{"id":262,"date":"2019-05-17T13:43:24","date_gmt":"2019-05-17T12:43:24","guid":{"rendered":"http:\/\/18.191.143.171\/wordpress\/?p=262"},"modified":"2022-11-07T15:38:22","modified_gmt":"2022-11-07T15:38:22","slug":"10-of-the-most-terrifying-horror-stories-in-cyber-history","status":"publish","type":"post","link":"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/","title":{"rendered":"10 Of The Most Terrifying Horror Stories In Cyber History"},"content":{"rendered":"

For decades, cyber attacks have been taking down businesses and causing disruption of catastrophic proportions. In the true spirit of Halloween, we share with you some of the most gruesome\u2026<\/b><\/p>\n

1 – MafiaBoy DDoS Attacks<\/h3>\n

In 2000, Michael Calce under the name MafiaBoy caused $1 billion dollars in damages by unleashing a DDoS attack on a number of high profile commercial websites including Amazon, CNN, eBay and Yahoo! At the time, Yahoo! was a multibillion-dollar web company and the top search engine. Mafiaboy\u2019s Rivolta managed to shut down Yahoo! for almost an hour. Today, Calce is a white hat hacker. Companies hire him to help identify security flaws in their systems and design better security features. He says the internet is a far scarier place today than it was back in 2000. For one, there is more and more at stake as we rely ever more on online systems for our daily lives.<\/p>\n

2 – Melissa Targets Microsoft Word<\/h3>\n

The Melissa virus in 1999 targeted Microsoft Word, it was an e-mail attachment that would once open, forward the virus onto the first 50 users on Microsoft Outlook by Office\u2019s native share function. This virus shut down multiple e-mail servers due to the wide spread attack, it cost $80 million in damages due to the virus acting like a Denial of Service attack to e-mail clients. Many people in the IT industry said that the situation could have been much worse, as what the virus really did was email itself. The Virus has multiple Simpson\u2019s jokes hidden inside it.<\/p>\n

3 – WannaCry Ransomware Attacks<\/h3>\n

WannaCry was a ransomware<\/a> attack in 2017 that had widespread success, hacking into organisations from the NHS to Telefonica and FedEx. It uses the EternalBlue exploit the US National Security Agency reportedly found, in order to do its damage. It asked the user to pay fee of $300 in BitCoin to unlock the files. The ransom note indicated that the payment amount would be doubled after three days. If payment was not made after seven days it claimed the encrypted files would be deleted. It\u2019s estimated that WannaCry caused $4 billion in damages so far and earned up to $49,000 through BitCoin so far.<\/p>\n

4 – TalkTalk’s Data Breach<\/h3>\n

The TalkTalk hack in 2015 was sparked off by a 17 year old boy and performed by two friends Matthew Hanley, 22, and Connor Allsopp, 20. The data breach was severe with customer sort codes and account numbers being made available. The firm said 4% of TalkTalk customers have sensitive data at risk. The attack cost the company \u00a342 million and further had to pay \u00a3400,000 as they failed to have a secure system in place to avoid customer data breach.<\/p>\n

5 – Ashley Madison Hit by The Impact Team<\/h3>\n

In July 2015, \u201cThe Impact Team\u201d stole user data of Ashley Madison, a commercial website billed as enabling extramarital affairs. On 18 and 20 August, the group leaked more than 25 gigabytes of company data, including user details. The site\u2019s policy of not deleting users\u2019 personal information caused distress to many users as they feared being publicly shamed. This was the largest security breach of Consumer information in history. Impact Team wanted the owners of Ashley Madison (Avid Life Media) to remove the site due to the sites nature of encouraging affairs.<\/p>\n

6 – NetSky and Sasser Worms<\/h3>\n

In 2004, Sven Jaschan developed and released two damaging worms called NetSky and Sasser. At the time, they were responsible for over 25% of all virus reports in the first half of 2005. Sasser instead of attacking computer\u2019s by e-mail, would use a script to forward to an at risk computer and instruct it to download the script. Forwarding on and on. The system would also be difficult to shut down without unplugging manually. NetSky utilised e-mail to send files that would cause a Denial of Service attack as systems would collapse while trying to handle the data and traffic. These viruses caused over 20 billion dollars in damages.<\/p>\n

7 – Sony’s Playstation Network Hacked by Anonymous<\/h3>\n

Sony suffered a massive blow to its Playstation Network in April 2011 after it was hacked by Anonymous via DDoS attacks. They attacked again on the 21st April 2011, and Sony kept the Network offline for 3 whole weeks. They were quiet about the reason for 5 whole days, when they announced that 77 million users personal information was compromised. Sony couldn\u2019t rule out the possibility that Credit Card data was taken either. After apologising and reimbursing customers with free games, subscriptions and anti-fraud protection, Sony was left with a loss of \u00a3171 million.<\/p>\n

8 – Soviet Pipeline hit by Logic Bomb<\/h3>\n

Prior to the internet, computers were being used for coding and creating different software. This was the case for a Canadian pipeline company in 1982. The CIA suspected the KGB might steal the software so they planted a logic bomb in the code, and a few months later, the Soviet pipeline exploded producing the most monumental non-nuclear explosion and fire ever seen from space. This is an instance of a Trojan horse before the widespread use of this method of virus occurred in the Personal Computing industry. Due to this attack, they only trust IBM an American manufacturer of computer chips to develop them.<\/p>\n

9 – 130 Million Records Stolen from TJX Hack<\/h3>\n

Albert Gonzalez was sentenced to 20 years in prison after hacking TJX the parent company of TJ Maxx (TK Maxx in the UK). He obtained 130 million records of personal information, including credit card information. He utilised backdoors on several systems to obtain the information. Once arrested the police seized multiple items he paid for with the information, such as $1.6 million ($1.1 million of which was in plastic bags buried in a three foot drum under his parents backyard.), multiple top of the range laptops, and a compact Glock pistol.<\/p>\n

10 – Shamoon hit by Cutting Swords of Justice<\/h3>\n

The Shamoon virus targeted computers and workstations of energy suppliers. It was developed in 2012 by a hacker group by the name \u201cCutting Swords of Justice\u201d with the aim of destabilising the Saudi Amarco Company. They were successful and managed to infect more than 30,000 workstations, this prevented machines from connecting to the network that gave workstations access of communicating with each other and the web. The virus even infected Qatari RasGas Company and LNG Company.<\/p>\n

 <\/p>\n

All of these were big and newsworthy cyber attacks, but thousands of smaller attacks, both in scale and target, happen every day. If you want to find out more about how to protect yourself, get in touch with cybersecurity specialists<\/a> Adarma today.<\/p>\n

References:<\/strong><\/p>\n

1. a) https:\/\/en.wikipedia.org\/wiki\/MafiaBoy <\/a> & Davis, Wall. Crime and the Internet. New York: Routledge, 2001.<\/p>\n

2. a) http:\/\/www.pandasecurity.com\/mediacenter\/malware\/most-famous-virus-history-melissa\/<\/a><\/p>\n

2. b) https:\/\/nakedsecurity.sophos.com\/2009\/03\/26\/memories-melissa-virus\/<\/a><\/p>\n

3. a) https:\/\/www.symantec.com\/connect\/blogs\/wannacry-3<\/a><\/p>\n

3. b) http:\/\/uk.businessinsider.com\/wannacry-ransomware-attack-49000-3-bitcoin-wallets-2017-5<\/a><\/p>\n

4. a) http:\/\/www.bbc.co.uk\/news\/business-34743185<\/a><\/p>\n

5. a) http:\/\/www.ibtimes.co.uk\/ashley-madison-hack-who-are-impact-team-why-did-they-leak-website-data-will-they-be-caught-1516328<\/a><\/p>\n

5. b) https:\/\/www.reddit.com\/r\/AnythingGoesNews\/comments\/3h71ar\/we_are_the_impact_team_we_are_releasing_the\/<\/a><\/p>\n

6. a) https:\/\/www.sophos.com\/en-us\/press-office\/press-releases\/2005\/07\/va_sasserfree.aspx<\/a><\/p>\n

6. b) http:\/\/virus.wikia.com\/wiki\/Sasser<\/a><\/p>\n

6. c) http:\/\/virus.wikia.com\/wiki\/Netsky<\/a><\/p>\n

7. a) http:\/\/www.eurogamer.net\/articles\/2016-04-26-sony-admitted-the-great-psn-hack-five-years-ago-today<\/a><\/p>\n

7. b) https:\/\/www.theregister.co.uk\/2011\/05\/24\/sony_playstation_breach_costs\/<\/a><\/p>\n

8. a) http:\/\/www.telegraph.co.uk\/news\/worldnews\/northamerica\/usa\/1455559\/CIA-plot-led-to-huge-blast-in-Siberian-gas-pipeline.html<\/a><\/p>\n

8. b) http:\/\/www.nytimes.com\/2009\/10\/27\/science\/27trojan.html?_r=1&ref=science&pagewanted=all<\/a><\/p>\n

9. a) http:\/\/www.cbsnews.com\/news\/soupnazi-with-1m-buried-in-backyard-pleads-guilty-to-biggest-hack-in-us-history\/<\/a><\/p>\n

9. b) http:\/\/www.nydailynews.com\/news\/world\/soupnazi-hacker-albert-gonzalez-nerdy-life-sex-guns-drugs-article-1.394977<\/a><\/p>\n

10. a) http:\/\/www.nytimes.com\/2012\/12\/10\/business\/global\/saudi-aramco-says-hackers-took-aim-at-its-production.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

For decades, cyber attacks have been taking down businesses and causing disruption of catastrophic proportions. In the true spirit of Halloween, we share with you some of the most gruesome\u2026 1 – MafiaBoy DDoS Attacks In 2000, Michael Calce under the name MafiaBoy caused $1 billion dollars in damages by unleashing a DDoS attack on […]<\/p>\n","protected":false},"author":1,"featured_media":624,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[196],"tags":[],"acf":[],"yoast_head":"\n10 Of The Most Terrifying Horror Stories In Cyber History - Adarma<\/title>\n<meta name=\"description\" content=\"Read up on 10 of the most terrifying horror stories in the history of cybersecurity. Worms, DDoS attacks and hacks against some of the worlds largest companies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Of The Most Terrifying Horror Stories In Cyber History\" \/>\n<meta property=\"og:description\" content=\"Read up on 10 of the most terrifying horror stories in the history of cybersecurity. Worms, DDoS attacks and hacks against some of the worlds largest companies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/\" \/>\n<meta property=\"og:site_name\" content=\"Adarma\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-17T12:43:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-07T15:38:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/adarma.wpengine.com\/wp-content\/uploads\/2019\/05\/nhu-nguyen-785023-unsplash-scaled-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"pnpd-admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@adarma_security\" \/>\n<meta name=\"twitter:site\" content=\"@adarma_security\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pnpd-admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/\"},\"author\":{\"name\":\"pnpd-admin\",\"@id\":\"https:\/\/adarma.wpengine.com\/#\/schema\/person\/ef0653c33d69815507d6cc37594e33dc\"},\"headline\":\"10 Of The Most Terrifying Horror Stories In Cyber History\",\"datePublished\":\"2019-05-17T12:43:24+00:00\",\"dateModified\":\"2022-11-07T15:38:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/\"},\"wordCount\":1257,\"publisher\":{\"@id\":\"https:\/\/adarma.wpengine.com\/#organization\"},\"articleSection\":[\"News\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/\",\"url\":\"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/\",\"name\":\"10 Of The Most Terrifying Horror Stories In Cyber History - Adarma\",\"isPartOf\":{\"@id\":\"https:\/\/adarma.wpengine.com\/#website\"},\"datePublished\":\"2019-05-17T12:43:24+00:00\",\"dateModified\":\"2022-11-07T15:38:22+00:00\",\"description\":\"Read up on 10 of the most terrifying horror stories in the history of cybersecurity. Worms, DDoS attacks and hacks against some of the worlds largest companies.\",\"breadcrumb\":{\"@id\":\"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/adarma.wpengine.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Of The Most Terrifying Horror Stories In Cyber History\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/adarma.wpengine.com\/#website\",\"url\":\"https:\/\/adarma.wpengine.com\/\",\"name\":\"Adarma\",\"description\":\"Cybersecurity Services Tailored to Your Needs\",\"publisher\":{\"@id\":\"https:\/\/adarma.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/adarma.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/adarma.wpengine.com\/#organization\",\"name\":\"Adarma\",\"url\":\"https:\/\/adarma.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/adarma.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/adarma.wpengine.com\/wp-content\/uploads\/2021\/09\/Logo-Dark.svg\",\"contentUrl\":\"https:\/\/adarma.wpengine.com\/wp-content\/uploads\/2021\/09\/Logo-Dark.svg\",\"width\":1,\"height\":1,\"caption\":\"Adarma\"},\"image\":{\"@id\":\"https:\/\/adarma.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/adarma_security\",\"https:\/\/www.linkedin.com\/company\/adarma-security\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/adarma.wpengine.com\/#\/schema\/person\/ef0653c33d69815507d6cc37594e33dc\",\"name\":\"pnpd-admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/adarma.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8db9b99d79fb7b848980de57cb219c57?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8db9b99d79fb7b848980de57cb219c57?s=96&d=mm&r=g\",\"caption\":\"pnpd-admin\"},\"sameAs\":[\"https:\/\/adarma.wpengine.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"10 Of The Most Terrifying Horror Stories In Cyber History - Adarma","description":"Read up on 10 of the most terrifying horror stories in the history of cybersecurity. Worms, DDoS attacks and hacks against some of the worlds largest companies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/","og_locale":"en_GB","og_type":"article","og_title":"10 Of The Most Terrifying Horror Stories In Cyber History","og_description":"Read up on 10 of the most terrifying horror stories in the history of cybersecurity. Worms, DDoS attacks and hacks against some of the worlds largest companies.","og_url":"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/","og_site_name":"Adarma","article_published_time":"2019-05-17T12:43:24+00:00","article_modified_time":"2022-11-07T15:38:22+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/adarma.wpengine.com\/wp-content\/uploads\/2019\/05\/nhu-nguyen-785023-unsplash-scaled-2.jpg","type":"image\/jpeg"}],"author":"pnpd-admin","twitter_card":"summary_large_image","twitter_creator":"@adarma_security","twitter_site":"@adarma_security","twitter_misc":{"Written by":"pnpd-admin","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/#article","isPartOf":{"@id":"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/"},"author":{"name":"pnpd-admin","@id":"https:\/\/adarma.wpengine.com\/#\/schema\/person\/ef0653c33d69815507d6cc37594e33dc"},"headline":"10 Of The Most Terrifying Horror Stories In Cyber History","datePublished":"2019-05-17T12:43:24+00:00","dateModified":"2022-11-07T15:38:22+00:00","mainEntityOfPage":{"@id":"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/"},"wordCount":1257,"publisher":{"@id":"https:\/\/adarma.wpengine.com\/#organization"},"articleSection":["News"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/","url":"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/","name":"10 Of The Most Terrifying Horror Stories In Cyber History - Adarma","isPartOf":{"@id":"https:\/\/adarma.wpengine.com\/#website"},"datePublished":"2019-05-17T12:43:24+00:00","dateModified":"2022-11-07T15:38:22+00:00","description":"Read up on 10 of the most terrifying horror stories in the history of cybersecurity. Worms, DDoS attacks and hacks against some of the worlds largest companies.","breadcrumb":{"@id":"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/adarma.wpengine.com\/10-of-the-most-terrifying-horror-stories-in-cyber-history\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/adarma.wpengine.com\/"},{"@type":"ListItem","position":2,"name":"10 Of The Most Terrifying Horror Stories In Cyber History"}]},{"@type":"WebSite","@id":"https:\/\/adarma.wpengine.com\/#website","url":"https:\/\/adarma.wpengine.com\/","name":"Adarma","description":"Cybersecurity Services Tailored to Your Needs","publisher":{"@id":"https:\/\/adarma.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adarma.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/adarma.wpengine.com\/#organization","name":"Adarma","url":"https:\/\/adarma.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/adarma.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/adarma.wpengine.com\/wp-content\/uploads\/2021\/09\/Logo-Dark.svg","contentUrl":"https:\/\/adarma.wpengine.com\/wp-content\/uploads\/2021\/09\/Logo-Dark.svg","width":1,"height":1,"caption":"Adarma"},"image":{"@id":"https:\/\/adarma.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/adarma_security","https:\/\/www.linkedin.com\/company\/adarma-security\/"]},{"@type":"Person","@id":"https:\/\/adarma.wpengine.com\/#\/schema\/person\/ef0653c33d69815507d6cc37594e33dc","name":"pnpd-admin","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/adarma.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8db9b99d79fb7b848980de57cb219c57?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8db9b99d79fb7b848980de57cb219c57?s=96&d=mm&r=g","caption":"pnpd-admin"},"sameAs":["https:\/\/adarma.wpengine.com"]}]}},"_links":{"self":[{"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/posts\/262"}],"collection":[{"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/comments?post=262"}],"version-history":[{"count":0,"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/posts\/262\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/media\/624"}],"wp:attachment":[{"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/media?parent=262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/categories?post=262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/tags?post=262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}