{"id":868,"date":"2020-09-28T16:15:00","date_gmt":"2020-09-28T20:15:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=868"},"modified":"2020-09-28T16:11:18","modified_gmt":"2020-09-28T20:11:18","slug":"joker-malware-infiltrates-google-play-store","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/","title":{"rendered":"Joker Malware Infiltrates Google Play Store"},"content":{"rendered":"\n<p>Zscaler researchers discover malware employing WAP billing fraud. Google removes 17 apps from its Android Play Store as a result.<\/p>\n\n\n\n<p>On September 24, Zscaler announced that its researchers discovered yet another instance of the Joker (aka Bread) malware inside Google\u2019s Android Play Store. Joker has been a plague on Google\u2019s Play Store, the company calling it one of the most persistent threats it has dealt with since 2017.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/joker-playing-hide-and-seek-google-play\" target=\"_blank\" rel=\"noreferrer noopener\">Viral Gandhi, a Zscaler researcher, writes<\/a>, \u201cJoker is one of the most prominent malware families that continually targets Android devices. Despite awareness of this particular malware, it keeps finding its way into Google\u2019s official application market by employing changes in its code, execution methods, or payload-retrieving techniques. This spyware is designed to steal SMS messages, contact lists, and device information along with silently signing up the victim for premium wireless application protocol (WAP) services.\u201d<\/p>\n\n\n\n<p>The 17 apps have since been removed from the Play Store, and Google, following its own procedures, also used the Play Protect service to disable the apps on infected devices. It is still up to the user to remove the app from their device. Thankfully, the apps were just uploaded to the Play Store in September 2020 and had just 120,000 downloads, so the infected apps had not gained a foothold on the market. The list of apps from Zscalers announcement is as follows:<\/p>\n\n\n\n<ul><li>All Good PDF Scanner<\/li><li>Mint Leaf Message-Your Private Message<\/li><li>Unique Keyboard &#8211; Fancy Fonts &amp; Free Emoticons<\/li><li>Tangram App Lock<\/li><li>Direct Messenger<\/li><li>Private SMS<\/li><li>One Sentence Translator &#8211; Multifunctional Translator<\/li><li>Style Photo Collage<\/li><li>Meticulous Scanner<\/li><li>Desire Translate<\/li><li>Talent Photo Editor &#8211; Blur focus<\/li><li>Care Message<\/li><li>Part Message<\/li><li>Paper Doc Scanner<\/li><li>Blue Scanner<\/li><li>Hummingbird PDF Converter &#8211; Photo to PDF<\/li><li>All Good PDF Scanner<\/li><\/ul>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.pwvconsultants.com\/blog\/the-negative-impact-of-malware\/\" target=\"_blank\">In a recent article<\/a>, we discussed how mobile devices do not have antiviral or antimalware programs built into their systems. We mentioned how people tend to blindly trust their device download stores, assuming that apps are scanned prior to being deployed and that we are protected. We also mentioned how these stores do scan for things, but they don\u2019t scan for developers putting in a back door to later come in and steal information. That is exactly what happened with these 17 apps. The Joker malware wasn\u2019t found by Google, it was found by Zscaler\u2019s ThreatLabZ research team which has been monitoring the malware constantly.<\/p>\n\n\n\n<p>The reason Joker continues to persist in the Play Store is because, as Gandhi stated, it keeps changing code, executing methods or payload-retrieving techniques. By changing one or all three of these things, it makes the malware different enough to be missed by automated scans which are programmed to find that last version of the program, not the newest one. Hackers change their tactics on a regular basis, this is one example of how it can be done.<\/p>\n\n\n\n<p>If you have one or more of these apps on any of your devices, it should be deleted immediately. Google did remove the apps from the Play Store and render the downloaded versions inactive, but they cannot remove the actual app itself. Be sure to check reviews on apps, look at how long they\u2019ve been around and how many reviews they have. See how many downloads they have, Google the developer and see what other products they\u2019ve put on the market and what those products are doing. Always do your due diligence when downloading something new. In today\u2019s world, most of our lives are entrenched in our mobile devices. Keeping them protected and safe is one of the best ways to protect your private information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Joker malware continues to show up in Google&#8217;s Android Play Store. Last week, the company removed 17 infected apps from its store.<\/p>\n","protected":false},"author":1,"featured_media":872,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,4,27],"tags":[1837,1835,1838,1834,1745,1836,1839,1841,1840],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Joker Malware Infiltrates Google Play Store - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Joker malware continues to show up in Google&#039;s Android Play Store. Last week, the company removed 17 infected apps from its store.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Joker Malware Infiltrates Google Play Store\" \/>\n<meta property=\"og:description\" content=\"Joker malware continues to show up in Google&#039;s Android Play Store. Last week, the company removed 17 infected apps from its store.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-28T20:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-28T20:11:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/cyber-4444448_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Joker Malware Infiltrates Google Play Store\",\"datePublished\":\"2020-09-28T20:15:00+00:00\",\"dateModified\":\"2020-09-28T20:11:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/\"},\"wordCount\":606,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/cyber-4444448_1920.jpg\",\"keywords\":[\"Android\",\"bread\",\"Google\",\"joker\",\"malware\",\"mobile\",\"Play Store\",\"spyware\",\"WAP\"],\"articleSection\":[\"Cyber Security\",\"Information Security\",\"Malware\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/\",\"name\":\"Joker Malware Infiltrates Google Play Store - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/cyber-4444448_1920.jpg\",\"datePublished\":\"2020-09-28T20:15:00+00:00\",\"dateModified\":\"2020-09-28T20:11:18+00:00\",\"description\":\"Joker malware continues to show up in Google's Android Play Store. Last week, the company removed 17 infected apps from its store.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/cyber-4444448_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/cyber-4444448_1920.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Image by Gerd Altmann from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Joker Malware Infiltrates Google Play Store\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Joker Malware Infiltrates Google Play Store - PWV Consultants","description":"Joker malware continues to show up in Google's Android Play Store. Last week, the company removed 17 infected apps from its store.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/","og_locale":"en_US","og_type":"article","og_title":"Joker Malware Infiltrates Google Play Store","og_description":"Joker malware continues to show up in Google's Android Play Store. Last week, the company removed 17 infected apps from its store.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-09-28T20:15:00+00:00","article_modified_time":"2020-09-28T20:11:18+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/cyber-4444448_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Joker Malware Infiltrates Google Play Store","datePublished":"2020-09-28T20:15:00+00:00","dateModified":"2020-09-28T20:11:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/"},"wordCount":606,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/cyber-4444448_1920.jpg","keywords":["Android","bread","Google","joker","malware","mobile","Play Store","spyware","WAP"],"articleSection":["Cyber Security","Information Security","Malware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/","url":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/","name":"Joker Malware Infiltrates Google Play Store - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/cyber-4444448_1920.jpg","datePublished":"2020-09-28T20:15:00+00:00","dateModified":"2020-09-28T20:11:18+00:00","description":"Joker malware continues to show up in Google's Android Play Store. Last week, the company removed 17 infected apps from its store.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/cyber-4444448_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/cyber-4444448_1920.jpg","width":1920,"height":1280,"caption":"Image by Gerd Altmann from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-infiltrates-google-play-store\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Joker Malware Infiltrates Google Play Store"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/868"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=868"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/868\/revisions"}],"predecessor-version":[{"id":873,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/868\/revisions\/873"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/872"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}