{"id":84446,"date":"2017-06-15T20:22:58","date_gmt":"2017-06-16T00:22:58","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-08-11T17:09:41","modified_gmt":"2022-08-11T21:09:41","slug":"scary-ss7-flaw-strikes-banks","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/scary-ss7-flaw-strikes-banks\/","title":{"rendered":"Scary SS7 Flaw Strikes Banks"},"content":{"rendered":"<p><a href=\"https:\/\/www.theregister.co.uk\/2017\/05\/03\/hackers_fire_up_ss7_flaw\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Scary SS7 Flaw Strikes Banks\" src=\"https:\/\/i0.wp.com\/regmedia.co.uk\/2017\/05\/03\/theft_shutterstock.jpg?resize=177%2C96&#038;ssl=1\" alt=\"Scary SS7 Flaw Strikes Banks\" width=\"177\" height=\"96\" \/><\/a>Lost in last month\u2019s hubbub over <a href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/the-nsa-has-linked-the-wannacry-computer-worm-to-north-korea\/2017\/06\/14\/101395a2-508e-11e7-be25-3a519335381c_story.html\" target=\"_blank\" rel=\"noopener noreferrer\">WannaCry<\/a> <a href=\"https:\/\/web.archive.org\/web\/20170711174636\/https:\/\/www.microsoft.com\/en-us\/security\/portal\/mmpc\/shared\/ransomware.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware<\/a> was the revelation that hackers had <strong>successfully exploited<\/strong> the SS7 \u201cflaw\u201d in January 2017. In May reports surfaced that hackers were able to remotely pilfer German bank accounts by taking advantage of vulnerabilities in <a href=\"http:\/\/searchnetworking.techtarget.com\/definition\/Signaling-System-7\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Signaling System 7<\/strong><\/a> (SS7). SS7 is a standard that defines how the public phone system talks to itself to complete a phone call.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/telephone-operators-1.jpg?ssl=1\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-117930\" title=\"Signaling System 7 is a standard that defines how the public phone system talks to itself to complete a phone call.\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/telephone-operators-1.jpg?resize=125%2C94&#038;ssl=1\" alt=\"Signaling System 7 is a standard that defines how the public phone system talks to itself to complete a phone call.\" width=\"125\" height=\"94\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/telephone-operators-1.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/telephone-operators-1.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/telephone-operators-1.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/><\/a>The <strong>high-tech heist<\/strong> was initially reported by the German newspaper <a href=\"http:\/\/www.sueddeutsche.de\/digital\/it-sicherheit-schwachstelle-im-mobilfunknetz-kriminelle-hacker-raeumen-konten-leer-1.3486504\" target=\"_blank\" rel=\"noopener noreferrer\">S\u00fcddeutsche Zeitung<\/a> (auf Deutsch). The attack was a sophisticated operation that combined targeted <strong>phishing emails<\/strong> and <strong>SS7 exploits<\/strong> to <strong>bypass two-factor authentication<\/strong> (2FA) protection. This is the first publicly known exploit of SS7 to intercept two-factor authentication codes sent by a bank to confirm actions taken by online banking customers.<\/p>\n<h3>How hackers get in<\/h3>\n<p><a href=\"https:\/\/arstechnica.com\/security\/2017\/05\/thieves-drain-2fa-protected-bank-accounts-by-abusing-ss7-routing-protocol\/\" target=\"_blank\" rel=\"noopener noreferrer\">According<\/a> to <a href=\"https:\/\/arstechnica.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>ars Technica<\/em><\/a>, the attack began with traditional <strong>bank-fraud trojans<\/strong>. These trojans infect account holders&#8217; computers and steal the passwords used to log in to bank accounts. From there, attackers could view account balances, but were prevented from making transfers without the one-time password the bank sent as a text message. After <strong>stealing<\/strong> the necessary <strong>login details via phishing emails<\/strong>, the perpetrators leveraged the SS7 flaw to <strong>intercept<\/strong> the associated mTAN (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Transaction_authentication_number#Mobile_TAN_.28mTAN.29\" target=\"_blank\" rel=\"noopener noreferrer\">mobile transaction authentication numbers<\/a>) <strong>authentication codes<\/strong> sent to the victims \u2014 messages notifying them of account activity \u2014 to validate the transactions and remain hidden, investigators say.<\/p>\n<p><a href=\"http:\/\/www.atdetroit.net\/forum\/messages\/6790\/63149.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Central office equipment\" src=\"https:\/\/i0.wp.com\/www.atdetroit.net\/forum\/messages\/6790\/63226.jpg?resize=159%2C115\" alt=\"Central office equipment\" width=\"159\" height=\"115\" \/><\/a>German Telecommunications giant <a href=\"https:\/\/www.telefonica.de\/\" target=\"_blank\" rel=\"noopener noreferrer\">O2-Telefonica<\/a> confirmed details of the SS7-based cyberattacks to the newspaper. <em>Ars<\/em> says, in the past, attackers have obtained mTANs by obtaining a duplicate SIM card that allows them to take control of the bank customer&#8217;s phone number. SS7-facilitated compromises, by contrast,<strong> can be done remotely on a much larger quantity<\/strong> of phone numbers.<\/p>\n<p>O2 Telefonica <a href=\"https:\/\/www.helpnetsecurity.com\/2017\/05\/04\/ss7-vulnerabilities-exploited\/\" target=\"_blank\" rel=\"noopener noreferrer\">confirmed<\/a> to <a href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Help Net Security<\/em><\/a> that the attackers were able to gain access to the network of a foreign mobile network operator in January 2017. The attackers likely <strong>purchased access to the foreign telecommunications provider<\/strong> \u2013 this can apparently be done for less than 1,000 euros \u2013 and have set up a call and SMS forwarding.<\/p>\n<h3>Two-factor authentication<\/h3>\n<p><a href=\"http:\/\/www.atdetroit.net\/forum\/messages\/6790\/63149.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Ford Road CO in Dearborn Mi is the Oregon office\" src=\"https:\/\/i0.wp.com\/www.atdetroit.net\/forum\/messages\/6790\/63211.jpg?resize=188%2C119\" alt=\"Ford Road CO in Dearborn Mi is the Oregon office\" width=\"188\" height=\"119\" \/><\/a><a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/two-factor-authentication\" target=\"_blank\" rel=\"noopener noreferrer\">Two-factor authentication<\/a> (2FA) is a security process in which the user provides<strong> two authentication factors to verify they are who they say they are<\/strong>.\u00a0 2FA provides an extra layer of security and makes it harder for attackers to gain access to a person&#8217;s devices and online accounts because knowing the victim&#8217;s password alone is not enough to pass the authentication check. Two-factor authentication has long been used to control access to sensitive systems and data, and online services are increasingly introducing 2FA to prevent their users&#8217; data from being accessed by hackers who have stolen a password database or used phishing campaigns to get users&#8217; passwords.<\/p>\n<p>News of the incident prompted widespread concern online. Security advocates railed against the popular and continuous use of<strong> text messages to authenticate account information<\/strong> while growing evidence suggests that SS7 is an unsafe channel to deliver such data. Security experts told <em>ars<\/em> that the same SS7-centric hacking techniques used against German banks will become increasingly prevalent in the future, forcing organizations to reconsider how they authenticate user activity.<\/p>\n<h3>The end of 2FA?<\/h3>\n<p>Cris Thomas, a strategist at <a href=\"https:\/\/www.tenable.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tenable Network Security<\/a> warns in the article:<\/p>\n<p style=\"padding-left: 30px;\"><em>While this is not the end of 2FA, it may be the end of 2FA over SS7, which comprises a majority of 2FA systems \u2026 Vulnerabilities in SS7 and other cellular protocols aren\u2019t new. They have been presented at security conferences for years \u2026 there are other more secure protocols available now that systems can switch to&#8230;<\/em><\/p>\n<p>Cybersecurity researchers began issuing <strong>warnings about this flaw in late 2014<\/strong> about dangerous flaws in SS7. I wrote about the SS7 flaw in <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/sms-is-done\/\" target=\"_blank\" rel=\"noopener noreferrer\">September of 2016<\/a>\u00a0 and in <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/your-mobile-is-leaking\/\" target=\"_blank\" rel=\"noopener noreferrer\">March 2107<\/a>. Maybe this will be the <strong>wake-up call<\/strong> for the carriers. One industry insider <a href=\"https:\/\/www.cyberscoop.com\/finally-happened-criminals-exploit-ss7-vulnerabilities-prompting-concerns-2fa\/\" target=\"_blank\" rel=\"noopener noreferrer\">quipped<\/a>:<\/p>\n<p style=\"padding-left: 30px;\"><em>This latest attack serves as a warning to the mobile community about what is at stake if these loopholes aren\u2019t closed \u2026 The industry at large needs to go beyond simple measures such as two-factor authentication, to protect mobile users and their data, and invest in more sophisticated mobile security.<\/em><\/p>\n<h3>SS7 allows voice networks to interoperate<\/h3>\n<p><a href=\"http:\/\/web.cs.ucla.edu\/classes\/winter13\/cs111\/scribe\/17b\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-117931 size-medium\" title=\"a man-in-the-middle attack \" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mitm.png?resize=150%2C113&#038;ssl=1\" alt=\"a man-in-the-middle attack \" width=\"150\" height=\"113\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mitm.png?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mitm.png?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mitm.png?w=720&amp;ssl=1 720w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>In 2014 security researchers first <a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2014\/12\/18\/german-researchers-discover-a-flaw-that-could-let-anyone-listen-to-your-cell-calls-and-read-your-texts\/\" target=\"_blank\" rel=\"noopener noreferrer\">demonstrated<\/a> that SS7 could be exploited to track and eavesdrop on cell phones. This new attack is essentially a<strong> man-in-the-middle attack<\/strong> on cell phone communications. It exploits the lack of authentication in the communication protocols that run on top of SS7.<\/p>\n<p>Developed in 1975, today, over 800 telecommunications companies around the world, including\u00a0<a title=\"AT&amp;T\" href=\"http:\/\/www.att.com\/\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">AT&amp;T<\/a> (<a title=\"NYSE : T\" href=\"https:\/\/www.nyse.com\/quote\/XNYS:T\" target=\"_blank\" rel=\"noopener noreferrer\">T<\/a>) and\u00a0<a title=\"Verizon\" href=\"http:\/\/www.verizon.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon<\/a> (<a title=\"NASDAQ : VZ\" href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-VZ\/\" target=\"_blank\" rel=\"noopener noreferrer\">VZ<\/a>), use \u00a0This technology has not kept up with modern times.\u00a0 In May 2017, <a href=\"https:\/\/www.wired.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Wired<\/em><\/a> <a href=\"https:\/\/www.wired.com\/2017\/05\/fix-ss7-two-factor-authentication-bank-accounts\/\" target=\"_blank\" rel=\"noopener noreferrer\">published an article<\/a> that explains some of the ways to secure SS7. <strong>Overcoming SS7 insecurity<\/strong> requires implementing a series of <strong>firewalls<\/strong> and filters that can stop the attacks. Researchers <em>Wired<\/em> spoke to suggest that adding <strong>encryption<\/strong> to SS7 would shield network traffic from prying eyes and bolster authentication. Both of these changes are <strong>unpopular with the carriers<\/strong>\u00a0because they cost money and can impact the network core, so don\u2019t expect any network changes to address the SS7 flaw anytime soon.<\/p>\n<p><a href=\"http:\/\/www.anam.com\/news-events\/anam-technologies-launches-its-managed-ss7-firewall\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Carriers should use SS7 firewall to secure the SS7 network\" src=\"https:\/\/i0.wp.com\/www.anam.com\/wp-content\/uploads\/2015\/01\/ss7_firewall_icon.png?resize=73%2C94\" alt=\"Carriers should use SS7 firewall to secure the SS7 network\" width=\"73\" height=\"94\" \/><\/a>The <a href=\"https:\/\/www.theregister.co.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Register<\/em><\/a> <a href=\"https:\/\/www.theregister.co.uk\/2017\/05\/03\/hackers_fire_up_ss7_flaw\/\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that the <a href=\"https:\/\/www.fcc.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">FCC\u2019s<\/a> <a href=\"https:\/\/www.fcc.gov\/about-fcc\/advisory-committees\/communications-security-reliability-and-interoperability\" target=\"_blank\" rel=\"noopener noreferrer\">Communications Security, Reliability and Interoperability Council<\/a> <a href=\"https:\/\/www.fcc.gov\/about-fcc\/advisory-committees\/communications-security-reliability-and-interoperability#block-menu-block-4.\" target=\"_blank\" rel=\"noopener noreferrer\">found<\/a> that the proposed <strong>replacement<\/strong> for SS7 on 5G networks, dubbed the <strong>Diameter protocol<\/strong><strong> has security holes<\/strong> too.<\/p>\n<p>In March 2017, Oregon Sen. Ron Wyden and California Rep. Ted Lieu sent a letter to<strong> <a href=\"https:\/\/www.dhs.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Homeland Security&#8217;s<\/a><\/strong> John Kelly requesting that DHS investigate and provide information about the impact of SS7 vulnerabilities to U.S. companies and governmental agencies. Kelly <strong>has not responded<\/strong> to the letter, according to the <em>Wired<\/em> article.<\/p>\n<p>Of course, the TLA&#8217;s would never use this \u201cflaw\u201d in SS7 to spy on us.<\/p>\n<h3>What can you do?<\/h3>\n<p><a href=\"https:\/\/www.theguardian.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>The Guardian<\/em><\/a> <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/apr\/19\/ss7-hack-explained-mobile-phone-vulnerability-snooping-texts-calls\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> that given that the SS7 vulnerabilities reside on systems outside of your control, there is very <strong>little you can do to protect yourself<\/strong> beyond not using the services.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-103768\" title=\"Politican\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/politician-2.jpg?resize=90%2C98&#038;ssl=1\" alt=\"Politican\" width=\"90\" height=\"98\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/politician-2.jpg?resize=69%2C75&amp;ssl=1 69w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/politician-2.jpg?resize=138%2C150&amp;ssl=1 138w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/politician-2.jpg?w=559&amp;ssl=1 559w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/>They recommend for text messages, <strong>avoiding SMS<\/strong>\u00a0instead of using <strong>encrypted messaging services<\/strong> such as <a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple&#8217;s<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <a href=\"https:\/\/support.apple.com\/en-us\/HT207006\" target=\"_blank\" rel=\"noopener noreferrer\">iMessage<\/a>, <a title=\"Facebook\" href=\"https:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>&#8216;s (<a title=\"NASDAQ : FB\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FB\/\" target=\"_blank\" rel=\"noopener noreferrer\">FB<\/a>) <a href=\"https:\/\/www.whatsapp.com\" target=\"_blank\" rel=\"noopener noreferrer\">WhatsApp<\/a> or the many others available will allow you to send and receive instant messages without having to go through the SMS network to protect your messages from surveillance.<\/p>\n<p>For <strong>calls<\/strong>, the <em>Guardian<\/em> recommends using a service that carries <strong>voice over data<\/strong> and not through the voice network. This will help prevent your calls from being snooped on. Messaging services including WhatsApp permit calls. <a href=\"https:\/\/www.silentcircle.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Silent Circle\u2019s <\/a>end-to-end encrypted Phone service or the open-source <a href=\"https:\/\/ssd.eff.org\/en\/module\/how-use-signal-android\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Signal app<\/strong><\/a> also allows secure voice communications.<\/p>\n<p>Your <strong>location<\/strong> could be being tracked at any stage when you have your mobile phone on. The only way to avoid it is to turn off your phone or turn off its connection to the mobile phone network and <strong>rely on Wi-Fi<\/strong> instead.<\/p>\n<p><strong>Related articles<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/techcrunch.com\/2017\/03\/15\/ss7-congress-dhs-wyden-lieu\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Privacy hawks in Congress call on Homeland Security to warn Americans of SS7 hacking threat<\/a> (<a href=\"https:\/\/techcrunch.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">TechCrunch<\/a>)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attackers use phishing and flaws in phone system control network SS7 to empty bank accounts<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2990,420,101,109,2099,342,2944,824,104,1096,1536,2107,23,2943,2450,431,3053,4,2758,641,3054,933,1214,89,1501,734,2930,2871,579],"class_list":["post-84446","post","type-post","status-publish","format-standard","hentry","category-security","tag-2990","tag-aapl","tag-apple","tag-att","tag-authentication","tag-cell-phone","tag-diameter-protocol","tag-encryption","tag-facebook","tag-fb","tag-fcc","tag-firewall","tag-malware","tag-man-in-the-middle-attack","tag-mitm","tag-mobile","tag-ron-wyden","tag-security","tag-ss7","tag-t","tag-ted-lieu","tag-telephony","tag-trojan-horse","tag-verizon","tag-vulnerability","tag-vz","tag-wannacry","tag-whatsapp","tag-wi-fi-2"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/84446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=84446"}],"version-history":[{"count":14,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/84446\/revisions"}],"predecessor-version":[{"id":132193,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/84446\/revisions\/132193"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=84446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=84446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=84446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}