{"id":52515,"date":"2024-07-15T20:18:50","date_gmt":"2024-07-15T20:18:50","guid":{"rendered":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/"},"modified":"2024-07-15T20:18:50","modified_gmt":"2024-07-15T20:18:50","slug":"heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice","status":"publish","type":"post","link":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/","title":{"rendered":"Here\u2019s how carefully concealed backdoor in fake AWS files escaped mainstream notice"},"content":{"rendered":"<div>\n<div id=\"rss-wrap\">\n<figure class=\"intro-image intro-left\">\n  <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/03\/backdoor-800x450.jpeg\" alt=\"A cartoon door leads to a wall of computer code.\" \/><\/p>\n<p class=\"caption\" style=\"font-size:0.8em\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/03\/backdoor.jpeg\" class=\"enlarge-link\" data-height=\"563\" data-width=\"1000\">Enlarge<\/a> (credit: <a rel=\"nofollow\" class=\"caption-link\" href=\"https:\/\/www.gettyimages.com\/editorial-images\">BeeBright \/ Getty Images \/ iStockphoto<\/a>)<\/p>\n<\/figure>\n<div><a name=\"page-1\"><\/a><\/div>\n<p>Researchers have determined that two fake AWS packages downloaded hundreds of times from the open source NPM JavaScript repository contained carefully concealed code that backdoored developers&#8217; computers when executed.<\/p>\n<p>The packages\u2014<code>img-aws-s3-object-multipart-copy<\/code> and <code>legacyaws-s3-object-multipart-copy<\/code>\u2014were attempts to appear as <a href=\"https:\/\/github.com\/little-core-labs\/aws-s3-object-multipart-copy\">aws-s3-object-multipart-copy<\/a>, a legitimate JavaScript library for copying files using Amazon\u2019s S3 cloud service. The fake files included all the code found in the legitimate library but added an additional JavaScript file named loadformat.js. That file provided what appeared to be benign code and three JPG images that were processed during package installation. One of those images contained code fragments that, when reconstructed, formed code for backdooring the developer device.<\/p>\n<h2>Growing sophistication<\/h2>\n<p>\u201cWe have reported these packages for removal, however the malicious packages remained available on npm for nearly two days,\u201d researchers from Phylum, the security firm that spotted the packages, <a href=\"https:\/\/blog.phylum.io\/fake-aws-packages-ship-command-and-control-malware-in-jpeg-files\/\">wrote<\/a>. \u201cThis is worrying as it implies that most systems are unable to detect and promptly report on these packages, leaving developers vulnerable to attack for longer periods of time.\u201d<\/p>\n<\/div>\n<p><a href=\"https:\/\/arstechnica.com\/?p=2037194#p3\">Read 7 remaining paragraphs<\/a> | <a href=\"https:\/\/arstechnica.com\/?p=2037194&amp;comments=1\">Comments<\/a><\/p>\n<\/div>\n<p class=\"wpematico_credit\"><small>Powered by <a href=\"http:\/\/www.wpematico.com\" target=\"_blank\" rel=\"noopener\">WPeMatico<\/a><\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enlarge (credit: BeeBright \/ Getty Images \/ iStockphoto) Researchers have determined that two fake AWS packages downloaded hundreds of times from the open source NPM JavaScript repository contained carefully concealed code that backdoored developers&#8217; computers when executed. The packages\u2014img-aws-s3-object-multipart-copy and legacyaws-s3-object-multipart-copy\u2014were attempts to appear as aws-s3-object-multipart-copy, a legitimate JavaScript library for copying files using Amazon\u2019s S3 cloud service. The fake files included all the code found in the legitimate library&#8230;<\/p>\n","protected":false},"author":1,"featured_media":52516,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[241],"tags":[],"class_list":["post-52515","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Here\u2019s how carefully concealed backdoor in fake AWS files escaped mainstream notice - UshopWell.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Here\u2019s how carefully concealed backdoor in fake AWS files escaped mainstream notice - UshopWell.com\" \/>\n<meta property=\"og:description\" content=\"Enlarge (credit: BeeBright \/ Getty Images \/ iStockphoto) Researchers have determined that two fake AWS packages downloaded hundreds of times from the open source NPM JavaScript repository contained carefully concealed code that backdoored developers&#8217; computers when executed. The packages\u2014img-aws-s3-object-multipart-copy and legacyaws-s3-object-multipart-copy\u2014were attempts to appear as aws-s3-object-multipart-copy, a legitimate JavaScript library for copying files using Amazon\u2019s S3 cloud service. The fake files included all the code found in the legitimate library...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/\" \/>\n<meta property=\"og:site_name\" content=\"UshopWell.com\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-15T20:18:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2024\/07\/backdoor-800x450-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"UShopWell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UShopWell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\\\/\"},\"author\":{\"name\":\"UShopWell\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/person\\\/6fd1f9e0ff932e534c86c70d5acff0fc\"},\"headline\":\"Here\u2019s how carefully concealed backdoor in fake AWS files escaped mainstream notice\",\"datePublished\":\"2024-07-15T20:18:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\\\/\"},\"wordCount\":196,\"publisher\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/backdoor-800x450-1.jpeg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\\\/\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\\\/\",\"name\":\"Here\u2019s how carefully concealed backdoor in fake AWS files escaped mainstream notice - UshopWell.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/backdoor-800x450-1.jpeg\",\"datePublished\":\"2024-07-15T20:18:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/backdoor-800x450-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/backdoor-800x450-1.jpeg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Here\u2019s how carefully concealed backdoor in fake AWS files escaped mainstream notice\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#website\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/\",\"name\":\"UshopWell.com\",\"description\":\"The Premiere Online Marketplace\",\"publisher\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#organization\",\"name\":\"UshopWell\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/pandaSwea.png\",\"contentUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/pandaSwea.png\",\"width\":365,\"height\":359,\"caption\":\"UshopWell\"},\"image\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/person\\\/6fd1f9e0ff932e534c86c70d5acff0fc\",\"name\":\"UShopWell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g\",\"caption\":\"UShopWell\"},\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/author\\\/kburnettu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Here\u2019s how carefully concealed backdoor in fake AWS files escaped mainstream notice - UshopWell.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/","og_locale":"en_US","og_type":"article","og_title":"Here\u2019s how carefully concealed backdoor in fake AWS files escaped mainstream notice - UshopWell.com","og_description":"Enlarge (credit: BeeBright \/ Getty Images \/ iStockphoto) Researchers have determined that two fake AWS packages downloaded hundreds of times from the open source NPM JavaScript repository contained carefully concealed code that backdoored developers&#8217; computers when executed. The packages\u2014img-aws-s3-object-multipart-copy and legacyaws-s3-object-multipart-copy\u2014were attempts to appear as aws-s3-object-multipart-copy, a legitimate JavaScript library for copying files using Amazon\u2019s S3 cloud service. The fake files included all the code found in the legitimate library...","og_url":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/","og_site_name":"UshopWell.com","article_published_time":"2024-07-15T20:18:50+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2024\/07\/backdoor-800x450-1.jpeg","type":"image\/jpeg"}],"author":"UShopWell","twitter_card":"summary_large_image","twitter_misc":{"Written by":"UShopWell","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/#article","isPartOf":{"@id":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/"},"author":{"name":"UShopWell","@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/person\/6fd1f9e0ff932e534c86c70d5acff0fc"},"headline":"Here\u2019s how carefully concealed backdoor in fake AWS files escaped mainstream notice","datePublished":"2024-07-15T20:18:50+00:00","mainEntityOfPage":{"@id":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/"},"wordCount":196,"publisher":{"@id":"https:\/\/ushopwell.com\/ublog\/#organization"},"image":{"@id":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/#primaryimage"},"thumbnailUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2024\/07\/backdoor-800x450-1.jpeg","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/","url":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/","name":"Here\u2019s how carefully concealed backdoor in fake AWS files escaped mainstream notice - UshopWell.com","isPartOf":{"@id":"https:\/\/ushopwell.com\/ublog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/#primaryimage"},"image":{"@id":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/#primaryimage"},"thumbnailUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2024\/07\/backdoor-800x450-1.jpeg","datePublished":"2024-07-15T20:18:50+00:00","breadcrumb":{"@id":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/#primaryimage","url":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2024\/07\/backdoor-800x450-1.jpeg","contentUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2024\/07\/backdoor-800x450-1.jpeg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/ushopwell.com\/ublog\/heres-how-carefully-concealed-backdoor-in-fake-aws-files-escaped-mainstream-notice\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ushopwell.com\/ublog\/"},{"@type":"ListItem","position":2,"name":"Here\u2019s how carefully concealed backdoor in fake AWS files escaped mainstream notice"}]},{"@type":"WebSite","@id":"https:\/\/ushopwell.com\/ublog\/#website","url":"https:\/\/ushopwell.com\/ublog\/","name":"UshopWell.com","description":"The Premiere Online Marketplace","publisher":{"@id":"https:\/\/ushopwell.com\/ublog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ushopwell.com\/ublog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ushopwell.com\/ublog\/#organization","name":"UshopWell","url":"https:\/\/ushopwell.com\/ublog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/logo\/image\/","url":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2018\/01\/pandaSwea.png","contentUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2018\/01\/pandaSwea.png","width":365,"height":359,"caption":"UshopWell"},"image":{"@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/person\/6fd1f9e0ff932e534c86c70d5acff0fc","name":"UShopWell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g","caption":"UShopWell"},"url":"https:\/\/ushopwell.com\/ublog\/author\/kburnettu\/"}]}},"_links":{"self":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/posts\/52515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/comments?post=52515"}],"version-history":[{"count":0,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/posts\/52515\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/media\/52516"}],"wp:attachment":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/media?parent=52515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/categories?post=52515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/tags?post=52515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}