{"id":989649,"date":"2024-10-08T14:15:19","date_gmt":"2024-10-08T07:15:19","guid":{"rendered":"https:\/\/dbiz.vn\/?p=989649"},"modified":"2025-06-19T23:44:56","modified_gmt":"2025-06-19T16:44:56","slug":"what-is-ransomware-and-why-is-it-such-a-big-business","status":"publish","type":"post","link":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/","title":{"rendered":"What is Ransomware? And Why is it Such a Big Business?"},"content":{"rendered":"<div class=\"vgblk-rw-wrapper limit-wrapper\">\n<div class=\"post_top\">\n<p class=\"text-body\"><span style=\"color: var(--vamtam-widget-text-lighter); letter-spacing: var(--vamtam-primary-font-letter-spacing-desktop,normal); text-transform: var(--vamtam-primary-font-transform,none);\">Between Q2 2023 and Q2 2024, KELA has tracked more than 5,000 victims of ransomware and extortion actors, and the numbers are only growing year-on-year. Ransomware has become a huge business, and monetization opportunities are far broader than just the ransom demand itself.\u00a0<\/span><\/p>\n<\/div>\n<div class=\"native--content\">\n<p>Our latest eBook takes a deep dive into the business of the ransomware supply chain, looking at headline-grabbing attacks, key personas that leverage the cybercrime underground for financial gain, and best practices for protecting your own organization.\u00a0<a href=\"https:\/\/www.kelacyber.com\/resources\/guides\/the-complete-guideto-combating-ransomware\/\">Download the eBook here<\/a>, or keep reading for some choice highlights.<\/p>\n<h4>How Does Ransomware Work?<\/h4>\n<p>When we think of ransomware, we imagine the end game \u2014 where attackers encrypt data and demand a ransom for its return. In a double extortion attack, the threat actors threaten to leak the stolen data, and in a triple extortion attack, additional methods are used such as DDoS attacks or a spam campaign, usually intended to up the pressure.<\/p>\n<p>&nbsp;<\/p>\n<p>However, by the time any of these tactics become apparent to the victim, the ransomware attack is at its final stages.<\/p>\n<p>&nbsp;<\/p>\n<p>A ransomware attack begins long before an organization has any idea that they are under fire. First, attackers\u00a0<b>gather intelligence<\/b>\u00a0and conduct active reconnaissance, picking an organization that they believe may lead to a large pay-day. Attackers then need to\u00a0<b>obtain initial access\u00a0<\/b>to the victims\u2019 network<b>.<\/b>\u00a0They can do this by purchasing initial access from Initial Access Brokers (IABs) who have done the majority of the legwork, or through compromised employee accounts mostly obtained through infostealers which often infect a system via malicious links and attachments hidden in emails, social engineering, malvertising or perhaps as a result of software vulnerabilities.<\/p>\n<p>&nbsp;<\/p>\n<p>Once inside, attackers use<b>\u00a0lateral movement<\/b>\u00a0and privilege escalation to expand their reach, finding sensitive data or gaining control over endpoints. This puts them where they need to be for\u00a0<b>data exfiltration,\u00a0<\/b>which they can then leverage when they threaten to leak the data, or sell it on. Only then do attackers\u00a0<b>deploy their ransomware<\/b>, encrypting files and making them inaccessible, and establish a communication channel to<b>\u00a0demand a ransomware payment.\u00a0<\/b><\/p>\n<h4>The Evolution of Ransomware Attacks<\/h4>\n<p>Historically, a single hacker or group might have targeted an enterprise, going through all of these steps in their own silo. However, today ransomware attacks are predominantly the work of different people with different specializations, coming together to make an attack possible through the cybercrime ecosystem.<\/p>\n<p>&nbsp;<\/p>\n<p>Those who have the expertise to build the malware can focus there \u2014 while others may be hired as traffers, individuals whose role it is to spread the malware far and wide, or as negotiators, who are highly-skilled in getting ransoms paid quickly. Ransomware-as-a-Service is a growing trend, and Autoshops are also more common than ever \u2014 allowing hackers to simply \u2018click-to-buy\u2019 what they need, whether that\u2019s attack tools, initial access, or lists of credentials.<\/p>\n<p>&nbsp;<\/p>\n<p>The cybercrime ecosystem isn\u2019t only used to buy things, it\u2019s also a community of threat actors who can use it to recruit and coordinate for attacks, negotiate with victims, and share their own methodologies and support for one another.<\/p>\n<p>&nbsp;<\/p>\n<p>These changes have allowed ransomware efforts to scale beyond what anyone could have imagined, giving attackers many more opportunities to target organizations, and providing a greater chance of financial gain.<\/p>\n<h4>Where Do Criminals Find Initial Access in the Cybercrime Ecosystem?<\/h4>\n<p>&nbsp;<\/p>\n<p>In the past year compromised valid accounts (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1078\/\">MITRE ID: 1078<\/a>) and user credentials have become the\u00a0<a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\">top initial access vector<\/a>\u00a0for cyber attacks. Criminals can find<a href=\"https:\/\/www.kelacyber.com\/from-data-leaks-to-bot-led-takeovers-understanding-leaked-credentials-vs-compromised-accounts\/\">\u00a0credentials and compromised accounts<\/a>\u00a0from a combination of four main sources:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li aria-level=\"1\"><b>Botnet markets:<\/b>\u00a0These offer threat actors a list of data and logs to sift through and choose from, starting from as little as $0.50.<\/li>\n<li aria-level=\"1\"><b>Telegram cloud of logs:<\/b>\u00a0By subscribing to a monthly channel, criminals can gain access to all credentials from compromised machines.<\/li>\n<li aria-level=\"1\"><b>ULP files:\u00a0<\/b>These credential lists can often contain millions of plaintext credentials, which are usernames and passwords with a corresponding URL.<\/li>\n<li aria-level=\"1\"><b>Initial access brokers:<\/b>\u00a0IABs directly sell remote access to a compromised organization, so criminals can step in at the final stage and launch the attack.<\/li>\n<\/ul>\n<h4>Identity Security Offers Proactive Defense against Ransomware<\/h4>\n<p>Keeping a spotlight on these sources is a core part of protecting your organization against ransomware. After all, your attack surface is no longer about perimeter security \u2014 it\u2019s about knowing what the attackers know about you. By onboarding a robust identity security platform like KELA Identity Guard, you get exactly this vantage point.<\/p>\n<p>&nbsp;<\/p>\n<p>KELA Identity Guard monitors illicit dark web marketplaces, cybercrime forums, and messaging and bot marketplaces, so that any compromised credentials related to organizational domains, SaaS tools and IP addresses can be intercepted in real-time. It offers a wide range of insights into infostealer and bot-related information, including threat trends, compromised service categories, and more.<\/p>\n<p style=\"text-align: right;\">Ngu\u1ed3n: kelacyber.com<\/p>\n<\/div>\n<\/div>\n<p><!-- .vgblk-rw-wrapper --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Between Q2 2023 and Q2 2024, KELA has tracked more than 5,000 victims of ransomware and extortion actors, and the numbers are only growing year-on-year. Ransomware has become a huge business, and monetization opportunities are far broader than just the ransom demand itself.\u00a0 Our latest eBook takes a deep dive into the business of the&#8230;<\/p>\n","protected":false},"author":1,"featured_media":989651,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[102],"tags":[],"topic":[],"class_list":["post-989649","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kela-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Ransomware? And Why is it Such a Big Business? - Deliver Intelligence - Dibiz JSC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Ransomware? And Why is it Such a Big Business? - Deliver Intelligence - Dibiz JSC\" \/>\n<meta property=\"og:description\" content=\"Between Q2 2023 and Q2 2024, KELA has tracked more than 5,000 victims of ransomware and extortion actors, and the numbers are only growing year-on-year. Ransomware has become a huge business, and monetization opportunities are far broader than just the ransom demand itself.\u00a0 Our latest eBook takes a deep dive into the business of the...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Deliver Intelligence - Dibiz JSC\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-08T07:15:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-19T16:44:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/What-is-Ransomware_-1080x1080-v1-2048x2048-1-1024x1024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/dibiz.vn\/en\/#\/schema\/person\/fb609133e315e32113c0ef3ca6380b64\"},\"headline\":\"What is Ransomware? And Why is it Such a Big Business?\",\"datePublished\":\"2024-10-08T07:15:19+00:00\",\"dateModified\":\"2025-06-19T16:44:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/\"},\"wordCount\":814,\"publisher\":{\"@id\":\"https:\/\/dibiz.vn\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/What-is-Ransomware_-1080x1080-v1-2048x2048-1.png\",\"articleSection\":[\"KELA\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/\",\"url\":\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/\",\"name\":\"What is Ransomware? And Why is it Such a Big Business? - Deliver Intelligence - Dibiz JSC\",\"isPartOf\":{\"@id\":\"https:\/\/dibiz.vn\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/What-is-Ransomware_-1080x1080-v1-2048x2048-1.png\",\"datePublished\":\"2024-10-08T07:15:19+00:00\",\"dateModified\":\"2025-06-19T16:44:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#primaryimage\",\"url\":\"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/What-is-Ransomware_-1080x1080-v1-2048x2048-1.png\",\"contentUrl\":\"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/What-is-Ransomware_-1080x1080-v1-2048x2048-1.png\",\"width\":2048,\"height\":2048},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dibiz.vn\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"KELA\",\"item\":\"https:\/\/dibiz.vn\/en\/category\/kela-en\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is Ransomware? And Why is it Such a Big Business?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dibiz.vn\/en\/#website\",\"url\":\"https:\/\/dibiz.vn\/en\/\",\"name\":\"Deliver Intelligence - Dibiz JSC\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/dibiz.vn\/en\/#organization\"},\"alternateName\":\"Dibiz JSC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dibiz.vn\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dibiz.vn\/en\/#organization\",\"name\":\"Deliver Intelligence - Dibiz JSC\",\"url\":\"https:\/\/dibiz.vn\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dibiz.vn\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dibiz.vn\/wp-content\/uploads\/2023\/03\/3.png\",\"contentUrl\":\"https:\/\/dibiz.vn\/wp-content\/uploads\/2023\/03\/3.png\",\"width\":650,\"height\":300,\"caption\":\"Deliver Intelligence - Dibiz JSC\"},\"image\":{\"@id\":\"https:\/\/dibiz.vn\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dibiz.vn\/en\/#\/schema\/person\/fb609133e315e32113c0ef3ca6380b64\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dibiz.vn\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c968f2cacbe5f8e255553607e3955b14a5e360ea266a98f3572390713ab4d7b3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c968f2cacbe5f8e255553607e3955b14a5e360ea266a98f3572390713ab4d7b3?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/dbiz.vn\"],\"url\":\"https:\/\/dibiz.vn\/en\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Ransomware? And Why is it Such a Big Business? - Deliver Intelligence - Dibiz JSC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/","og_locale":"en_US","og_type":"article","og_title":"What is Ransomware? And Why is it Such a Big Business? - Deliver Intelligence - Dibiz JSC","og_description":"Between Q2 2023 and Q2 2024, KELA has tracked more than 5,000 victims of ransomware and extortion actors, and the numbers are only growing year-on-year. Ransomware has become a huge business, and monetization opportunities are far broader than just the ransom demand itself.\u00a0 Our latest eBook takes a deep dive into the business of the...","og_url":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/","og_site_name":"Deliver Intelligence - Dibiz JSC","article_published_time":"2024-10-08T07:15:19+00:00","article_modified_time":"2025-06-19T16:44:56+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/What-is-Ransomware_-1080x1080-v1-2048x2048-1-1024x1024.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#article","isPartOf":{"@id":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/"},"author":{"name":"admin","@id":"https:\/\/dibiz.vn\/en\/#\/schema\/person\/fb609133e315e32113c0ef3ca6380b64"},"headline":"What is Ransomware? And Why is it Such a Big Business?","datePublished":"2024-10-08T07:15:19+00:00","dateModified":"2025-06-19T16:44:56+00:00","mainEntityOfPage":{"@id":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/"},"wordCount":814,"publisher":{"@id":"https:\/\/dibiz.vn\/en\/#organization"},"image":{"@id":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#primaryimage"},"thumbnailUrl":"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/What-is-Ransomware_-1080x1080-v1-2048x2048-1.png","articleSection":["KELA"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/","url":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/","name":"What is Ransomware? And Why is it Such a Big Business? - Deliver Intelligence - Dibiz JSC","isPartOf":{"@id":"https:\/\/dibiz.vn\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#primaryimage"},"image":{"@id":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#primaryimage"},"thumbnailUrl":"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/What-is-Ransomware_-1080x1080-v1-2048x2048-1.png","datePublished":"2024-10-08T07:15:19+00:00","dateModified":"2025-06-19T16:44:56+00:00","breadcrumb":{"@id":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#primaryimage","url":"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/What-is-Ransomware_-1080x1080-v1-2048x2048-1.png","contentUrl":"https:\/\/dibiz.vn\/wp-content\/uploads\/2024\/10\/What-is-Ransomware_-1080x1080-v1-2048x2048-1.png","width":2048,"height":2048},{"@type":"BreadcrumbList","@id":"https:\/\/dibiz.vn\/en\/what-is-ransomware-and-why-is-it-such-a-big-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dibiz.vn\/en\/"},{"@type":"ListItem","position":2,"name":"KELA","item":"https:\/\/dibiz.vn\/en\/category\/kela-en\/"},{"@type":"ListItem","position":3,"name":"What is Ransomware? And Why is it Such a Big Business?"}]},{"@type":"WebSite","@id":"https:\/\/dibiz.vn\/en\/#website","url":"https:\/\/dibiz.vn\/en\/","name":"Deliver Intelligence - Dibiz JSC","description":"","publisher":{"@id":"https:\/\/dibiz.vn\/en\/#organization"},"alternateName":"Dibiz JSC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dibiz.vn\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dibiz.vn\/en\/#organization","name":"Deliver Intelligence - Dibiz JSC","url":"https:\/\/dibiz.vn\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dibiz.vn\/en\/#\/schema\/logo\/image\/","url":"https:\/\/dibiz.vn\/wp-content\/uploads\/2023\/03\/3.png","contentUrl":"https:\/\/dibiz.vn\/wp-content\/uploads\/2023\/03\/3.png","width":650,"height":300,"caption":"Deliver Intelligence - Dibiz JSC"},"image":{"@id":"https:\/\/dibiz.vn\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dibiz.vn\/en\/#\/schema\/person\/fb609133e315e32113c0ef3ca6380b64","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dibiz.vn\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c968f2cacbe5f8e255553607e3955b14a5e360ea266a98f3572390713ab4d7b3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c968f2cacbe5f8e255553607e3955b14a5e360ea266a98f3572390713ab4d7b3?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/dbiz.vn"],"url":"https:\/\/dibiz.vn\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/posts\/989649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/comments?post=989649"}],"version-history":[{"count":2,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/posts\/989649\/revisions"}],"predecessor-version":[{"id":989667,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/posts\/989649\/revisions\/989667"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/media\/989651"}],"wp:attachment":[{"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/media?parent=989649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/categories?post=989649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/tags?post=989649"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/dibiz.vn\/en\/wp-json\/wp\/v2\/topic?post=989649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}