{"id":1293,"date":"2021-01-13T11:38:00","date_gmt":"2021-01-13T16:38:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1293"},"modified":"2021-01-12T20:46:52","modified_gmt":"2021-01-13T01:46:52","slug":"egregor-malware-ransomware-as-a-service","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/","title":{"rendered":"Egregor Malware: Ransomware As A Service"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-businesses-worldwide-are-being-impacted-by-egregor-malware-the-first-ransomware-as-a-service-form-of-malware-doesn-t-discriminate-against-any-industry\">Businesses worldwide are being impacted by Egregor malware. The first ransomware as a service form of malware doesn&#8217;t discriminate against any industry.<\/h2>\n\n\n\n<p>We often talk about how hackers tactics continually change and how bad actors don\u2019t care how big your business is. What these threat actors care about is the information they can get their hands on, whether it\u2019s used as a stepping stone toward a bigger goal or simply to sell on the dark web, information is their form of currency. In September, the FBI first noted a new ransomware called Egregor, which appears to be the first ransomware as a service form of malware.<\/p>\n\n\n\n<p>Egregor, an occult term that signifies the collective energy or force of a group of individuals, has already been wreaking havoc on businesses worldwide. Barnes &amp; Noble, Kmart, Ubisoft and Vancouver\u2019s metro system Translink are all known victims. The variety of industries spanned here clearly indicates that the threat actors involved are not discriminating on where attacks take place. Not only that, but it is operating as a ransomware as a service model, <a href=\"https:\/\/assets.documentcloud.org\/documents\/20444693\/fbi-pin-egregor-ransomware-bc-01062021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">per the FBI<\/a>.<\/p>\n\n\n\n<p>\u201cBecause of the large number of actors involved in deploying Egregor, the tactics, techniques and procedures (TTPs) used in its deployment can vary widely, creating significant challenges for defense and mitigation,\u201d the FBI said.<\/p>\n\n\n\n<p>They also noted the ways that Egregor infiltrates networks, including how it targets employee personal accounts, phishing emails with malicious attachments or exploits for RDP or VPNs. Once they have access, they can move laterally inside networks, meaning that if they get into an employee\u2019s personal accounts and that account is accessed on a business network, then they can gain access to that network. Once on the business network, they are free to cause damage or lock systems to demand ransom.<\/p>\n\n\n\n<p>The document released by the FBI gives a summary, describes what Egregor looks like to victims, mitigation procedures and reporting information. Besides its ransomware exploits, Egregor can also exfiltrate and encrypt files on the network, as well as leave a ransom note on locked machines to leave a set of instructions for the victim to follow. The instructions often include a way to communicate with the attacker(s) via an online chat. If the victim does not pay the ransom, the malware publishes the victim\u2019s data to a public site. It has also been known for Egregor actors to use the print function on infiltrated machines to continuously print ransom notes.<\/p>\n\n\n\n<p>The FBI, or any other law enforcement agency, will tell you not to pay the ransom. Report it and let the authorities help you because paying the ransom only makes the threat actors emboldened to keep doing what they are doing. However, we have discussed in the past how sometimes the best route for a business is to pay up and pray the actors behind the malware return stolen information and unlock victimized machines. For businesses, it\u2019s a cost ratio. If it\u2019s going to cost more to report the incident by contacting the FBI than it will to pay the ransom, the business decision tells you to pay the ransom.\u00a0The threat actors behind Egregor malware know this and will take full advantage.<\/p>\n\n\n\n<p>Regardless of whether your business pays a ransom or not, it is becoming increasingly clear that <a href=\"https:\/\/www.pwvconsultants.com\/blog\/cloudflare-vulnerability-reveals-need-for-depth\/\" target=\"_blank\" rel=\"noreferrer noopener\">businesses need to change how they approach security<\/a>. Not only in how InfoSec teams do their jobs and what <a href=\"https:\/\/www.pwvconsultants.com\/blog\/infosec-budgets-consistently-fall-short\/\" target=\"_blank\" rel=\"noreferrer noopener\">budgets look like<\/a>, not just in having business leaders listen to what security teams are saying and to take action now rather than later, but also in how training is approached. So much of ransomware is deployed via phishing schemes, well-designed socially-engineered phishing schemes. You must train your employees on what to look for, to not click links in emails, to not open attachments that aren\u2019t an expected part of the business day.<\/p>\n\n\n\n<p>Cybersecurity, information security, the security of every business worldwide is dependent on its employees knowing when to raise a flag. But employees cannot raise that flag if they don\u2019t know they need to. Employees, specifically non-technical, customer-facing employees must go through cybersecurity awareness and training on a regular basis. And remember, if you aren\u2019t sure where to start or what to teach or what any training should include, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/why-hiring-an-expert-is-crucial-to-success\/\" target=\"_blank\" rel=\"noreferrer noopener\">ask an expert<\/a>! Not only can they be a resource to train your employees, but they can be that person who helps ensure your security is as tight as your internal team thinks it is.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first ransomware as a service form of malware has emerged. Egregor malware is causing problems for businesses worldwide.<\/p>\n","protected":false},"author":1,"featured_media":1302,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[4,27,26,14],"tags":[1910,31,2059,2060,1745,22,2061,21,2062,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Egregor Malware: Ransomware As A Service - PWV Consultants<\/title>\n<meta name=\"description\" content=\"The first ransomware as a service form of malware has emerged. Egregor malware is causing problems for businesses worldwide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Egregor Malware: Ransomware As A Service\" \/>\n<meta property=\"og:description\" content=\"The first ransomware as a service form of malware has emerged. Egregor malware is causing problems for businesses worldwide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-13T16:38:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-13T01:46:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Ransomware-1-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Egregor Malware: Ransomware As A Service\",\"datePublished\":\"2021-01-13T16:38:00+00:00\",\"dateModified\":\"2021-01-13T01:46:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/\"},\"wordCount\":758,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Ransomware-1-scaled.jpeg\",\"keywords\":[\"CyberSec\",\"Cybersecurity\",\"Egregor\",\"Egregor malware\",\"malware\",\"phishing\",\"ransom\",\"Ransomware\",\"Ransomware as a Service\",\"Security\"],\"articleSection\":[\"Information Security\",\"Malware\",\"Ransomware\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/\",\"name\":\"Egregor Malware: Ransomware As A Service - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Ransomware-1-scaled.jpeg\",\"datePublished\":\"2021-01-13T16:38:00+00:00\",\"dateModified\":\"2021-01-13T01:46:52+00:00\",\"description\":\"The first ransomware as a service form of malware has emerged. Egregor malware is causing problems for businesses worldwide.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Ransomware-1-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Ransomware-1-scaled.jpeg\",\"width\":2560,\"height\":1700,\"caption\":\"Ransomware - Close up of Your Files Are Encrypted on the Screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Egregor Malware: Ransomware As A Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Egregor Malware: Ransomware As A Service - PWV Consultants","description":"The first ransomware as a service form of malware has emerged. Egregor malware is causing problems for businesses worldwide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/","og_locale":"en_US","og_type":"article","og_title":"Egregor Malware: Ransomware As A Service","og_description":"The first ransomware as a service form of malware has emerged. Egregor malware is causing problems for businesses worldwide.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-01-13T16:38:00+00:00","article_modified_time":"2021-01-13T01:46:52+00:00","og_image":[{"width":2560,"height":1700,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Ransomware-1-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Egregor Malware: Ransomware As A Service","datePublished":"2021-01-13T16:38:00+00:00","dateModified":"2021-01-13T01:46:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/"},"wordCount":758,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Ransomware-1-scaled.jpeg","keywords":["CyberSec","Cybersecurity","Egregor","Egregor malware","malware","phishing","ransom","Ransomware","Ransomware as a Service","Security"],"articleSection":["Information Security","Malware","Ransomware","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/","url":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/","name":"Egregor Malware: Ransomware As A Service - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Ransomware-1-scaled.jpeg","datePublished":"2021-01-13T16:38:00+00:00","dateModified":"2021-01-13T01:46:52+00:00","description":"The first ransomware as a service form of malware has emerged. Egregor malware is causing problems for businesses worldwide.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Ransomware-1-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Ransomware-1-scaled.jpeg","width":2560,"height":1700,"caption":"Ransomware - Close up of Your Files Are Encrypted on the Screen"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/egregor-malware-ransomware-as-a-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Egregor Malware: Ransomware As A Service"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1293"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1293"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1293\/revisions"}],"predecessor-version":[{"id":1306,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1293\/revisions\/1306"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1302"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}