{"id":19608,"date":"2022-11-22T09:18:54","date_gmt":"2022-11-22T12:18:54","guid":{"rendered":"https:\/\/ostec.blog\/?p=19608"},"modified":"2022-11-22T09:18:54","modified_gmt":"2022-11-22T12:18:54","slug":"botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/","title":{"rendered":"Botnet Emotet utiliza la t\u00e9cnica de ataque con un solo clic"},"content":{"rendered":"<p>Conocida por sus trucos y t\u00e1cticas innovadoras, la <a href=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/botnet-redes-de-cibercriminales\/\">botnet<\/a> Emotet vuelve a estar en auge con una nueva t\u00e9cnica de ataque con un solo clic que aprovecha los archivos RAR de desbloqueo autom\u00e1tico. <\/p>\n<p>Los investigadores de la firma de ciberseguridad Trustwave han identificado un aumento en las amenazas empaquetadas en archivos ZIP protegidos con contrase\u00f1a. <a href=\"https:\/\/ostec.blog\/es\/generico\/la-botnet-emotet-esta-de-regreso\/\">Emotet <\/a>es uno de los mayores distribuidores de estos paquetes maliciosos y entrega alrededor del 96 % de los paquetes mediante un truco innovador.<\/p>\n<p>En la \u00faltima ola de ataques, los atacantes est\u00e1n utilizando cebos de phishing con temas de facturas con archivos protegidos con contrase\u00f1a.Na \u00faltima onda de ataques, os invasores est\u00e3o usando iscas de <a href=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/phishing-todo-lo-que-necesitas-saber\/\">phishing <\/a>com temas de fatura com arquivos protegidos por senha. <\/p>\n<p>Estos archivos contienen un archivo autoextra\u00edble anidado (SFX) que puede actuar como un canal para iniciar el segundo. Estos archivos solo requieren un clic y no se requiere ingresar una contrase\u00f1a para comprometer un objetivo. <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emo-1.png\" alt=\"botnet emotet\" \/><br \/>\nFuente: TrustWave.<\/p>\n<p>Se ha observado que uno de estos archivos SFX usa un \u00edcono de PDF o Excel para parecer leg\u00edtimo y contiene componentes como un archivo por lotes, un archivo RARsfx e im\u00e1genes o un archivo PDF.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emo-2.png\" alt=\"botnet emotet\" \/><br \/>\nFuente: TrustWave.<\/p>\n<h2>Detalles de la carga \u00fatil<\/h2>\n<p>Seg\u00fan los expertos, las cargas \u00fatiles observadas en esta campa\u00f1a son CoinMiner y Qasar RAT.<\/p>\n<p>CoinMiner es un malware que utiliza los recursos de los sistemas infectados para extraer criptomonedas. El malware tambi\u00e9n puede robar las credenciales de los usuarios y recopilar informaci\u00f3n del dispositivo, incluidas las especificaciones de hardware y software.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emo-3.png\" alt=\"botnet emotet\" \/><br \/>\nFuente: TrustWave.<\/p>\n<p>La otra carga \u00fatil, Qasar RAT, es un troyano de c\u00f3digo abierto basado en .NET con funciones potentes. Qasar est\u00e1 disponible p\u00fablicamente en GitHub.<\/p>\n<p>Adoptar esta t\u00e1ctica de utilizar archivos protegidos con contrase\u00f1a y la funci\u00f3n de extracci\u00f3n autom\u00e1tica de Emotet es una clara se\u00f1al de alerta para los usuarios finales y los profesionales de la ciberseguridad.<\/p>\n<p>Esta nueva t\u00e1ctica de ataque permite a los actores de amenazas ejecutar una multitud de ataques, como robo de cifrado, robo de datos, ransomware y m\u00e1s.<\/p>\n<p>Fuente: <a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/archive-sidestepping-self-unlocking-password-protected-rar\/\">TrustWave<\/a>, <a href=\"https:\/\/thehackernews.com\/2022\/10\/emotet-botnet-distributing-self.html?m=1\">TheHackerNews<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conocida por sus trucos y t\u00e1cticas innovadoras, la botnet Emotet vuelve a estar en auge con una nueva t\u00e9cnica de ataque con un solo clic que aprovecha los archivos RAR de desbloqueo autom\u00e1tico. Los investigadores de la firma de ciberseguridad Trustwave han identificado un aumento en las amenazas empaquetadas en archivos ZIP protegidos con contrase\u00f1a. [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":19598,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1019,1025],"tags":[],"class_list":["post-19608","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generico","category-noticias-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Botnet Emotet utiliza la t\u00e9cnica de ataque con un solo clic - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Botnet Emotet utiliza la t\u00e9cnica de ataque con un solo clic - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"Conocida por sus trucos y t\u00e1cticas innovadoras, la botnet Emotet vuelve a estar en auge con una nueva t\u00e9cnica de ataque con un solo clic que aprovecha los archivos RAR de desbloqueo autom\u00e1tico. Los investigadores de la firma de ciberseguridad Trustwave han identificado un aumento en las amenazas empaquetadas en archivos ZIP protegidos con contrase\u00f1a. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-22T12:18:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emotet.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alejandra Villanueva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/\"},\"author\":{\"name\":\"Alejandra Villanueva\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\"},\"headline\":\"Botnet Emotet utiliza la t\u00e9cnica de ataque con un solo clic\",\"datePublished\":\"2022-11-22T12:18:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/\"},\"wordCount\":377,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emotet.jpg\",\"articleSection\":[\"Gen\u00e9rico\",\"Not\u00edcias\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/\",\"url\":\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/\",\"name\":\"Botnet Emotet utiliza la t\u00e9cnica de ataque con un solo clic - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emotet.jpg\",\"datePublished\":\"2022-11-22T12:18:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emotet.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emotet.jpg\",\"width\":928,\"height\":534,\"caption\":\"botnet emotet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Botnet Emotet utiliza la t\u00e9cnica de ataque con un solo clic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\",\"name\":\"Alejandra Villanueva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"caption\":\"Alejandra Villanueva\"},\"sameAs\":[\"https:\/\/www.ostec.com.br\"],\"url\":\"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Botnet Emotet utiliza la t\u00e9cnica de ataque con un solo clic - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/","og_locale":"es_ES","og_type":"article","og_title":"Botnet Emotet utiliza la t\u00e9cnica de ataque con un solo clic - OSTEC | Seguran\u00e7a digital de resultados","og_description":"Conocida por sus trucos y t\u00e1cticas innovadoras, la botnet Emotet vuelve a estar en auge con una nueva t\u00e9cnica de ataque con un solo clic que aprovecha los archivos RAR de desbloqueo autom\u00e1tico. Los investigadores de la firma de ciberseguridad Trustwave han identificado un aumento en las amenazas empaquetadas en archivos ZIP protegidos con contrase\u00f1a. [&hellip;]","og_url":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2022-11-22T12:18:54+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emotet.jpg","type":"image\/jpeg"}],"author":"Alejandra Villanueva","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/"},"author":{"name":"Alejandra Villanueva","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c"},"headline":"Botnet Emotet utiliza la t\u00e9cnica de ataque con un solo clic","datePublished":"2022-11-22T12:18:54+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/"},"wordCount":377,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emotet.jpg","articleSection":["Gen\u00e9rico","Not\u00edcias"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/","url":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/","name":"Botnet Emotet utiliza la t\u00e9cnica de ataque con un solo clic - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emotet.jpg","datePublished":"2022-11-22T12:18:54+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emotet.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/11\/bot-emotet.jpg","width":928,"height":534,"caption":"botnet emotet"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/generico\/botnet-emotet-utiliza-la-tecnica-de-ataque-con-un-solo-clic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"Botnet Emotet utiliza la t\u00e9cnica de ataque con un solo clic"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c","name":"Alejandra Villanueva","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","caption":"Alejandra Villanueva"},"sameAs":["https:\/\/www.ostec.com.br"],"url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/19608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=19608"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/19608\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/19598"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=19608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=19608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=19608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}