{"id":1492,"date":"2021-02-16T11:30:00","date_gmt":"2021-02-16T16:30:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1492"},"modified":"2021-02-15T19:38:14","modified_gmt":"2021-02-16T00:38:14","slug":"novel-phishing-scheme-uses-morse-code","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/","title":{"rendered":"Novel Phishing Scheme Uses Morse Code"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-threat-actors-are-masking-malicious-urls-behind-morse-code-in-attachments-the-new-phishing-scheme-is-both-targeted-and-complex\">Threat actors are masking malicious URLs behind Morse code in attachments. The new phishing scheme is both targeted and complex.<\/h2>\n\n\n\n<p>The tactics employed by threat actors <a href=\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/\" target=\"_blank\" rel=\"noreferrer noopener\">are always changing<\/a>. They are changing and evolving as law enforcement and security professionals catch up to what they are doing. It\u2019s a constant cycle, a vicious circle of cat and mouse where no one wins. It\u2019s not uncommon for hackers to put a new twist on an old trick, and this latest evolution is proof. Threat actors are now embedding Morse code into attachments as part of a phishing scheme to mask malicious URLs.<\/p>\n\n\n\n<p>Yes, you read that right, Morse code. You know, the system of dots and dashes invented by Samuel Morse in the 1800s as a way to send messages over a telegraph wire. At the time, it was incredibly innovative and helped lay the foundation for electronic communication. Which is why threat actors are now using this technology. According to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-phishing-attack-uses-morse-code-to-hide-malicious-urls\/\" target=\"_blank\" rel=\"noreferrer noopener\">BleepingComputer<\/a>, they were \u201cable to find numerous samples of the targeted attack uploaded to VirusTotal since February 2nd, 2021.<\/p>\n\n\n\n<p>The phishing attack starts with an email pretending to be an invoice for the company with a mail subject like &#8216;Revenue_payment_invoice February_Wednesday 02\/03\/2021.&#8217;<\/p>\n\n\n\n<p>This email includes an HTML attachment named in such a way as to appear to be an Excel invoice for the company. These attachments are named in the format &#8216;[company_name]_invoice_[number]._xlsx.hTML.&#8217;\u201d<\/p>\n\n\n\n<p>If you look at the attachment in a text editor, you will see where JavaScript maps letters and numbers to Morse code. From there, it gets even more complicated. The script calls a decodeMorse() function, that hexadecimal string is decoded into JavaScript tags, those tags are then injected into the HTML page. The injected scripts and HTML attachment together have the resources needed to produce a fake Excel spreadsheet with an alert that your sign-in timed out. You are then prompted to enter your password again, at which time the credentials are stolen for later use.<\/p>\n\n\n\n<p>The attack is a highly targeted, incredibly well done example of socially engineered phishing schemes. The threat actors go to great extents to make the email and attachment seem legitimate, which is why educating and training your employees on these types of emails is incredibly important. These types of attacks are increasingly common, increasingly intricate and increasingly complex. Employees must learn to recognize malicious attachments and URLs, but they cannot do that if they aren\u2019t educated about the problem.<\/p>\n\n\n\n<p>There also need to be policies and procedures around what to do if a malicious, or suspected malicious, email is detected. Employees should know where to forward the email, which phone number they should call, and have an outline of steps to take when an incident happens. You are never going to be 100% protected from cyberattacks, but the more prevention steps you can take, the better protected you\u2019ll be and the more likely you are to catch something before it gets too far.<\/p>\n\n\n\n<p>With this particular attack, it is important that Windows file extensions are enabled so that suspicious attachments are caught more quickly. If you don\u2019t know how to do that, or don\u2019t know what that means, we implore you to hire an expert. Just because it\u2019s 2021 now doesn\u2019t mean the increase in cyberattacks is going to stop. Now is not the time to let up. Protect your business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new phishing scheme that uses Morse code to mask malicious URLs was discovered. It is crucial for businesses to educate their staff.<\/p>\n","protected":false},"author":1,"featured_media":1497,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,5],"tags":[36,25,1910,31,2122,2121,538,927,2115],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Novel Phishing Scheme Uses Morse Code - PWV Consultants<\/title>\n<meta name=\"description\" content=\"A new phishing scheme that uses Morse code to mask malicious URLs was discovered. It is crucial for businesses to educate their staff.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Novel Phishing Scheme Uses Morse Code\" \/>\n<meta property=\"og:description\" content=\"A new phishing scheme that uses Morse code to mask malicious URLs was discovered. It is crucial for businesses to educate their staff.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-16T16:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-16T00:38:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/02\/Morse-Code-Masks-URLs-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1933\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Novel Phishing Scheme Uses Morse Code\",\"datePublished\":\"2021-02-16T16:30:00+00:00\",\"dateModified\":\"2021-02-16T00:38:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/\"},\"wordCount\":580,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/02\/Morse-Code-Masks-URLs-scaled.jpeg\",\"keywords\":[\"Business\",\"cyber attack\",\"CyberSec\",\"Cybersecurity\",\"malicious URL\",\"Morse Code\",\"phishing attacks\",\"phishing schemees\",\"Threat Actor\"],\"articleSection\":[\"Business\",\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/\",\"name\":\"Novel Phishing Scheme Uses Morse Code - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/02\/Morse-Code-Masks-URLs-scaled.jpeg\",\"datePublished\":\"2021-02-16T16:30:00+00:00\",\"dateModified\":\"2021-02-16T00:38:14+00:00\",\"description\":\"A new phishing scheme that uses Morse code to mask malicious URLs was discovered. It is crucial for businesses to educate their staff.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/02\/Morse-Code-Masks-URLs-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/02\/Morse-Code-Masks-URLs-scaled.jpeg\",\"width\":2560,\"height\":1933,\"caption\":\"vintage morse telegraph key with white background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Novel Phishing Scheme Uses Morse Code\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Novel Phishing Scheme Uses Morse Code - PWV Consultants","description":"A new phishing scheme that uses Morse code to mask malicious URLs was discovered. It is crucial for businesses to educate their staff.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/","og_locale":"en_US","og_type":"article","og_title":"Novel Phishing Scheme Uses Morse Code","og_description":"A new phishing scheme that uses Morse code to mask malicious URLs was discovered. It is crucial for businesses to educate their staff.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-02-16T16:30:00+00:00","article_modified_time":"2021-02-16T00:38:14+00:00","og_image":[{"width":2560,"height":1933,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/02\/Morse-Code-Masks-URLs-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Novel Phishing Scheme Uses Morse Code","datePublished":"2021-02-16T16:30:00+00:00","dateModified":"2021-02-16T00:38:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/"},"wordCount":580,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/02\/Morse-Code-Masks-URLs-scaled.jpeg","keywords":["Business","cyber attack","CyberSec","Cybersecurity","malicious URL","Morse Code","phishing attacks","phishing schemees","Threat Actor"],"articleSection":["Business","Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/","url":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/","name":"Novel Phishing Scheme Uses Morse Code - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/02\/Morse-Code-Masks-URLs-scaled.jpeg","datePublished":"2021-02-16T16:30:00+00:00","dateModified":"2021-02-16T00:38:14+00:00","description":"A new phishing scheme that uses Morse code to mask malicious URLs was discovered. It is crucial for businesses to educate their staff.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/02\/Morse-Code-Masks-URLs-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/02\/Morse-Code-Masks-URLs-scaled.jpeg","width":2560,"height":1933,"caption":"vintage morse telegraph key with white background"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/novel-phishing-scheme-uses-morse-code\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Novel Phishing Scheme Uses Morse Code"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1492"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1492"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1492\/revisions"}],"predecessor-version":[{"id":1499,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1492\/revisions\/1499"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1497"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}