

{"id":1980,"date":"2018-11-12T19:52:33","date_gmt":"2018-11-12T19:52:33","guid":{"rendered":"https:\/\/warp.lacnic.net\/uncategorized\/bgp-hijacking-del-gobierno-de-china"},"modified":"2023-06-07T16:34:35","modified_gmt":"2023-06-07T13:34:35","slug":"bgp-hijacking-del-gobierno-de-china","status":"publish","type":"post","link":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china","title":{"rendered":"Investigaci\u00f3n: BGP Hijacking realizado por el Gobierno de China"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1935\" src=\"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/unnamed-300x143.png\" alt=\"\" width=\"300\" height=\"143\" srcset=\"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/unnamed-300x143.png 300w, https:\/\/csirt.lacnic.net\/wp-content\/uploads\/unnamed.png 536w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Seg\u00fan lo publicado en un art\u00edculo realizado por investigadores de la US Naval War College y la Tel Aviv University, el gobierno de China configur\u00f3 ataques de <strong>BGP Hijacking<\/strong> (a trav\u00e9s del proveedor de servicios China Telecom) en m\u00faltiples ocasiones, redirigiendo el tr\u00e1fico de internet de cientos de los usuarios de Estados Unidos hacia China.<\/p>\n<p>China Telecom es el tercer proveedor de servicios de internet y telecomunicaciones (ISP) del pa\u00eds, y ha estado enlazada con las redes norteamericanas desde principios de la d\u00e9cada de 2000.<br \/>\nEl tr\u00e1fico viaja entre estas redes con la ayuda del Border Gateway Protocol (BGP). Este protocolo se cre\u00f3 a principios de los a\u00f1os 80 y se basa en la confianza entre los diferentes actores de internet. BGP no presenta ning\u00fan control de seguridad, lo que permite a cualquiera anunciar una ruta BGP incorrecta y recibir tr\u00e1fico que no estaba destinado a su red.<\/p>\n<p>En la gran mayor\u00eda de los casos, estos incidentes llamados secuestros BGP (o BGP Hijacking), ocurren debido a errores de configuraci\u00f3n y se resuelven en minutos u horas. Pero tambi\u00e9n hay los que con diferentes prop\u00f3sitos, secuestran rutas BGP para enviar tr\u00e1fico leg\u00edtimo a servidores maliciosos. Las principal motivaci\u00f3n es interceptar el tr\u00e1fico para realizar ataques de suplantaci\u00f3n de identidad, robo de contrase\u00f1as o registrar el tr\u00e1fico cifrado HTTPS para descifrarlo m\u00e1s tarde.<\/p>\n<p>Un mecanismo que colabora para la prevenci\u00f3n de este tipo de ataques es Certificaci\u00f3n de Recursos (RPKI). El objetivo de este proyecto es la emisi\u00f3n de material criptogr\u00e1fico que permite demostrar digitalmente el derecho al uso de direcciones IPv4 e IPv6.<br \/>\nLACNIC desarroll\u00f3 su propia implementaci\u00f3n de RPKI para fomentar su uso, este portal puede ser accedido en el siguiente <a href=\"http:\/\/rpki.lacnic.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">link<\/a>.<\/p>\n<h3>M\u00e1s informaci\u00f3n:<\/h3>\n<ul>\n<li><a href=\"https:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1050&amp;context=mca\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1050&amp;context=mca<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.zdnet.com\/article\/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries\/<\/a><\/li>\n<li><a href=\"http:\/\/www.lacnic.net\/980\/1\/lacnic\/certificacion-de-recursos-rpki\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.lacnic.net\/980\/1\/lacnic\/certificacion-de-recursos-rpki<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Seg\u00fan lo publicado en un art\u00edculo realizado por investigadores de la US Naval War College y la Tel Aviv University, el gobierno de China configur\u00f3 ataques de BGP Hijacking (a trav\u00e9s del proveedor de servicios China Telecom) en m\u00faltiples ocasiones, redirigiendo el tr\u00e1fico de internet de cientos de los usuarios de Estados Unidos hacia China. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1954,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[46,18,24],"tags":[],"class_list":["post-1980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-archive","category-news","category-security-alerts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC CSIRT - Investigaci\u00f3n: BGP Hijacking realizado por el Gobierno de China<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC CSIRT - Investigaci\u00f3n: BGP Hijacking realizado por el Gobierno de China\" \/>\n<meta property=\"og:description\" content=\"Seg\u00fan lo publicado en un art\u00edculo realizado por investigadores de la US Naval War College y la Tel Aviv University, el gobierno de China configur\u00f3 ataques de BGP Hijacking (a trav\u00e9s del proveedor de servicios China Telecom) en m\u00faltiples ocasiones, redirigiendo el tr\u00e1fico de internet de cientos de los usuarios de Estados Unidos hacia China. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC CSIRT\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-12T19:52:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-07T13:34:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/bgp-china-investigacion.png\" \/>\n\t<meta property=\"og:image:width\" content=\"495\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"staffadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic_csirt\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic_csirt\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china\"},\"author\":{\"name\":\"staffadmin\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/person\\\/6515878a80d7f33d87c848ee36332423\"},\"headline\":\"Investigaci\u00f3n: BGP Hijacking realizado por el Gobierno de China\",\"datePublished\":\"2018-11-12T19:52:33+00:00\",\"dateModified\":\"2023-06-07T13:34:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china\"},\"wordCount\":345,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/bgp-china-investigacion.png\",\"articleSection\":[\"Archive\",\"News\",\"Security Alerts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china\",\"name\":\"LACNIC CSIRT - Investigaci\u00f3n: BGP Hijacking realizado por el Gobierno de China\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/bgp-china-investigacion.png\",\"datePublished\":\"2018-11-12T19:52:33+00:00\",\"dateModified\":\"2023-06-07T13:34:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china#primaryimage\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/bgp-china-investigacion.png\",\"contentUrl\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/bgp-china-investigacion.png\",\"width\":495,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/news\\\/bgp-hijacking-del-gobierno-de-china#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Investigaci\u00f3n: BGP Hijacking realizado por el Gobierno de China\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/\",\"name\":\"LACNIC CSIRT\",\"description\":\"Incident Response Center - LACNIC CSIRT\",\"publisher\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\",\"name\":\"LACNIC CSIRT\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/lacnic-csirt-2020.png\",\"contentUrl\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/lacnic-csirt-2020.png\",\"width\":680,\"height\":330,\"caption\":\"LACNIC CSIRT\"},\"image\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/lacnic_csirt\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/person\\\/6515878a80d7f33d87c848ee36332423\",\"name\":\"staffadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/de0c6fd2fb1bac54ad75003cf602dae06bf1d694dfd6c6699f1ef567587f8c0d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/de0c6fd2fb1bac54ad75003cf602dae06bf1d694dfd6c6699f1ef567587f8c0d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/de0c6fd2fb1bac54ad75003cf602dae06bf1d694dfd6c6699f1ef567587f8c0d?s=96&d=mm&r=g\",\"caption\":\"staffadmin\"},\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/author\\\/staffadmin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC CSIRT - Investigaci\u00f3n: BGP Hijacking realizado por el Gobierno de China","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china","og_locale":"en_US","og_type":"article","og_title":"LACNIC CSIRT - Investigaci\u00f3n: BGP Hijacking realizado por el Gobierno de China","og_description":"Seg\u00fan lo publicado en un art\u00edculo realizado por investigadores de la US Naval War College y la Tel Aviv University, el gobierno de China configur\u00f3 ataques de BGP Hijacking (a trav\u00e9s del proveedor de servicios China Telecom) en m\u00faltiples ocasiones, redirigiendo el tr\u00e1fico de internet de cientos de los usuarios de Estados Unidos hacia China. [&hellip;]","og_url":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china","og_site_name":"LACNIC CSIRT","article_published_time":"2018-11-12T19:52:33+00:00","article_modified_time":"2023-06-07T13:34:35+00:00","og_image":[{"width":495,"height":330,"url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/bgp-china-investigacion.png","type":"image\/png"}],"author":"staffadmin","twitter_card":"summary_large_image","twitter_creator":"@lacnic_csirt","twitter_site":"@lacnic_csirt","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china#article","isPartOf":{"@id":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china"},"author":{"name":"staffadmin","@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/person\/6515878a80d7f33d87c848ee36332423"},"headline":"Investigaci\u00f3n: BGP Hijacking realizado por el Gobierno de China","datePublished":"2018-11-12T19:52:33+00:00","dateModified":"2023-06-07T13:34:35+00:00","mainEntityOfPage":{"@id":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china"},"wordCount":345,"commentCount":0,"publisher":{"@id":"https:\/\/csirt.lacnic.net\/en\/#organization"},"image":{"@id":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china#primaryimage"},"thumbnailUrl":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/bgp-china-investigacion.png","articleSection":["Archive","News","Security Alerts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china#respond"]}]},{"@type":"WebPage","@id":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china","url":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china","name":"LACNIC CSIRT - Investigaci\u00f3n: BGP Hijacking realizado por el Gobierno de China","isPartOf":{"@id":"https:\/\/csirt.lacnic.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china#primaryimage"},"image":{"@id":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china#primaryimage"},"thumbnailUrl":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/bgp-china-investigacion.png","datePublished":"2018-11-12T19:52:33+00:00","dateModified":"2023-06-07T13:34:35+00:00","breadcrumb":{"@id":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china#primaryimage","url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/bgp-china-investigacion.png","contentUrl":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/bgp-china-investigacion.png","width":495,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/csirt.lacnic.net\/en\/news\/bgp-hijacking-del-gobierno-de-china#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/csirt.lacnic.net\/en"},{"@type":"ListItem","position":2,"name":"Investigaci\u00f3n: BGP Hijacking realizado por el Gobierno de China"}]},{"@type":"WebSite","@id":"https:\/\/csirt.lacnic.net\/en\/#website","url":"https:\/\/csirt.lacnic.net\/en\/","name":"LACNIC CSIRT","description":"Incident Response Center - LACNIC CSIRT","publisher":{"@id":"https:\/\/csirt.lacnic.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csirt.lacnic.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csirt.lacnic.net\/en\/#organization","name":"LACNIC CSIRT","url":"https:\/\/csirt.lacnic.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","contentUrl":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","width":680,"height":330,"caption":"LACNIC CSIRT"},"image":{"@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/lacnic_csirt"]},{"@type":"Person","@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/person\/6515878a80d7f33d87c848ee36332423","name":"staffadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/de0c6fd2fb1bac54ad75003cf602dae06bf1d694dfd6c6699f1ef567587f8c0d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/de0c6fd2fb1bac54ad75003cf602dae06bf1d694dfd6c6699f1ef567587f8c0d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/de0c6fd2fb1bac54ad75003cf602dae06bf1d694dfd6c6699f1ef567587f8c0d?s=96&d=mm&r=g","caption":"staffadmin"},"url":"https:\/\/csirt.lacnic.net\/en\/author\/staffadmin"}]}},"jetpack_featured_media_url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/bgp-china-investigacion.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/1980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=1980"}],"version-history":[{"count":0,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/1980\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/media\/1954"}],"wp:attachment":[{"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=1980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=1980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=1980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}