{"id":5335,"date":"2025-10-08T12:40:51","date_gmt":"2025-10-08T12:40:51","guid":{"rendered":"https:\/\/blog.truthscan.com\/?p=5335"},"modified":"2026-03-06T10:12:23","modified_gmt":"2026-03-06T10:12:23","slug":"amenintare-deepfake-pentru-salesforce","status":"publish","type":"post","link":"https:\/\/blog.truthscan.com\/ro\/amenintare-deepfake-pentru-salesforce\/","title":{"rendered":"Amenin\u021barea Deepfake la adresa Salesforce: C\u00e2nd \u00eencrederea devine o arm\u0103"},"content":{"rendered":"<p>\u00cen iunie 2025, un angajat Google a primit ceea ce p\u0103rea a fi un apel de rutin\u0103 de la asisten\u021ba IT.<\/p>\n\n\n\n<p>Vocea de pe linie p\u0103rea profesionist\u0103, \u00eencrez\u0103toare \u0219i complet familiar\u0103.\u00a0<\/p>\n\n\n\n<p>Tehnicianul i-a cerut angajatului s\u0103 aprobe o nou\u0103 aplica\u021bie \u00een sistemul Salesforce al companiei.<\/p>\n\n\n\n<p>\u00cen c\u00e2teva minute, atacatorii au avut acces \u0219i au furat 2,55 milioane de \u00eenregistr\u0103ri ale clien\u021bilor din CRM-ul Google.<\/p>\n\n\n\n<p>Acest lucru a fost posibil datorit\u0103 utiliz\u0103rii tehnologiei audio deepfake, cu voci generate de AI at\u00e2t de conving\u0103toare \u00eenc\u00e2t au p\u0103c\u0103lit una dintre cele mai de \u00eencredere forme de autentificare, recunoa\u0219terea vocii unui coleg.<\/p>\n\n\n\n<p>Acest incident, legat de grupul ShinyHunters, arat\u0103 cum atacatorii folosesc acum inteligen\u021ba artificial\u0103 pentru a p\u0103trunde \u00een sistemele companiilor.<\/p>\n\n\n\n<p>Fiind coloana vertebral\u0103 a gestion\u0103rii rela\u021biilor cu clien\u021bii pentru milioane de organiza\u021bii din \u00eentreaga lume, Salesforce a devenit una dintre principalele \u021binte pentru o nou\u0103 genera\u021bie de atacuri de inginerie social\u0103 bazate pe inteligen\u021b\u0103 artificial\u0103.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>De ce Salesforce a devenit o \u021bint\u0103 Deepfake<\/strong><\/h2>\n\n\n\n<p>Cre\u0219terea Salesforce a transformat-o, de asemenea, \u00eentr-o \u021bint\u0103 important\u0103 pentru furtul de date.<\/p>\n\n\n\n<p>Deoarece totul este centralizat, o singur\u0103 bre\u0219\u0103 poate expune milioane de \u00eenregistr\u0103ri ale clien\u021bilor din mai multe companii diferite.<\/p>\n\n\n\n<p>Dup\u0103 cum remarc\u0103 Tim West, \u0219eful departamentului de informa\u021bii privind amenin\u021b\u0103rile din cadrul WithSecure:<\/p>\n\n\n\n<p>\"Grupuri de hackeri precum Scattered Spider utilizeaz\u0103 ingineria social\u0103 pentru a ob\u021bine acces la mediile SaaS. Atacurile lor pot p\u0103rea simple din punct de vedere tehnic, dar asta nu le face mai pu\u021bin periculoase.\"<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"344\" src=\"https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-target-salesforce-1024x344.jpg\" alt=\"\" class=\"wp-image-5340\" title=\"\" srcset=\"https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-target-salesforce-1024x344.jpg 1024w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-target-salesforce-300x101.jpg 300w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-target-salesforce-768x258.jpg 768w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-target-salesforce-1536x516.jpg 1536w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-target-salesforce-18x6.jpg 18w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-target-salesforce.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p>Conform noii cercet\u0103ri WithSecure, activitatea mali\u021bioas\u0103 din mediile Salesforce a crescut brusc \u00een primul trimestru al anului 2025, cu o cre\u0219tere de dou\u0103zeci de ori a detec\u021biilor comparativ cu sf\u00e2r\u0219itul anului 2024.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cum au alimentat Deepfakes o bre\u0219\u0103 Salesforce<\/strong><\/h2>\n\n\n\n<p>Ceea ce face atacurile recente deosebit de periculoase este modul \u00een care tehnologia deepfake s-a transformat dintr-un instrument de ni\u0219\u0103 \u00eentr-un instrument pe care oricine \u00eel poate folosi ca arm\u0103.<\/p>\n\n\n\n<p>Spre deosebire de bre\u0219ele de date tradi\u021bionale care p\u0103trund direct \u00een bazele de date, infractorii cibernetici folosesc acum ingineria social\u0103 bazat\u0103 pe voce, sau \"vishing\". Odat\u0103 cu apari\u021bia deepfakes \u0219i a clon\u0103rii vocii AI, aceste atacuri devin mult mai greu de depistat.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"360\" src=\"https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-creation-economics-1024x360.jpg\" alt=\"\" class=\"wp-image-5341\" title=\"\" srcset=\"https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-creation-economics-1024x360.jpg 1024w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-creation-economics-300x106.jpg 300w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-creation-economics-768x270.jpg 768w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-creation-economics-1536x540.jpg 1536w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-creation-economics-18x6.jpg 18w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/Deepfake-creation-economics.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p>Campania ShinyHunters \u00eempotriva clien\u021bilor Salesforce urmeaz\u0103 un plan de ac\u021biune eficient care combin\u0103 ingineria social\u0103 tradi\u021bional\u0103 cu \u00een\u0219el\u0103ciunea AI de ultim\u0103 or\u0103:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Faza 1: Culegerea de informa\u021bii vocale<\/strong><\/h3>\n\n\n\n<p>Atacatorii \u00eencep prin recoltarea de mostre audio din surse publice, prezent\u0103ri executive, conferin\u021be telefonice, videoclipuri ale companiei sau post\u0103ri pe re\u021belele sociale.&nbsp;<\/p>\n\n\n\n<p>Cu doar 20-30 de secunde de sunet clar, ei pot crea clone vocale conving\u0103toare.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Faza 2: Apelul Deepfake Vishing<\/strong><\/h3>\n\n\n\n<p>\u00cen timpul unui apel de tip vishing, atacatorul convinge victima s\u0103 acceseze pagina de configurare a aplica\u021biei conectate Salesforce \u0219i s\u0103 aprobe o versiune fals\u0103 a aplica\u021biei Data Loader, deghizat\u0103 cu un brand u\u0219or modificat.<\/p>\n\n\n\n<p>Astfel, victima las\u0103 atacatorii s\u0103 fure, f\u0103r\u0103 s\u0103 \u0219tie, date sensibile din Salesforce.<\/p>\n\n\n\n<p>Nivelul de sofisticare este remarcabil. \u00cen unele cazuri, atacatorii au folosit un sistem audio de tip deepfake pentru a se da drept angaja\u021bi \u0219i a convinge personalul biroului de asisten\u021b\u0103 s\u0103 autorizeze accesul necinstit.&nbsp;<\/p>\n\n\n\n<p>Aceasta reprezint\u0103 o evolu\u021bie semnificativ\u0103 de la phishing-ul vocal tradi\u021bional, \u00een care atacatorii pur \u0219i simplu pretindeau c\u0103 sunt figuri autoritare, la impersonarea \u00eembun\u0103t\u0103\u021bit\u0103 de inteligen\u021b\u0103 artificial\u0103, \u00een care pot suna ca anumite persoane.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Faza 3: Exploatarea OAuth<\/strong><\/h3>\n\n\n\n<p>Odat\u0103 ce aplica\u021bia mali\u021bioas\u0103 este autorizat\u0103, atacatorii ocolesc complet autentificarea multifactorial\u0103.&nbsp;<\/p>\n\n\n\n<p>Dup\u0103 ce aplica\u021bia fals\u0103 este aprobat\u0103, atacatorii ob\u021bin jetoane OAuth de lung\u0103 durat\u0103, care le permit s\u0103 ocoleasc\u0103 autentificarea multifactorial\u0103 \u0219i s\u0103 opereze f\u0103r\u0103 a declan\u0219a alertele de securitate normale.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Faza 4: Extragerea datelor silen\u021bioase<\/strong><\/h3>\n\n\n\n<p>Grupul de informa\u021bii privind amenin\u021b\u0103rile de la Google a avertizat c\u0103 un agent de amenin\u021bare a utilizat un instrument Python pentru a automatiza procesul de furt de date pentru fiecare organiza\u021bie vizat\u0103, cercet\u0103torii av\u00e2nd cuno\u0219tin\u021b\u0103 de peste 700 de organiza\u021bii poten\u021bial afectate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>De ce suntem vulnerabili la vocile AI<\/strong><\/h2>\n\n\n\n<p>Succesul acestor atacuri exploateaz\u0103 o tr\u0103s\u0103tur\u0103 uman\u0103 fundamental\u0103: tendin\u021ba noastr\u0103 de a avea \u00eencredere \u00een ceea ce auzim. <\/p>\n\n\n\n<p>Conform unui studiu global recent, 70% dintre oameni spun c\u0103 nu sunt siguri c\u0103 pot identifica o voce real\u0103 fa\u021b\u0103 de una clonat\u0103.<\/p>\n\n\n\n<p>Aceast\u0103 vulnerabilitate este agravat\u0103 \u00een mediile corporative \u00een care personalul biroului de asisten\u021b\u0103 este instruit s\u0103 fie serviabil \u0219i conciliant, iar munca la distan\u021b\u0103 a normalizat interac\u021biunile doar audio.<\/p>\n\n\n\n<p>Conform raportului CrowdStrike 2025 Global Threat Report, s-a \u00eenregistrat o cre\u0219tere de 442% a atacurilor de phishing vocal (vishing) \u00eentre prima \u0219i a doua jum\u0103tate a anului 2024, determinat\u0103 de tacticile de phishing \u0219i substituire generate de AI.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>$25 Million Wake-Up Call<\/strong><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/deepfake-threat-image-1024x683.jpg\" alt=\"\" class=\"wp-image-5342\" title=\"\" srcset=\"https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/deepfake-threat-image-1024x683.jpg 1024w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/deepfake-threat-image-300x200.jpg 300w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/deepfake-threat-image-768x512.jpg 768w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/deepfake-threat-image-18x12.jpg 18w, https:\/\/blog.truthscan.com\/wp-content\/uploads\/2025\/10\/deepfake-threat-image.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p>Implica\u021biile atacurilor \u00eembun\u0103t\u0103\u021bite de deepfake se extind mult dincolo de Salesforce.&nbsp;<\/p>\n\n\n\n<p>Furtul deepfake de $25 milioane de la firma de inginerie Arup la \u00eenceputul anului 2024, \u00een care atacatorii au folosit inteligen\u021ba artificial\u0103 pentru a se da drept mai mul\u021bi directori \u00een cadrul unui apel video, a demonstrat c\u0103 nicio organiza\u021bie nu este imun\u0103 la aceast\u0103 amenin\u021bare.&nbsp;<\/p>\n\n\n\n<p>Atacuri similare au vizat, de asemenea, directori executivi din diferite industrii, inclusiv o \u00eencercare de a se da drept directorul general al Ferrari, Benedetto Vigna, folosind apeluri vocale clonate de AI care imitau accentul s\u0103u din sudul Italiei.<\/p>\n\n\n\n<p>Aceste incidente reprezint\u0103 ceea ce exper\u021bii \u00een securitate numesc \"frauda CEO 2.0\", atacuri care dep\u0103\u0219esc simpla impostur\u0103 prin e-mail pentru a crea \u00een\u0219el\u0103torii multisenzoriale care pot p\u0103c\u0103li chiar \u0219i directori cu experien\u021b\u0103.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Securitatea platformei vs. Vulnerabilitatea uman\u0103<\/strong><\/h2>\n\n\n\n<p>Salesforce s-a gr\u0103bit s\u0103 sublinieze c\u0103 aceste bre\u0219e nu reprezint\u0103 vulnerabilit\u0103\u021bi ale platformei sale \u00een sine.&nbsp;<\/p>\n\n\n\n<p>Salesforce a recunoscut campania UNC6040 \u00een martie 2025, avertiz\u00e2nd c\u0103 atacatorii se d\u0103deau drept suport IT pentru a p\u0103c\u0103li angaja\u021bii s\u0103 ofere acredit\u0103ri sau s\u0103 aprobe aplica\u021bii conectate r\u0103u inten\u021bionate.&nbsp;<\/p>\n\n\n\n<p>Compania a subliniat c\u0103 aceste incidente nu au implicat sau nu au provenit din vulnerabilit\u0103\u021bi ale platformei sale.<\/p>\n\n\n\n<p>Acest lucru arat\u0103 o provocare major\u0103 pentru to\u021bi furnizorii SaaS: g\u0103sirea unui mod de a opri atacurile care se bazeaz\u0103 pe \u00eencrederea uman\u0103 \u00een locul defectelor tehnice.<\/p>\n\n\n\n<p>Salesforce a implementat mai multe m\u0103suri defensive:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00cent\u0103rirea aplica\u021biilor conectate: Dezactivarea automat\u0103 a aplica\u021biilor conectate neinstalate pentru utilizatorii noi<\/li>\n\n\n\n<li>Restric\u021bii de flux OAuth: Dezactivarea conexiunilor ob\u021binute utiliz\u00e2nd anumite procese de autorizare<\/li>\n\n\n\n<li>Monitorizare \u00eembun\u0103t\u0103\u021bit\u0103: Detectarea \u00eembun\u0103t\u0103\u021bit\u0103 a tiparelor suspecte de autorizare a aplica\u021biilor<\/li>\n\n\n\n<li>Educa\u021bia utilizatorilor: Publicarea de orient\u0103ri privind recunoa\u0219terea tentativelor de inginerie social\u0103<\/li>\n<\/ul>\n\n\n\n<p>\u00cen august 2025, Salesforce a oprit toate integr\u0103rile cu tehnologiile Salesloft, inclusiv aplica\u021bia Drift, dup\u0103 ce a constatat c\u0103 token-urile OAuth fuseser\u0103 furate \u00een atacuri conexe.&nbsp;<\/p>\n\n\n\n<p>Exper\u021bii \u00een securitate avertizeaz\u0103 acum c\u0103 echipele trebuie s\u0103 asculte indiciile subtile, cum ar fi pauzele ciudate, zgomotul de fond sau defec\u021biunile audio, care pot dezv\u0103lui c\u00e2nd o voce a fost generat\u0103 de AI.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>R\u0103spunsul \u00eentreprinderii: Dincolo de solu\u021biile tehnologice<\/strong><\/h2>\n\n\n\n<p>Organiza\u021biile \u00eencep s\u0103 recunoasc\u0103 faptul c\u0103 ap\u0103rarea \u00eempotriva atacurilor \u00eembun\u0103t\u0103\u021bite de deepfake necesit\u0103 mai mult dec\u00e2t solu\u021bii tehnologice; aceasta necesit\u0103 o reg\u00e2ndire fundamental\u0103 a proceselor de \u00eencredere \u0219i verificare.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Comunicarea f\u0103r\u0103 \u00eencredere<\/strong><\/h3>\n\n\n\n<p>RealityCheck de la Beyond Identity ofer\u0103 fiec\u0103rui participant o insign\u0103 de identitate vizibil\u0103 \u0219i verificat\u0103, sus\u021binut\u0103 de autentificarea dispozitivelor criptografice \u0219i de verific\u0103ri continue ale riscurilor, disponibil\u0103 \u00een prezent pentru Zoom \u0219i Microsoft Teams.&nbsp;<\/p>\n\n\n\n<p>Astfel de solu\u021bii reprezint\u0103 o schimbare c\u0103tre modelele \"niciodat\u0103 de \u00eencredere, \u00eentotdeauna de verificare\" pentru comunicarea \u00een \u00eentreprinderi.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Programe de formare \u00eembun\u0103t\u0103\u021bite<\/strong><\/h3>\n\n\n\n<p>Organiza\u021biile care utilizeaz\u0103 platforma de simulare deepfake a Resemble AI raporteaz\u0103 o reducere de p\u00e2n\u0103 la 90% a atacurilor reu\u0219ite dup\u0103 implementarea platformei, care utilizeaz\u0103 simul\u0103ri hiperrealiste pentru a ilustra modul \u00een care atacurile deepfake se desf\u0103\u0219oar\u0103 \u00een lumea real\u0103.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Verificare multicanal<\/strong><\/h3>\n\n\n\n<p>Organiza\u021biile de v\u00e2rf implementeaz\u0103 protocoale care impun verificarea prin mai multe canale pentru orice cerere cu risc ridicat, indiferent de c\u00e2t de autentic\u0103 pare comunicarea ini\u021bial\u0103.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>C\u00e2nd vocea nu mai este adev\u0103r<\/strong><\/h2>\n\n\n\n<p>Amenin\u021barea deepfake la adresa Salesforce \u0219i a altor sisteme de \u00eentreprindere reprezint\u0103 un punct de inflexiune \u00een istoria securit\u0103\u021bii cibernetice.&nbsp;<\/p>\n\n\n\n<p>Pentru prima dat\u0103, atacatorii nu pot doar s\u0103 se dea drept figuri de autoritate, ci pot chiar s\u0103 vorbeasc\u0103 ca ei, s\u0103 arate ca ei \u0219i s\u0103 conving\u0103 chiar \u0219i profesioni\u0219ti califica\u021bi \u00een domeniul securit\u0103\u021bii s\u0103 ia m\u0103suri care compromit securitatea organiza\u021biei.<\/p>\n\n\n\n<p>\u00centr-o er\u0103 a \u00een\u0219el\u0103ciunii generate de inteligen\u021ba artificial\u0103, \u00eencrederea trebuie c\u00e2\u0219tigat\u0103 prin verificare, nu asumat\u0103 prin familiaritate.<\/p>\n\n\n\n<p>Companiile care \u00een\u021beleg acest lucru \u0219i investesc \u00een instrumentele, procesele \u0219i cultura potrivite vor fi \u00een cea mai bun\u0103 pozi\u021bie pentru a proteja at\u00e2t securitatea, c\u00e2t \u0219i \u00eencrederea \u00eentr-o lume digital\u0103 tot mai nesigur\u0103.<\/p>\n\n\n\n<p>\u00cen aceast\u0103 nou\u0103 realitate, vocea de la cel\u0103lalt cap\u0103t al firului poate s\u0103 nu fie cine pare.<\/p>\n\n\n\n<p>\u00cen era deepfakes, vigilen\u021ba constant\u0103 este pre\u021bul securit\u0103\u021bii.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00cen iunie 2025, un angajat Google a primit ceea ce p\u0103rea a fi un apel de rutin\u0103 de la [...]<\/p>","protected":false},"author":15,"featured_media":5339,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[31],"tags":[],"class_list":["post-5335","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-helpful-ai-content-tips"],"_links":{"self":[{"href":"https:\/\/blog.truthscan.com\/ro\/wp-json\/wp\/v2\/posts\/5335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.truthscan.com\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.truthscan.com\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.truthscan.com\/ro\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.truthscan.com\/ro\/wp-json\/wp\/v2\/comments?post=5335"}],"version-history":[{"count":3,"href":"https:\/\/blog.truthscan.com\/ro\/wp-json\/wp\/v2\/posts\/5335\/revisions"}],"predecessor-version":[{"id":5343,"href":"https:\/\/blog.truthscan.com\/ro\/wp-json\/wp\/v2\/posts\/5335\/revisions\/5343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.truthscan.com\/ro\/wp-json\/wp\/v2\/media\/5339"}],"wp:attachment":[{"href":"https:\/\/blog.truthscan.com\/ro\/wp-json\/wp\/v2\/media?parent=5335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.truthscan.com\/ro\/wp-json\/wp\/v2\/categories?post=5335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.truthscan.com\/ro\/wp-json\/wp\/v2\/tags?post=5335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}