{"id":127178,"date":"2023-03-03T05:51:17","date_gmt":"2023-03-03T05:51:17","guid":{"rendered":"https:\/\/www.stellarinfo.com\/blog\/?p=127178"},"modified":"2023-03-15T08:08:40","modified_gmt":"2023-03-15T08:08:40","slug":"esxiargs-ransomware-attacks-vmware-virtual-machines","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/","title":{"rendered":"A New Variant of ESXiArgs Ransomware attacks VMware ESXi Virtual Machines"},"content":{"rendered":"<?xml encoding=\"utf-8\" ?><?xml encoding=\"utf-8\" ?><p>Recently, a new variant of ransomware, called ESXIArgs, came to light which has reportedly attacked nearly 500 hosts of VMware ESXi virtual machines across the globe. Most of the victims are from European countries, including France, Germany, Netherlands, UK, and Ukraine.<\/p><p>The latest ESXiArgs ransomware attack follows an encryption routine, which skips the small piece (1 MB) of the data and encrypts the next 1 MB. This ensures that all the files larger than 128 MB get 50% encrypted.<\/p><p>The ransomware encrypts the files with .vmdk, .vmsd, .vmdk, and .vmsd extensions on compromised ESXi servers and creates an .args file for every encrypted file with the metadata. ESXiArgs ransomware is based on the <a href=\"https:\/\/github.com\/Hildaboo\/BabukRansomwareSourceCode\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Babuk source code<\/a>, previously used by other ESXi ransomware, like CheersCrypt and Dagon group&rsquo;s PrideLocker encryptor.<\/p><p>The cybersecurity agencies reported that the attackers have been exploiting the vulnerabilities in VMware&rsquo;s bare metal hypervisor ESXi, like CVE-2022-31696, CVE-2022-31697, CVE-2022-31698, and CVE-2022-31699. VMware also confirmed on 6 February 2023 in an advisory that this attack is exploiting the ESXi flaws.<\/p><p>The first set of ESXiArgs ransomware attacks dates back to October 12, 2022. It followed the encryption routine skipping the large chunks of data on the basis of their size. It targeted the end-of-life ESXi servers 6.5 and 6.7 versions. Around 3800 VMware ESXi virtual machines globally became the victim of the <strong>ESXiArgs <\/strong>ransomware attack.<\/p><h2 class=\"wp-block-heading\" id=\"how-to-recover-virtual-machine-after-esxiargs-ransomware-attack?\"><strong>How to Recover Virtual Machine after ESXiArgs Ransomware Attack?<\/strong><\/h2><p>The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) jointly approached the rescue victims. They released the &lsquo;<a href=\"https:\/\/github.com\/cisagov\/ESXiArgs-Recover\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>ESXiArgs-Recover&rsquo;<\/strong><\/a> tool to overcome the damage done by the ransomware. The tool is intended to help organizations to attempt recovery of virtual machines affected by ESXiArgs ransomware attacks.<\/p><p>However, two ransom notes were updated on the hosts on 31 January 2023, after a few days of the CISA recovery script tool release. The new variant consists of ransom notes matching the one used in the previous attacks with a few differences, such as the use of an Onion URL, a Proton mail address at the end of the note, and less ransom demand.<\/p><p>The recently attacked VMware ESXi virtual machines can&rsquo;t take benefit from the recovery tool released by CISA as the new version of the attack encrypts more data than the tool is built to restore.<\/p><p>Some victims have reported that the SLP network was disabled, which turned out to be a solution for the vulnerability as per VMware. VMware also released some recommendations on its <a href=\"https:\/\/blogs.vmware.com\/security\/2023\/02\/83330.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">security<\/a> blog.<\/p><p>To protect the servers from such ransomware attacks, the company advises that it&rsquo;s best to install updates for ESXiArgs servers and disable OpenSLP service (disabled since 2021) in ESXi. ESXi 7.0 U2c and newer, and ESXi 8.0 GA and newer versions.<\/p><p>Additionally, keep virtual machine data recovery software such as Stellar Data Recovery for Virtual Machines in hand. It is the best DIY tool that helps you recover lost and deleted data from VMware (.vmdk), ORACLE (.vdi), and Microsoft (.vhd) virtual image files. The software supports data recovery from virtual machines in case of formatting and corruption. It comes with a simple user interface that facilitates the recovery of data within a few steps.<\/p><h2 class=\"wp-block-heading\" id=\"faqs\"><strong>FAQs<\/strong><\/h2><p><strong>1. What are the two main types of ransomware?<\/strong><\/p><p>There are innumerable strains of ransomware and almost all of them could cost you a big time. However, the primary ones fall into two categories:<\/p><p>(i) Crypto Ransomware: Crypto ransomware enables threat actors to encrypt the data on the system, including documents, files, and more.<\/p><p>(ii) Locker Ransomware: Locker Ransomware locks the victims out of their system and demands a ransom to unlock the device.<\/p><p><strong>2. Can ransomware viruses be removed?<\/strong><\/p><p>You can remove the malicious files and attachments downloaded on your system manually or automatically with the help of powerful antivirus software. You can also use an appropriate decryption tool to regain access to your data. <a href=\"https:\/\/www.kaspersky.com\/resource-center\/preemptive-safety\/ransomware-removal\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Read more<\/a>&hellip;<\/p><p><strong>3. What is the best way to protect a PC against ransomware?<\/strong><\/p><p>Here are some best practices you can follow to <a href=\"https:\/\/www.stellarinfo.com\/article\/PC-protection-against-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">protect your PC against ransomware<\/a> attacks:<\/p><ul class=\"wp-block-list\">\n<li>Keep your PC updated with recommended security patches<\/li>\n\n\n\n<li>Be cautious while opening email attachments<\/li>\n\n\n\n<li>Access websites with security marks and keep personal information safe<\/li>\n\n\n\n<li>Keep antivirus on and updated<\/li>\n<\/ul><p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, a new variant of ransomware, called ESXIArgs, came to light which&hellip; <a class=\"more-link\" href=\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/\">Continue reading <span class=\"screen-reader-text\">A New Variant of ESXiArgs Ransomware attacks VMware ESXi Virtual Machines<\/span><\/a><\/p>\n","protected":false},"author":37,"featured_media":127182,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2351,1],"tags":[207],"class_list":["post-127178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-learning-with-stellar","category-uncategorized","tag-data-recovery-software","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ESXiArgs Ransomare Attack on VMware Machines<\/title>\n<meta name=\"description\" content=\"A new variant of ESXiArgs ransomware has recently targeted over 500 hosts of VMware ESXi virtual machines.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESXiArgs Ransomare Attack on VMware Machines\" \/>\n<meta property=\"og:description\" content=\"A new variant of ESXiArgs ransomware has recently targeted over 500 hosts of VMware ESXi virtual machines.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.linkedin.com\/in\/mansi-verma-230a4594\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-03T05:51:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-15T08:08:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/03\/ESXiArgs-Ransomware-attacks-VMware-Virtual-Machines.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mansi Verma\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mansi Verma\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/\"},\"author\":{\"name\":\"Mansi Verma\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/c16062af900fc713fa916a3db31da99f\"},\"headline\":\"A New Variant of ESXiArgs Ransomware attacks VMware ESXi Virtual Machines\",\"datePublished\":\"2023-03-03T05:51:17+00:00\",\"dateModified\":\"2023-03-15T08:08:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/\"},\"wordCount\":706,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/03\/ESXiArgs-Ransomware-attacks-VMware-Virtual-Machines.jpg\",\"keywords\":[\"Data Recovery Software\"],\"articleSection\":[\"Learning with Stellar\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/\",\"name\":\"ESXiArgs Ransomare Attack on VMware Machines\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/03\/ESXiArgs-Ransomware-attacks-VMware-Virtual-Machines.jpg\",\"datePublished\":\"2023-03-03T05:51:17+00:00\",\"dateModified\":\"2023-03-15T08:08:40+00:00\",\"author\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/c16062af900fc713fa916a3db31da99f\"},\"description\":\"A new variant of ESXiArgs ransomware has recently targeted over 500 hosts of VMware ESXi virtual machines.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#primaryimage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/03\/ESXiArgs-Ransomware-attacks-VMware-Virtual-Machines.jpg\",\"contentUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/03\/ESXiArgs-Ransomware-attacks-VMware-Virtual-Machines.jpg\",\"width\":1000,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stellarinfo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A New Variant of ESXiArgs Ransomware attacks VMware ESXi Virtual Machines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/\",\"name\":\"Stellar Data Recovery Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/c16062af900fc713fa916a3db31da99f\",\"name\":\"Mansi Verma\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e121695d43c532de90f70f5314b264e950777a1808da3f9324499c6d09ff6a8a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e121695d43c532de90f70f5314b264e950777a1808da3f9324499c6d09ff6a8a?s=96&d=mm&r=g\",\"caption\":\"Mansi Verma\"},\"description\":\"Mansi is a seasoned tech enthusiast, holding over a decade of experience in writing blogs, articles, guides, press releases, and tips for different industries, including Data Recovery, IoT, Artificial Intelligence, and Robotics.\",\"sameAs\":[\"https:\/\/stellarinfo.com\/blog\",\"https:\/\/www.linkedin.com\/in\/mansi-verma-230a4594\"],\"url\":\"https:\/\/www.stellarinfo.com\/blog\/author\/mansi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ESXiArgs Ransomare Attack on VMware Machines","description":"A new variant of ESXiArgs ransomware has recently targeted over 500 hosts of VMware ESXi virtual machines.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/","og_locale":"en_US","og_type":"article","og_title":"ESXiArgs Ransomare Attack on VMware Machines","og_description":"A new variant of ESXiArgs ransomware has recently targeted over 500 hosts of VMware ESXi virtual machines.","og_url":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/","og_site_name":"Stellar Data Recovery Blog","article_author":"https:\/\/www.linkedin.com\/in\/mansi-verma-230a4594","article_published_time":"2023-03-03T05:51:17+00:00","article_modified_time":"2023-03-15T08:08:40+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/03\/ESXiArgs-Ransomware-attacks-VMware-Virtual-Machines.jpg","type":"image\/jpeg"}],"author":"Mansi Verma","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mansi Verma","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/"},"author":{"name":"Mansi Verma","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/c16062af900fc713fa916a3db31da99f"},"headline":"A New Variant of ESXiArgs Ransomware attacks VMware ESXi Virtual Machines","datePublished":"2023-03-03T05:51:17+00:00","dateModified":"2023-03-15T08:08:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/"},"wordCount":706,"commentCount":0,"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/03\/ESXiArgs-Ransomware-attacks-VMware-Virtual-Machines.jpg","keywords":["Data Recovery Software"],"articleSection":["Learning with Stellar"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/","url":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/","name":"ESXiArgs Ransomare Attack on VMware Machines","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/03\/ESXiArgs-Ransomware-attacks-VMware-Virtual-Machines.jpg","datePublished":"2023-03-03T05:51:17+00:00","dateModified":"2023-03-15T08:08:40+00:00","author":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/c16062af900fc713fa916a3db31da99f"},"description":"A new variant of ESXiArgs ransomware has recently targeted over 500 hosts of VMware ESXi virtual machines.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#primaryimage","url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/03\/ESXiArgs-Ransomware-attacks-VMware-Virtual-Machines.jpg","contentUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/03\/ESXiArgs-Ransomware-attacks-VMware-Virtual-Machines.jpg","width":1000,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.com\/blog\/esxiargs-ransomware-attacks-vmware-virtual-machines\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A New Variant of ESXiArgs Ransomware attacks VMware ESXi Virtual Machines"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.com\/blog\/#website","url":"https:\/\/www.stellarinfo.com\/blog\/","name":"Stellar Data Recovery Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/c16062af900fc713fa916a3db31da99f","name":"Mansi Verma","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e121695d43c532de90f70f5314b264e950777a1808da3f9324499c6d09ff6a8a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e121695d43c532de90f70f5314b264e950777a1808da3f9324499c6d09ff6a8a?s=96&d=mm&r=g","caption":"Mansi Verma"},"description":"Mansi is a seasoned tech enthusiast, holding over a decade of experience in writing blogs, articles, guides, press releases, and tips for different industries, including Data Recovery, IoT, Artificial Intelligence, and Robotics.","sameAs":["https:\/\/stellarinfo.com\/blog","https:\/\/www.linkedin.com\/in\/mansi-verma-230a4594"],"url":"https:\/\/www.stellarinfo.com\/blog\/author\/mansi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/127178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/comments?post=127178"}],"version-history":[{"count":5,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/127178\/revisions"}],"predecessor-version":[{"id":127204,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/127178\/revisions\/127204"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media\/127182"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media?parent=127178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/categories?post=127178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/tags?post=127178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}