{"id":585,"date":"2016-12-13T14:38:00","date_gmt":"2016-12-13T14:38:00","guid":{"rendered":"https:\/\/staging.binaryconfidence.com\/?p=585"},"modified":"2025-11-14T00:06:43","modified_gmt":"2025-11-14T00:06:43","slug":"gap-analyza-kybernetickeho-utoku-na-elektraren","status":"publish","type":"post","link":"https:\/\/www.binaryconfidence.com\/en\/gap-analyza-kybernetickeho-utoku-na-elektraren\/","title":{"rendered":"Gap analysis of power station cyber attack"},"content":{"rendered":"<p>If they tell you that defects in digital infrastructure protection may cause a nationwide blackout, believe it or not, they are not that far from the truth. Our expert analyzed a real case of cyber attack on electricity distributor in Ukraine.<\/p>\r\n<p>In December 2015, a targeted attack targeted the Ukrainian company Kyivoblenergo. The attacker started with social engineering. He sent an email to employees with a document containing malicious code. In this way, he gained access to the victim\u2019s network. He had been present on the network for almost six months, which gave him enough time to familiarize himself with the environment and launch a highly synchronized multi-stage attack in several locations. He managed to gain administrator access rights and map the victim\u2019s infrastructure. He figured out how to communicate with the DMS systems and wrote his own malicious firmware for the next stage of the attack. The attacker even tested his exploit directly on the victim\u2019s network before launching it. He ran the KillDisk tool to erase his traces on the systems in order to prevent any forensic analysis. The attack caused a massive power outage and simultaneously knocked out the phone service at the call center.<\/p>\r\n<p>The cyberattack on the Ukrainian power plant was well-planned and highly coordinated. The attacker had multiple ways to penetrate the network. Various information was available from publicly available sources, including detailed lists of infrastructure types, e.g. from Remote Terminal Unit vendors, as well as versions published by industrial ICS vendors on the Internet. It appears that the VPNs to the ICS systems from the commercial network did not have two-factor authentication.<\/p>\r\n<p>In addition, the firewall allowed the attacker to remotely manage the system from an external environment using the remote access function, which is a native part of the systems. The network did not contain any security monitoring components. There was no SIEM, and the most important factor was probably the under-dimensioning of the professional staff. The attacker was present in the network for six months and remained undetected until the attack was launched. Using tools to send logs to a central server and analyze them would significantly increase the likelihood of his detection. When applying such an approach, the systems record all activities, including every step of the attacker, so his tracks would not be covered even by anti-forensic tools.<\/p>\r\n<p><strong>Although fortunately there was no outage, the consequences of this attack were significant. If the company had implemented controls at each of its layers of digital infrastructure protection (using active <a href=\"https:\/\/www.binaryconfidence.com\/en\/socaas\/\" target=\"_blank\" rel=\"noopener\">security monitoring<\/a>), the attackers would have been detected much earlier. Defending all layers of data security can prevent or minimize damage even in sensitive cases like this one.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Ak niekto povie, \u017ee nedostatky v ochrane digit\u00e1lnej infra\u0161trukt\u00fary m\u00f4\u017eu sp\u00f4sobi\u0165 celo\u0161t\u00e1tny v\u00fdpadok, nie je ve\u013emi \u010faleko od pravdy. N\u00e1\u0161 expert analyzoval re\u00e1lny pr\u00edpad kybernetick\u00e9ho \u00fatoku na distrib\u00fatora elektriny na Ukrajine. V decembri 2015 bola cielen\u00fdm \u00fatokom ohrozen\u00e1 ukrajinsk\u00e1 spolo\u010dnos\u0165 Kyivoblenergo. \u00dato\u010dn\u00edk za\u010dal so soci\u00e1lnym in\u017einierstvom. Zamestnancom poslal e-mail s dokumentom, ktor\u00fd obsahoval \u0161kodliv\u00fd k\u00f3d. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9104,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[48],"tags":[],"class_list":["post-585","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vseobecne"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digit\u00e1lna bezpe\u010dnos\u0165: Kyber\u00fatok na ukrajinsk\u00fa elektr\u00e1re\u0148<\/title>\n<meta name=\"description\" content=\"Kybernetick\u00fd \u00fatok na Kyivoblenergo: \u00dato\u010dn\u00edk sp\u00f4sobil mas\u00edvny v\u00fdpadok elektriny. Pre\u010d\u00edtajte si o tom, ako \u00fatok prebiehal.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.binaryconfidence.com\/en\/gap-analyza-kybernetickeho-utoku-na-elektraren\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digit\u00e1lna bezpe\u010dnos\u0165: Kyber\u00fatok na ukrajinsk\u00fa elektr\u00e1re\u0148\" \/>\n<meta property=\"og:description\" content=\"Kybernetick\u00fd \u00fatok na Kyivoblenergo: \u00dato\u010dn\u00edk sp\u00f4sobil mas\u00edvny v\u00fdpadok elektriny. Pre\u010d\u00edtajte si o tom, ako \u00fatok prebiehal.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.binaryconfidence.com\/en\/gap-analyza-kybernetickeho-utoku-na-elektraren\/\" \/>\n<meta property=\"og:site_name\" content=\"Binary Confidence\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BinConf\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-13T14:38:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-14T00:06:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2024\/05\/Gap-analysis-of-power-station-cyber-attack.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1737\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"root\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@binaryconf\" \/>\n<meta name=\"twitter:site\" content=\"@binaryconf\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"root\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/gap-analyza-kybernetickeho-utoku-na-elektraren\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/gap-analyza-kybernetickeho-utoku-na-elektraren\\\/\"},\"author\":{\"name\":\"root\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/person\\\/fb6d54cf316a60459324f72ff64a7514\"},\"headline\":\"GAP anal\u00fdza kybernetick\u00e9ho \u00fatoku na elektr\u00e1re\u0148\",\"datePublished\":\"2016-12-13T14:38:00+00:00\",\"dateModified\":\"2025-11-14T00:06:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/gap-analyza-kybernetickeho-utoku-na-elektraren\\\/\"},\"wordCount\":529,\"publisher\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/gap-analyza-kybernetickeho-utoku-na-elektraren\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Gap-analysis-of-power-station-cyber-attack.webp\",\"articleSection\":[\"V\u0161eobecn\u00e9\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/gap-analyza-kybernetickeho-utoku-na-elektraren\\\/\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/gap-analyza-kybernetickeho-utoku-na-elektraren\\\/\",\"name\":\"Digit\u00e1lna bezpe\u010dnos\u0165: Kyber\u00fatok na ukrajinsk\u00fa elektr\u00e1re\u0148\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/gap-analyza-kybernetickeho-utoku-na-elektraren\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/gap-analyza-kybernetickeho-utoku-na-elektraren\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Gap-analysis-of-power-station-cyber-attack.webp\",\"datePublished\":\"2016-12-13T14:38:00+00:00\",\"dateModified\":\"2025-11-14T00:06:43+00:00\",\"description\":\"Kybernetick\u00fd \u00fatok na Kyivoblenergo: \u00dato\u010dn\u00edk sp\u00f4sobil mas\u00edvny v\u00fdpadok elektriny. Pre\u010d\u00edtajte si o tom, ako \u00fatok prebiehal.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/gap-analyza-kybernetickeho-utoku-na-elektraren\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.binaryconfidence.com\\\/gap-analyza-kybernetickeho-utoku-na-elektraren\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/gap-analyza-kybernetickeho-utoku-na-elektraren\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Gap-analysis-of-power-station-cyber-attack.webp\",\"contentUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Gap-analysis-of-power-station-cyber-attack.webp\",\"width\":2560,\"height\":1737,\"caption\":\"Elektr\u00e1re\u0148 s chladiacimi ve\u017eami a kom\u00ednmi v no\u010dnom osvetlen\u00ed\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/gap-analyza-kybernetickeho-utoku-na-elektraren\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GAP anal\u00fdza kybernetick\u00e9ho \u00fatoku na elektr\u00e1re\u0148\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#website\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\",\"name\":\"Binary Confidence\",\"description\":\"Binary Confidence\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.binaryconfidence.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#organization\",\"name\":\"Binary Confidence\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Binary-Confidence-Secondary-Logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.binaryconfidence.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Binary-Confidence-Secondary-Logo.svg\",\"caption\":\"Binary Confidence\"},\"image\":{\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/BinConf\",\"https:\\\/\\\/x.com\\\/binaryconf\",\"https:\\\/\\\/www.youtube.com\\\/@binaryconfidence\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/binary-confidence\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.binaryconfidence.com\\\/#\\\/schema\\\/person\\\/fb6d54cf316a60459324f72ff64a7514\",\"name\":\"root\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g\",\"caption\":\"root\"},\"sameAs\":[\"https:\\\/\\\/www.binaryconfidence.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Security: Cyberattack on Ukrainian Power Plant","description":"Cyber attack on Kyivoblenergo: Attacker caused massive power outage. Read about how the attack unfolded.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.binaryconfidence.com\/en\/gap-analyza-kybernetickeho-utoku-na-elektraren\/","og_locale":"en_GB","og_type":"article","og_title":"Digit\u00e1lna bezpe\u010dnos\u0165: Kyber\u00fatok na ukrajinsk\u00fa elektr\u00e1re\u0148","og_description":"Kybernetick\u00fd \u00fatok na Kyivoblenergo: \u00dato\u010dn\u00edk sp\u00f4sobil mas\u00edvny v\u00fdpadok elektriny. Pre\u010d\u00edtajte si o tom, ako \u00fatok prebiehal.","og_url":"https:\/\/www.binaryconfidence.com\/en\/gap-analyza-kybernetickeho-utoku-na-elektraren\/","og_site_name":"Binary Confidence","article_publisher":"https:\/\/www.facebook.com\/BinConf","article_published_time":"2016-12-13T14:38:00+00:00","article_modified_time":"2025-11-14T00:06:43+00:00","og_image":[{"width":2560,"height":1737,"url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2024\/05\/Gap-analysis-of-power-station-cyber-attack.webp","type":"image\/webp"}],"author":"root","twitter_card":"summary_large_image","twitter_creator":"@binaryconf","twitter_site":"@binaryconf","twitter_misc":{"Written by":"root","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.binaryconfidence.com\/gap-analyza-kybernetickeho-utoku-na-elektraren\/#article","isPartOf":{"@id":"https:\/\/www.binaryconfidence.com\/gap-analyza-kybernetickeho-utoku-na-elektraren\/"},"author":{"name":"root","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/person\/fb6d54cf316a60459324f72ff64a7514"},"headline":"GAP anal\u00fdza kybernetick\u00e9ho \u00fatoku na elektr\u00e1re\u0148","datePublished":"2016-12-13T14:38:00+00:00","dateModified":"2025-11-14T00:06:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.binaryconfidence.com\/gap-analyza-kybernetickeho-utoku-na-elektraren\/"},"wordCount":529,"publisher":{"@id":"https:\/\/www.binaryconfidence.com\/#organization"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/gap-analyza-kybernetickeho-utoku-na-elektraren\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2024\/05\/Gap-analysis-of-power-station-cyber-attack.webp","articleSection":["V\u0161eobecn\u00e9"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.binaryconfidence.com\/gap-analyza-kybernetickeho-utoku-na-elektraren\/","url":"https:\/\/www.binaryconfidence.com\/gap-analyza-kybernetickeho-utoku-na-elektraren\/","name":"Digital Security: Cyberattack on Ukrainian Power Plant","isPartOf":{"@id":"https:\/\/www.binaryconfidence.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.binaryconfidence.com\/gap-analyza-kybernetickeho-utoku-na-elektraren\/#primaryimage"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/gap-analyza-kybernetickeho-utoku-na-elektraren\/#primaryimage"},"thumbnailUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2024\/05\/Gap-analysis-of-power-station-cyber-attack.webp","datePublished":"2016-12-13T14:38:00+00:00","dateModified":"2025-11-14T00:06:43+00:00","description":"Cyber attack on Kyivoblenergo: Attacker caused massive power outage. Read about how the attack unfolded.","breadcrumb":{"@id":"https:\/\/www.binaryconfidence.com\/gap-analyza-kybernetickeho-utoku-na-elektraren\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.binaryconfidence.com\/gap-analyza-kybernetickeho-utoku-na-elektraren\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.binaryconfidence.com\/gap-analyza-kybernetickeho-utoku-na-elektraren\/#primaryimage","url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2024\/05\/Gap-analysis-of-power-station-cyber-attack.webp","contentUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2024\/05\/Gap-analysis-of-power-station-cyber-attack.webp","width":2560,"height":1737,"caption":"Elektr\u00e1re\u0148 s chladiacimi ve\u017eami a kom\u00ednmi v no\u010dnom osvetlen\u00ed"},{"@type":"BreadcrumbList","@id":"https:\/\/www.binaryconfidence.com\/gap-analyza-kybernetickeho-utoku-na-elektraren\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.binaryconfidence.com\/"},{"@type":"ListItem","position":2,"name":"GAP anal\u00fdza kybernetick\u00e9ho \u00fatoku na elektr\u00e1re\u0148"}]},{"@type":"WebSite","@id":"https:\/\/www.binaryconfidence.com\/#website","url":"https:\/\/www.binaryconfidence.com\/","name":"Binary Confidence","description":"Binary Confidence","publisher":{"@id":"https:\/\/www.binaryconfidence.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.binaryconfidence.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.binaryconfidence.com\/#organization","name":"Binary Confidence","url":"https:\/\/www.binaryconfidence.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2023\/12\/Binary-Confidence-Secondary-Logo.svg","contentUrl":"https:\/\/www.binaryconfidence.com\/wp-content\/uploads\/2023\/12\/Binary-Confidence-Secondary-Logo.svg","caption":"Binary Confidence"},"image":{"@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BinConf","https:\/\/x.com\/binaryconf","https:\/\/www.youtube.com\/@binaryconfidence","https:\/\/www.linkedin.com\/company\/binary-confidence\/"]},{"@type":"Person","@id":"https:\/\/www.binaryconfidence.com\/#\/schema\/person\/fb6d54cf316a60459324f72ff64a7514","name":"root","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/528bcd82992f1af968b2da5bf24faadae702687fbeda55b79fe08201dc5da5cd?s=96&d=mm&r=g","caption":"root"},"sameAs":["https:\/\/www.binaryconfidence.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/comments?post=585"}],"version-history":[{"count":6,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/585\/revisions"}],"predecessor-version":[{"id":10507,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/posts\/585\/revisions\/10507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/media\/9104"}],"wp:attachment":[{"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/media?parent=585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/categories?post=585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.binaryconfidence.com\/en\/wp-json\/wp\/v2\/tags?post=585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}