the infected device. These activities are involving so far actors that may be linked to Russia (Hades group), China (Mustang and Vicious Panda), North Korea (Kimsuky), and Pakistan (APT36). These actors have affected by now targets in Ukraine, Taiwan, Vietnam, Mongolia, South Korea, and India.<\/p>\n\n\n\n<p>These findings are significant as the targets typically are related to governmental agencies, making it possible for malicious actors to get access to sensitive state information, and thus making it feasible to conduct espionage campaigns. Besides, they could potentially use the new vulnerabilities in the digital domain to conduct offensive cyber operations against rival states that, if directed to the healthcare sector, especially at this moment, could result in actual deaths.In front of the digital perils of these types of cyber activities online, there is the need as UN Under-Secretary-General<a href=\"https:\/\/www.vox.com\/world\/2020\/4\/10\/21216477\/coronavirus-covid-19-pandemic-cyberattacks-digital-ceasefire-who-hack-united-nations\"> Fabrizio Hochschild<\/a> called for a global \u201cdigital ceasefire\u201d during the pandemic. Still, the solution might not come from states itself in the first moment, but society.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>States, Proxies and Society<\/strong><\/h3>\n\n\n\n<p>To understand how the solution to curb malicious activities perpetrated by state-sponsored actors may be developed, it is essential to know that the use of these actors in the digital domain is not new. In fact, since the public revelation of<a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/ransomware\/what-is-stuxnet.html\"> Stuxnet malware<\/a>, most states became aware of political and military options cyberspace provided for them. The range of these opportunities, coupled with the possibility to act extraterritoriality employing non-state actors, usually operating from third countries<a href=\"https:\/\/books.google.de\/books?redir_esc=y&amp;hl=pt-BR&amp;id=zqhJDwAAQBAJ&amp;q=proxy#v=snippet&amp;q=proxy&amp;f=false\"> (Maurer,2018),<\/a> &nbsp;provided them the comfortable legal situation needed to engage in a \u201cless diplomatic way\u201d in their cyber operations.<\/p>\n\n\n\n<p>Thus, the main benefit generated by the use of these non-state actors (proxies) is related then to the fact that the outcomes of their actions, cannot be directly associated with states. This indirect relationship means that states cannot be held legally responsible for the actions proxies carry on (at least for the time being). This relationship thus allows proxies to conduct not only cyber-espionage campaigns for states but also act in other types of cyber operations. Indeed, according to the IntSight\u2019s cyber threat analyst<a href=\"https:\/\/www.techrepublic.com\/article\/cybercriminals-state-sponsored-groups-ramping-up-attacks-exploiting-covid-19-pandemic\/\"> Charity Wright<\/a>, some countries attempt \u201cto promote division and distrust in institutions like the free press, civil society groups, and non-governmental organizations.\u201d The Hades group is an excellent example, as it deployed a disinformation campaign, related to COVId-19, that, coupled with the arrival of a flight of evacuees from China, incited riots and looting across Ukraine (<a href=\"https:\/\/www.thalesgroup.com\/sites\/default\/files\/database\/document\/2020-03\/2020-03-24_COVID-19_CYBER_THREAT_ASSESSMENT_(ENG).pdf?_ga=2.232378909.32754110.1587568300-183827954.1586936406\">Thales<\/a>;<a href=\"https:\/\/intsights.com\/resources\/covid-19-cyber-threat-impact-report\"> IntSights<\/a>).<\/p>\n\n\n\n<p>In sum, both espionage campaigns and the possibility of other cyber operations conducted by proxies lead to distrust not only among governments and civil society but also between states, especially during the chaotic times generated by the pandemic. Thus, a movement to reach a close \u201cdigital ceasefire\u201d should target trust and transparency. These elements do not seem present on some states\u2019 intentions, as they can gain from the use of proxies in cyberspace. One alternative that emerges is a bottom-up movement initiated by a social demand.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The light at the end of the tunnel?<\/strong><\/h3>\n\n\n\n<p>The pandemic could create <em>momentum<\/em> for society to realize that they have a voice in digital outcomes. As<a href=\"https:\/\/www.ft.com\/content\/19d90308-6858-11ea-a3c9-1fe6fedcca75\"> Yuval Noah Harari<\/a> exposed, well-informed people who have access to scientific facts and trust public authorities to tell them these facts can act spontaneously for the common good. Therefore, as cyber proxies operate in the shadows, people demanding an open debate with states regarding digital information on COVID-19 could throw some lightning into the darkness. People could then enhance their trust in governments, being less accessible to fall into psychological manipulation and, by consequence, proportionally tackling the malicious cyber activities (generating a diffuse cyber defense against diffused cyberattacks). Besides, information sharing with allied nations could decrease the curiosity or mistrust among states that could potentially lead to espionage, at least relate to coronavirus\u2019s information. The trust among nations then could proportionate the possibility of collective reactions toward countries that insist on supporting deviant actions in the digital realm based on the current pandemic.<\/p>\n\n\n\n<p>Trust is the keyword, and it may be achieved by transparency and an open discussion toward the development of a \u201c<a href=\"https:\/\/hcss.nl\/sites\/default\/files\/files\/reports\/Pandemic%20Mitigation%20Measures%20in%20the%20Digital%20Age%20-%20Final.pdf\">digital agenda for pandemic response<\/a>,\u201d involving among other propositions a multi-stakeholder approach and expansion on information sharing. However, the development of such type of agenda must be called upon society, at least democratic ones, and the first step is to people to start thinking about actions during the pandemic in a more critical way, including digital ones.<\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fstate-sponsored-cyber-activities-in-coronavirus-times%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=State-sponsored%20cyber%20activities%20in%20Coronavirus%20times https%3A%2F%2Fwww.hiig.de%2Fen%2Fstate-sponsored-cyber-activities-in-coronavirus-times%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fstate-sponsored-cyber-activities-in-coronavirus-times%2F&subject=State-sponsored%20cyber%20activities%20in%20Coronavirus%20times\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>The coronavirus pandemic has created a gold mine for cybercriminal activities, including those sponsored by states, generating digital chaos. However, amid this chaos, a light at the end of the tunnel may be seen, involving interactions between states and society. The coronavirus pandemic has increased the online presence of people as a result of the&hellip;<\/p>\n","protected":false},"author":316,"featured_media":67674,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[227,1579,224],"tags":[1098,1237],"class_list":["post-67679","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-everyday-life","category-ftif-plattformen-governance","category-policy-and-law","tag-corona-2","tag-digitale-zukunft-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>State-sponsored cyber activities in Coronavirus times &#8211; Digital Society Blog<\/title>\n<meta name=\"description\" content=\"The coronavirus pandemic has created a gold mine for cybercriminal activities, including those sponsored by states, generating digital chaos.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"State-sponsored cyber activities in Coronavirus times &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"The coronavirus pandemic has created a gold mine for cybercriminal activities, including those sponsored by states, generating digital chaos.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-29T13:03:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-28T15:06:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/04\/frederic-koberl-x_0hW-KaCgI-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bruna Toso de Alc\u00e2ntara\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruna Toso de Alc\u00e2ntara\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"State-sponsored cyber activities in Coronavirus times &#8211; Digital Society Blog","description":"The coronavirus pandemic has created a gold mine for cybercriminal activities, including those sponsored by states, generating digital chaos.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/","og_locale":"en_US","og_type":"article","og_title":"State-sponsored cyber activities in Coronavirus times &#8211; Digital Society Blog","og_description":"The coronavirus pandemic has created a gold mine for cybercriminal activities, including those sponsored by states, generating digital chaos.","og_url":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/","og_site_name":"HIIG","article_published_time":"2020-04-29T13:03:18+00:00","article_modified_time":"2023-03-28T15:06:21+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/04\/frederic-koberl-x_0hW-KaCgI-unsplash.jpg","type":"image\/jpeg"}],"author":"Bruna Toso de Alc\u00e2ntara","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruna Toso de Alc\u00e2ntara","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/"},"author":{"name":"Bruna Toso de Alc\u00e2ntara","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/ca76c0a9a31b8635179d4f0cd642afd0"},"headline":"State-sponsored cyber activities in Coronavirus times","datePublished":"2020-04-29T13:03:18+00:00","dateModified":"2023-03-28T15:06:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/"},"wordCount":1081,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/04\/frederic-koberl-x_0hW-KaCgI-unsplash.jpg","keywords":["corona","Digitale Zukunft"],"articleSection":["Everyday Life","Ftif Platform governance","Policy and Law"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/","url":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/","name":"State-sponsored cyber activities in Coronavirus times &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/04\/frederic-koberl-x_0hW-KaCgI-unsplash.jpg","datePublished":"2020-04-29T13:03:18+00:00","dateModified":"2023-03-28T15:06:21+00:00","description":"The coronavirus pandemic has created a gold mine for cybercriminal activities, including those sponsored by states, generating digital chaos.","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/04\/frederic-koberl-x_0hW-KaCgI-unsplash.jpg","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/04\/frederic-koberl-x_0hW-KaCgI-unsplash.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/state-sponsored-cyber-activities-in-coronavirus-times\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"State-sponsored cyber activities in Coronavirus times"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/ca76c0a9a31b8635179d4f0cd642afd0","name":"Bruna Toso de Alc\u00e2ntara"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/67679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/316"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=67679"}],"version-history":[{"count":9,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/67679\/revisions"}],"predecessor-version":[{"id":74201,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/67679\/revisions\/74201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/67674"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=67679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=67679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=67679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}