{"id":43819,"date":"2015-06-08T21:01:59","date_gmt":"2015-06-09T04:01:59","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=43819"},"modified":"2025-06-02T20:12:00","modified_gmt":"2025-06-03T03:12:00","slug":"mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/","title":{"rendered":"McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge"},"content":{"rendered":"<p><em>This blog post was written by Rick Simon.<\/em><\/p>\n<p>McAfee today released the <em>McAfee Labs Threats Report: May 2015<\/em>. Along with the usual compilation of threats statistics, it focuses on three key topics:<\/p>\n<ul>\n<li>A surge in powerful and clever ransomware that encrypts files and holds them hostage until the ransom is paid.<\/li>\n<li>New Adobe Flash exploits target the growing number of vulnerabilities that have not been patched by users or enterprises.<\/li>\n<li>Persistent and virtually undetectable attacks by the Equation Group that reprogram hard disk drives and solid state drive firmware.<\/li>\n<\/ul>\n<h2><strong>The Equation Group: exploiting hard disk and solid state drive firmware<\/strong><\/h2>\n<p>In February, news broke about a rare but extremely sophisticated attack campaign. The \u201cEquation Group,\u201d named for their affinity for complex encryption schemes, is thought to be behind the attacks. The most alarming discovery is that the Equation Group\u2019s malware includes hard disk drive and solid state drive reprogramming modules. Once reprogrammed, a compromised system remains infected even if the hard drive is reformatted or the operating system is reinstalled. Further, the reprogrammed firmware and associated malware are undetectable by security software. This marks the first time in a Threats Report that McAfee Labs has examined a firmware-based attack.<\/p>\n<p>We also focus on two familiar faces\u2014ransomware and Adobe Flash exploits\u2014because McAfee Labs saw massive increases in new samples this quarter from both types of threat.<\/p>\n<h2><strong>Ransomware returns: new families emerge with a vengeance<\/strong><\/h2>\n<p>For ransomware, we attribute much of its growth to a new, hard-to-detect ransomware family\u2014<a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/rise-backdoor-fckq-ctb-locker\">CTB-Locker<\/a>\u2014and its use of an \u201caffiliate\u201d program to quickly flood the market with phishing campaigns, leading to CTB-Locker infections. With the <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/meet-tox-ransomware-for-the-rest-of-us\">newly discovered Tox malware<\/a>, an off-the-shelf application that lets users build their own ransomware, we expect ransomware to continue its meteoric rise.<\/p>\n<h2><strong>Adobe Flash: a favorite of designers and cybercriminals<\/strong><\/h2>\n<p>McAfee Labs attributes the rise in Flash exploits to the steady increase in the number of Flash vulnerabilities; user and enterprise delay in the application of software patches for those vulnerabilities; new, creative methods to exploit them; a steep increase in the number of mobile devices that can play Flash .swf files; and the difficulty of detecting Flash exploits.<\/p>\n<p>Enterprise delay in patching software was highlighted in <a href=\"http:\/\/info.nopsec.com\/2015_NS-Inbound-NS-State-of-VRM-Report_Landing_-NS-Inbound-State-of-VRM-Report.html\">a recent report from NopSec<\/a>. NopSec cross-correlated data from the <a href=\"https:\/\/nvd.nist.gov\/\">National Vulnerability Database\u2019s CVE system<\/a>, which documents known vulnerabilities, with data from their own customers\u2019 environments. They found that the <em>fastest<\/em> average time to remediation was 50 days in the case of cloud providers. For financial services providers, the average time to remediation was an astounding 176 days. Unpatched vulnerabilities represent an incredible window of opportunity for cybercriminals.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post was written by Rick Simon. McAfee today released the McAfee Labs Threats Report: May 2015. Along with&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,338,180,4140],"coauthors":[4136],"class_list":["post-43819","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-endpoint-protection","tag-malware","tag-quarterly-threats-report"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The McAfee Labs Threats Report describes a surge in ransomware, new Adobe Flash exploits, and attacks that reprogram hard disk and solid state drive firmware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The McAfee Labs Threats Report describes a surge in ransomware, new Adobe Flash exploits, and attacks that reprogram hard disk and solid state drive firmware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-09T04:01:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T03:12:00+00:00\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge\",\"datePublished\":\"2015-06-09T04:01:59+00:00\",\"dateModified\":\"2025-06-03T03:12:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/\"},\"wordCount\":446,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"computer security\",\"cybercrime\",\"endpoint protection\",\"malware\",\"Quarterly Threats Report\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/\",\"name\":\"McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2015-06-09T04:01:59+00:00\",\"dateModified\":\"2025-06-03T03:12:00+00:00\",\"description\":\"The McAfee Labs Threats Report describes a surge in ransomware, new Adobe Flash exploits, and attacks that reprogram hard disk and solid state drive firmware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"McAfee Labs Threats Report Highlights Surge in Ransomware, Flash Exploits, Firmware Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge | McAfee Blog","description":"The McAfee Labs Threats Report describes a surge in ransomware, new Adobe Flash exploits, and attacks that reprogram hard disk and solid state drive firmware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge | McAfee Blog","og_description":"The McAfee Labs Threats Report describes a surge in ransomware, new Adobe Flash exploits, and attacks that reprogram hard disk and solid state drive firmware.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-06-09T04:01:59+00:00","article_modified_time":"2025-06-03T03:12:00+00:00","author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge","datePublished":"2015-06-09T04:01:59+00:00","dateModified":"2025-06-03T03:12:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/"},"wordCount":446,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["computer security","cybercrime","endpoint protection","malware","Quarterly Threats Report"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/","name":"McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2015-06-09T04:01:59+00:00","dateModified":"2025-06-03T03:12:00+00:00","description":"The McAfee Labs Threats Report describes a surge in ransomware, new Adobe Flash exploits, and attacks that reprogram hard disk and solid state drive firmware.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-labs-threats-report-highlights-surge-in-ransomware-flash-exploits-firmware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"McAfee Labs Threats Report Highlights Surge in Ransomware, Flash Exploits, Firmware Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/43819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=43819"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/43819\/revisions"}],"predecessor-version":[{"id":214961,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/43819\/revisions\/214961"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=43819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=43819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=43819"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=43819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}