{"id":375,"date":"2017-01-17T12:55:46","date_gmt":"2017-01-17T12:55:46","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/ransomware-should-you-pay-up\/"},"modified":"2019-05-29T12:30:01","modified_gmt":"2019-05-29T12:30:01","slug":"ransomware-should-you-pay-up","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/","title":{"rendered":"Ransomware: Should you pay up?"},"content":{"rendered":"<p class=\"wls-paragraph\">If you\u2019re a victim of ransomware, cybercriminals will encrypt your data and documents and demand a fee for them to unlock it. Once your data is locked, you face a tough choice: whether or not to pay. If you pay, will you really get your data back anyway? Here, we look at some tips on what to do if it happens to you.<\/p>\n<h2><b>Who are you paying?<\/b><\/h2>\n<p class=\"wls-paragraph\">Is there any way to really know if your bitcoin ransom \u2013 increasingly the currency of choice for cybercriminals \u2013 will go to the person with the digital keys? What if they come back and ask you for more money? What if you pay and then they reveal they don\u2019t have the keys anyway and your data is still unusable? What if you pay and they don\u2019t get back to you at all?<\/p>\n<h2><b><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88180\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_389577148-1.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_389577148-1.jpg 640w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_389577148-1-300x192.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_389577148-1-65x42.jpg 65w\" alt=\"Businessman held to ransom\" width=\"640\" height=\"410\"><\/b><\/h2>\n<h2><b>How much are you paying<\/b>?<\/h2>\n<p class=\"wls-paragraph\">The amount of the ransom will depend on the size of your organization, how much data is affected, and how likely, historically, it is that people in a similar position have paid. Easy targets with deep pockets are likely to get higher bills; whereas those who don\u2019t pay are typically less likely to be targeted, and therefore the ransom amounts will be closer to a nuisance fee, not something that\u2019s higher than a house payment.<\/p>\n<p><span class=\"block_quote_right\">\u201cWe all can help reduce the likelihood of a payout, and defund the scammers.\u201d<\/span><\/p>\n<h2><b>How bad is the impact?<\/b><\/h2>\n<p class=\"wls-paragraph\">As revealed in our <a href=\"http:\/\/www.welivesecurity.com\/2017\/01\/05\/killdisk-now-targeting-linux-demands-250k-ransom-cant-decrypt\/\" target=\"_blank\" rel=\"noopener noreferrer\">recent blog<\/a> about the incorporation of the insidious KillDisk component into the ransomware mix, you could now not only face having your data locked, but actually getting your entire hard drive irreversibly scrambled (short of forensic recovery). If you just have one machine affected, that\u2019s certainly less of an impact than some modern ransomware attacks which lock up data across internal networks.<\/p>\n<h2><b>What is your organization\u2019s policy?<\/b><\/h2>\n<p class=\"wls-paragraph\">Increasingly, organizations are adding ransomware to the disaster recovery (DR) plans that they practice. If you don\u2019t have a DR, you may want to use some of the templates or other boilerplate documents from folks like NIST that give you some general guidelines. Luckily, there are lots of organizations that have already given it some thought and can advise on the practical steps to take&nbsp;in case it happens.<\/p>\n<h2><b><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88178\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_525066271-1.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_525066271-1.jpg 640w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_525066271-1-300x192.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_525066271-1-65x42.jpg 65w\" alt=\"Data recovery - laptop\" width=\"640\" height=\"410\"><\/b><\/h2>\n<h2><b>How good are your backups?<\/b><\/h2>\n<p class=\"wls-paragraph\">If they are close at hand, <i>offline<\/i>, and easy to restore, you can breathe a sigh of relief; you\u2019ve definitely passed the test. On the other hand, if you\u2019re restoring bulk data across the network from the cloud or a remote site, the network pipe can be a significant factor. At times, it\u2019s easier to send a courier or overnight service to retrieve a box of hard drives. Still, if you have the data in its original form and a fairly recent data set, you\u2019ll be miles ahead of those who haven\u2019t.<\/p>\n<p><span class=\"block_quote_right\">\u201cIf backups are close at hand, offline and easy to restore, you can breathe a sigh of relief.\u201d<\/span><\/p>\n<h2><b>What data is really important<\/b>?<\/h2>\n<p class=\"wls-paragraph\">If you have critical data, it should be far less easy to access, and therefore much less likely to be affected in a ransomware attack than, say, a laptop used by salespeople in the field. This means if you have a laptop that gets compromised, it may be easier to just re-image, restore your data and get on with your life.<\/p>\n<h2><b>Know how to spot a scam<\/b><\/h2>\n<p class=\"wls-paragraph\">Many ransomware campaigns use phishing emails as an entry point, and while user training makes it easier to spot these, the emails can be very convincing. For this reason, upstream email gateways, or even on the endpoint (depending on your environment) can spot rogue emails before they get a chance to act.<\/p>\n<p class=\"wls-paragraph\">As long as it\u2019s profitable, ransomware will continue to flourish. By taking these steps, we all can help reduce the likelihood of a payout, and defund the scammers. As soon as the money stops, they will too.<\/p>\n<p class=\"wls-paragraph\">Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"http:\/\/www.welivesecurity.com\/2017\/01\/17\/ransomware-should-you-pay-up\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re a victim of ransomware, cybercriminals will encrypt your data and documents and demand a fee for them to unlock it. Once your data is locked, you face a tough choice: whether or not to pay. If you pay, will you really get your data back anyway? Here, we look at some tips on<\/p>\n","protected":false},"author":5,"featured_media":1755,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[147,151,153,160],"tags":[],"class_list":["post-375","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","category-expert-opinion","category-hacking","category-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware: Should you pay up? - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: Should you pay up?\" \/>\n<meta property=\"og:description\" content=\"If you\u2019re a victim of ransomware, cybercriminals will encrypt your data and documents and demand a fee for them to unlock it. Once your data is locked, you face a tough choice: whether or not to pay. If you pay, will you really get your data back anyway? Here, we look at some tips on\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-17T12:55:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:30:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ransomware-economics-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Ransomware: Should you pay up?\",\"datePublished\":\"2017-01-17T12:55:46+00:00\",\"dateModified\":\"2019-05-29T12:30:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/\"},\"wordCount\":675,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ransomware-economics-623x410.jpg\",\"articleSection\":[\"cybercrime\",\"expert opinion\",\"hacking\",\"malware\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/\",\"name\":\"Ransomware: Should you pay up? - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ransomware-economics-623x410.jpg\",\"datePublished\":\"2017-01-17T12:55:46+00:00\",\"dateModified\":\"2019-05-29T12:30:01+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ransomware-economics-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ransomware-economics-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: Should you pay up?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/17\\\/ransomware-should-you-pay-up\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware: Should you pay up? - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware: Should you pay up?","og_description":"If you\u2019re a victim of ransomware, cybercriminals will encrypt your data and documents and demand a fee for them to unlock it. Once your data is locked, you face a tough choice: whether or not to pay. If you pay, will you really get your data back anyway? Here, we look at some tips on","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-01-17T12:55:46+00:00","article_modified_time":"2019-05-29T12:30:01+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ransomware-economics-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Ransomware: Should you pay up?","datePublished":"2017-01-17T12:55:46+00:00","dateModified":"2019-05-29T12:30:01+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/"},"wordCount":675,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ransomware-economics-623x410.jpg","articleSection":["cybercrime","expert opinion","hacking","malware"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/","name":"Ransomware: Should you pay up? - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ransomware-economics-623x410.jpg","datePublished":"2017-01-17T12:55:46+00:00","dateModified":"2019-05-29T12:30:01+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ransomware-economics-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ransomware-economics-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Ransomware: Should you pay up?"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/17\/ransomware-should-you-pay-up\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=375"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/375\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1755"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}