{"id":80503,"date":"2016-06-25T12:14:09","date_gmt":"2016-06-25T16:14:09","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-08-10T12:22:56","modified_gmt":"2022-08-10T16:22:56","slug":"malware-steals-your-cash-at-atm","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/malware-steals-your-cash-at-atm\/","title":{"rendered":"Malware Steals Your Cash At ATM"},"content":{"rendered":"<p><a href=\"http:\/\/www.atmmarketplace.com\/news\/timeline-the-atms-history\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-105084\" title=\"Malware Steals Your Cash At ATM\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/atm_orginal.jpg?resize=147%2C110&#038;ssl=1\" alt=\"Malware Steals Your Cash At ATM\" width=\"147\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/atm_orginal.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/atm_orginal.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/atm_orginal.jpg?w=200&amp;ssl=1 200w\" sizes=\"auto, (max-width: 147px) 100vw, 147px\" \/><\/a>On September 2, 1969, America\u2019s first automatic teller machine (ATM) started dispensing cash to customers at <a title=\"Chemical Bank\" href=\"http:\/\/en.wikipedia.org\/wiki\/Chemical_Bank\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">Chemical Bank<\/a> in <a title=\"Rockville Centre, New York\" href=\"https:\/\/web.archive.org\/web\/20240604060238\/https:\/\/www.rvcny.us\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Rockville Center, New York<\/a>. Since then <strong><a title=\"Automated teller machine\" href=\"http:\/\/en.wikipedia.org\/wiki\/Automated_teller_machine\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">ATMs<\/a><\/strong> have been a trusted avenue for many banking transactions. However, <a href=\"http:\/\/www.businessinsider.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Business Insider<\/em><\/a> <a href=\"https:\/\/web.archive.org\/web\/20171026164040\/http:\/\/www.businessinsider.com\/an-incredibly-dangerous-atm-malware-program-has-returned-2016-5\" target=\"_blank\" rel=\"noopener noreferrer\">warns<\/a> that the next time you pull <strong>cash out of the ATM<\/strong>, or \u201c<a href=\"https:\/\/www.urbandictionary.com\/define.php?term=tap%20MAC\" target=\"_blank\" rel=\"noopener noreferrer\">Tap the Mac<\/a>\u201d you should <strong>take extra care<\/strong>. <em>BI<\/em> reports that Internet security firm <strong><a href=\"https:\/\/usa.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kaspersky Lab<\/a><\/strong> has <a href=\"https:\/\/securelist.com\/blog\/research\/74772\/atm-infector\/\" target=\"_blank\" rel=\"noopener noreferrer\">announced<\/a> the return of a newer and more dangerous version of the <strong>Skimer malware<\/strong>.<\/p>\n<p>T<a href=\"http:\/\/www.fico.com\/en\/blogs\/fraud-security\/how-to-avoid-fraud-scams-at-the-atm\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105086\" title=\"ATMs hacked\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/atm_hacked.jpg?resize=129%2C100&#038;ssl=1\" alt=\"ATMs hacked\" width=\"129\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/atm_hacked.jpg?resize=150%2C116&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/atm_hacked.jpg?resize=75%2C58&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/atm_hacked.jpg?w=689&amp;ssl=1 689w\" sizes=\"auto, (max-width: 129px) 100vw, 129px\" \/><\/a>he report characterizes Skimer as an especially dangerous malware that <strong>turns whole ATMs into card-skimming machines<\/strong>. The malware first appeared in 2009 and has been distributed at ATMs all over the world.<\/p>\n<p>The majority of ATM fraud takes place through card skimming. Card skimming is usually physical, as criminals typically install an illegal card-reading device into ATMs, film people entering their PINs on keypads, and then create duplicate cards for sale and use, <a href=\"https:\/\/web.archive.org\/web\/20210905105921\/https:\/\/www.nytimes.com\/2016\/04\/09\/your-money\/safeguarding-your-atm-information-as-fraud-escalates.html\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> the <a href=\"http:\/\/www.nytimes.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>New York Times<\/em><\/a>. Fortunately, users can uncover these card skimmers because they&#8217;ll spot a problem with the card reader or notice an unusual camera.<\/p>\n<p><a href=\"http:\/\/www.mlive.com\/news\/ann-arbor\/index.ssf\/2016\/04\/credit_card_skimmer_removed_fr.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105088\" title=\"Gas pump skimmer\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/gas_pump_skimmer.jpg?resize=83%2C110&#038;ssl=1\" alt=\"Gas pump skimmer\" width=\"83\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/gas_pump_skimmer.jpg?resize=113%2C150&amp;ssl=1 113w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/gas_pump_skimmer.jpg?resize=56%2C75&amp;ssl=1 56w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/gas_pump_skimmer.jpg?resize=768%2C1024&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/gas_pump_skimmer.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 83px) 100vw, 83px\" \/><\/a><a href=\"https:\/\/youtu.be\/hOcFy02c7x0\" target=\"_blank\" rel=\"noopener noreferrer\">Skimer<\/a> is particularly problematic because it is <strong>software-based<\/strong>. The article explains the threat is undetectable to the common ATM user since there is no physical sign of the ATM being tampered with. The Russian-based program lets <strong>criminals access an ATM remotely<\/strong>, install the malware, and then <strong>gather<\/strong> data such as <strong>PINs, card numbers, and account numbers<\/strong> over the course of time. A &#8220;money mule&#8221; can then insert a special magnetic stripe card into the ATM to access the stolen data, <strong>take out money, or print card numbers onto a receipt<\/strong>.<\/p>\n<p>The attack begins by gaining access to the ATM system either through physical access or via the bank\u2019s internal network. Then Backdoor.Win32.Skimer malware is installed which infects the core of the ATM. The ATM core is responsible for the machine\u2019s interactions with the banking infrastructure, cash processing, and credit cards. After that, the ATM has become a skimmer. The compromise allows the attackers to withdraw all the funds in the ATM or grab the data from cards used at the ATM, including customers\u2019 bank account numbers and PIN codes.<\/p>\n<p><a href=\"https:\/\/blog.kaspersky.com\/best-android-security-apps\/4651\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105090\" title=\"Kaspersky logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/kaspersky_logo-1.png?resize=100%2C28&#038;ssl=1\" alt=\"Kaspersky logo\" width=\"100\" height=\"28\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/kaspersky_logo-1.png?resize=75%2C21&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/kaspersky_logo-1.png?w=150&amp;ssl=1 150w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>Kaspersky is trying to help banks detect Skimer and is providing techniques for identifying affecting machines and securing their ATM networks in the future. Sergey Golovanov, a principal security researcher at Kaspersky Lab explains it is possible for banks to stop Skimer.<i><br \/>\n<\/i><\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><i>We have discovered the hardcoded numbers used by the malware, and we share them freely with banks &#8230; they can proactively search for them inside their processing systems, detect potentially infected ATMs and money mules, or block any attempts by attackers to activate the malware<\/i><\/p>\n<p>To prevent ATM attacks, Kaspersky recommends that banks:<\/p>\n<ul>\n<li>Perform regular AV scans,<\/li>\n<li>Use whitelisting technologies,<\/li>\n<li>Have a good device management policy,<\/li>\n<li>Enable full-disk encryption,<\/li>\n<li>Protect the ATM\u2019s BIOS with a password,<\/li>\n<li>Only allow HDD booting,<\/li>\n<li><strong>Isolate the ATM network<\/strong> from any other internal bank network.<\/li>\n<\/ul>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105092\" title=\"ATM fraud continues to grow\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/WHELLBARROW_O_MONEY.jpg?resize=102%2C100&#038;ssl=1\" alt=\"ATM fraud continues to grow\" width=\"102\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/WHELLBARROW_O_MONEY.jpg?resize=150%2C147&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/WHELLBARROW_O_MONEY.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/WHELLBARROW_O_MONEY.jpg?w=301&amp;ssl=1 301w\" sizes=\"auto, (max-width: 102px) 100vw, 102px\" \/>Despite a way to control Skimer, ATM fraud continues to grow according to <em>BI<\/em>. A recent <a title=\"FICO\" href=\"http:\/\/www.fico.com\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">FICO<\/a> study found the number of compromised ATMs in the U.S. surged 546% from 2014 to 2015, thanks in large part to the <strong>slow <a title=\"EMV\" href=\"http:\/\/en.wikipedia.org\/wiki\/EMV\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">EMV<\/a> migration<\/strong> of <a title=\"Debit card\" href=\"http:\/\/en.wikipedia.org\/wiki\/Debit_card\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">debit cards<\/a> and ATMs. The article speculates that EMV upgrades would stop Skimer. The resistance to EMV means ATM fraud could grow even more from 2015 to 2016.<\/p>\n<p>John Heggestuen, at <em>BI Intelligence<\/em>, explains that <strong>EMV cards<\/strong> are being rolled out with an embedded microchip for <strong>added security<\/strong>. The microchip carries out real-time <strong>risk assessments<\/strong> on a person&#8217;s card purchase activity based on the card user&#8217;s profile. The chip also generates <strong>dynamic cryptograms<\/strong> when the card is inserted into a payment terminal. Because these cryptograms change with every purchase, it makes it difficult for fraudsters to make counterfeit cards that can be used for in-store transactions.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105095\" title=\"EMV cards\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/emv-compliant-e1569028675127-150x126.png?resize=131%2C110&#038;ssl=1\" alt=\"EMV cards\" width=\"131\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/emv-compliant-e1569028675127.png?resize=150%2C126&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/emv-compliant-e1569028675127.png?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/emv-compliant-e1569028675127.png?resize=768%2C645&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/emv-compliant-e1569028675127.png?w=915&amp;ssl=1 915w\" sizes=\"auto, (max-width: 131px) 100vw, 131px\" \/>Retail card fraud cost U.S. retailers approximately $32 billion in 2014, up from $23 billion in 2013. To solve the card fraud problem across all channels, payment companies and merchants are implementing new payment protocols that could finally help mitigate fraud. In the article, <em>BI\u2019s<\/em> Heggestuen describes some of the other technologies that financial institutions are utilizing to reduce fraud risks.<\/p>\n<p style=\"padding-left: 30px;\">\u2022 <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/encryption\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Encryption<\/strong><\/a> of payments data is being widely implemented. Encryption degrades valuable data by using an algorithm to translate card numbers into new values. This makes it difficult for fraudsters to harvest the payments data for use in future transactions.<a href=\"https:\/\/web.archive.org\/web\/20180831192733\/http:\/\/northernmainebrownfields.org\/the-encryption-battle-continues\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-105097\" title=\"Encryption\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt2-1.png?resize=303%2C85&#038;ssl=1\" alt=\"Encryption\" width=\"303\" height=\"85\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt2-1.png?resize=150%2C42&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt2-1.png?resize=75%2C21&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt2-1.png?resize=768%2C215&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encrypt2-1.png?w=915&amp;ssl=1 915w\" sizes=\"auto, (max-width: 303px) 100vw, 303px\" \/><\/a>\u2022 <a href=\"https:\/\/www.pcisecuritystandards.org\/assessors_and_solutions\/point_to_point_encryption_solutions\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Point-to-point encryption<\/strong><\/a> electronically changes sensitive payment data from the point of capture at the payments terminal all the way through to the gateway or acquirer. This makes it much more difficult for fraudsters to harvest usable data from transactions.<\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/web.archive.org\/web\/20200923072633\/https:\/\/www.pymnts.com\/in-depth\/2014\/the-straight-scoop-on-emv-tokenization-and-p2pe\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-105100\" title=\"Point-to-point encryption\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/p2pe.jpg?resize=402%2C161&#038;ssl=1\" alt=\"Point-to-point encryption\" width=\"402\" height=\"161\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/p2pe.jpg?w=720&amp;ssl=1 720w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/p2pe.jpg?resize=75%2C30&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/p2pe.jpg?resize=150%2C60&amp;ssl=1 150w\" sizes=\"auto, (max-width: 402px) 100vw, 402px\" \/><\/a><br \/>\n\u2022 <strong>Tokenization<\/strong> increases transaction security. Tokenization assigns a random value to payment data, making it effectively impossible for hackers to access the sensitive data from the token itself. Tokens are often &#8220;multiuse,&#8221; meaning merchants don&#8217;t have to force consumers to re-enter their payment details. <strong>Apple Pay<\/strong> uses one emerging form of tokenization.<a href=\"https:\/\/web.archive.org\/web\/20181122163625\/http:\/\/www.fastcharge.com:80\/services\/tokenization\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-105102\" title=\"Tokenization\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/tokenization-stored-profile-e1569028835585.png?resize=301%2C127&#038;ssl=1\" alt=\"Tokenization\" width=\"301\" height=\"127\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/tokenization-stored-profile-e1569028835585.png?w=405&amp;ssl=1 405w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/tokenization-stored-profile-e1569028835585.png?resize=75%2C32&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/tokenization-stored-profile-e1569028835585.png?resize=150%2C63&amp;ssl=1 150w\" sizes=\"auto, (max-width: 301px) 100vw, 301px\" \/><\/a><br \/>\n\u2022 <strong>3D Secure<\/strong> is an imperfect answer to user authentication online. One difficulty in fighting online fraud is that it is hard to confirm that the person using card data is actually the cardholder. 3D Secure adds a level of user authentication by requiring the customer to enter a passcode or <strong>biometric data<\/strong> as well as payment data to complete a transaction online.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>The best recommendation to protect yourself from Skimer and other ATM threats is to use the ATMs at your bank or credit union. These ATMs are harder for thieves to install any type of skimmers or malware on because of the higher traffic and monitoring. ATMs located outside a financial institution like at a <a href=\"http:\/\/krebsonsecurity.com\/2016\/04\/a-dramatic-rise-in-atm-skimming-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">7-11 are highly suspect.<\/a><\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20160729064225\/http:\/\/www.theepochtimes.com:80\/n3\/2072709-fraudsters-coordinate-14000-atm-withdrawals-in-3-hours-to-steal-13-million\/?\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Fraudsters Coordinate 14,000 ATM Withdrawals in 3 Hours to Steal $13 Million<\/a> (theepochtimes.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New Skimer malware allows hackers to gain control of an AYM and steal your cash and credentials <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2686,2702,420,2389,1165,2698,1452,2442,2494,2700,824,164,2498,23,2370,4,2699,2701],"class_list":["post-80503","post","type-post","status-publish","format-standard","hentry","category-security","tag-2686","tag-3d-secure","tag-aapl","tag-apple-pay","tag-apt","tag-atm","tag-biometrics","tag-credit-card","tag-debit-card","tag-emv","tag-encryption","tag-fraud","tag-kaspersky-lab","tag-malware","tag-pci-dss","tag-security","tag-skimer","tag-tokenization"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=80503"}],"version-history":[{"count":14,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80503\/revisions"}],"predecessor-version":[{"id":131621,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80503\/revisions\/131621"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=80503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=80503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=80503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}