{"id":70489,"date":"2022-02-24T13:43:14","date_gmt":"2022-02-24T21:43:14","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/blog\/cybersecurity-asset-management-know-whats-on-your-network-copy\/"},"modified":"2024-06-03T09:26:54","modified_gmt":"2024-06-03T16:26:54","slug":"blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/","title":{"rendered":"BlackByte Ransomware Breach: Can\u2019t Forget Compliance Basics"},"content":{"rendered":"<p>On Sunday, Feb. 13, the NFL\u2019s San Francisco 49er organization issued a statement confirming they experienced a network security incident. Shortly after the incident, BlackByte ransomware gang listed the 49ers as one of their alleged victims. The 49ers franchise didn\u2019t confirm if ransomware was involved, but it did state that only the corporate IT network was affected. As with all breaches, one commonality eventually appears: vulnerabilities.<\/p>\n<p>While vulnerabilities are both system-centric and people-centric, ultimately it takes system-level vulnerabilities for the adversary to traverse around the environment, performing reconnaissance, navigating under the radar of today\u2019s monitoring solutions and SIEMs, and deploying malicious payloads.<\/p>\n<h2>Unpatched devices leave your network vulnerable<\/h2>\n<p>The 49ers\u2019 hack is no different, as it was disclosed that the attackers exploited three Microsoft Exchange vulnerabilities patched by two Microsoft knowledge bases (KB) from April and May, collectively known as <a href=\"https:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/us-21-ProxyLogon-Is-Just-The-Tip-Of-The-Iceberg-A-New-Attack-Surface-On-Microsoft-Exchange-Server.pdf\" target=\"new\" rel=\"noopener\">ProxyShell<\/a>:<\/p>\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34473\" target=\"new\" rel=\"noopener\">CVE-2021-34473<\/a> \u00ad\u2013 Pre-auth Path Confusion leads to ACL Bypass (Patched in April by <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-april-13-2021-kb5001779-8e08f3b3-fc7b-466c-bbb7-5d5aa16ef064\" target=\"new\" rel=\"noopener\">KB5001779<\/a>)<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34523\" target=\"new\" rel=\"noopener\">CVE-2021-34523<\/a> \u2013 Elevation of Privilege on Exchange PowerShell Backend (Patched in April by <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-april-13-2021-kb5001779-8e08f3b3-fc7b-466c-bbb7-5d5aa16ef064\" target=\"new\" rel=\"noopener\">KB5001779<\/a>)<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-31207\" target=\"new\" rel=\"noopener\">CVE-2021-31207<\/a> \u2013 Post-auth Arbitrary-File-Write leads to RCE (Patched in May by <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-may-11-2021-kb5003435-028bd051-b2f1-4310-8f35-c41c9ce5a2f1\" target=\"new\" rel=\"noopener\">KB5003435<\/a>)<\/li>\n<\/ul>\n<p>After successfully exploiting this trifecta of vulnerabilities in succession to gain access to the email environment, the attackers established persistence via Cobalt Strike. The adversary then obtained the credential store and used elevated privileges to install a remote desktop solution, AnyDesk, which was used to spawn the ransomware throughout the environment.<\/p>\n<p>While there were multiple aspects to this breach, there are two main areas where minor changes could have kept the adversary from being successful.<\/p>\n<ul>\n<li><strong>First, patch, patch, patch<\/strong>. Ensure you have complete awareness of what\u2019s on the network, especially what is internet facing or is in the DMZ. Ensure every device is patched in a timely fashion.<\/li>\n<li><strong>Next, shut down remote desktop protocol (RDP)<\/strong>. AnyDesk leveraged RDP to traverse the network laterally, navigating from system to system to execute the requisite scripts to deploy the ransomware.<\/li>\n<\/ul>\n<h2>You can\u2019t patch devices that you can\u2019t see<\/h2>\n<p>Patching can be hard as it initially relies upon knowledge of the device\u2019s existence and then awareness of the patching status of the device, which typically relies on agent-based communications. But, agents break and that awareness isn\u2019t there, often leaving organizations in the dark without a process to close the loop on those exceptions to the patching process. You\u2019re then left in a situation like the 49ers where an internet-facing server was left unpatched.<\/p>\n<p>Forescout provides <a href=\"https:\/\/www.forescout.com\/solutions\/device-compliance\/\">visibility into every device on the network<\/a> and will help ensure agents required for analysis of patching compliance are working properly. Additionally, Forescout will alert when easily exploited ports such as those associated with RDP are open. If you want to level the playing field against ransomware gangs and other bad actors, be sure you have the right players on your team.<\/p>\n<p><em>Shawn Taylor is the vice president of Threat Defense at Forescout.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Sunday, Feb. 13, the NFL\u2019s San Francisco 49er organization issued a statement confirming they experienced a network security incident. Shortly after the incident, BlackByte ransomware gang listed the 49ers as one of their alleged victims. The 49ers franchise didn\u2019t confirm if ransomware was involved, but it did state that only the corporate IT network [&hellip;]<\/p>\n","protected":false},"author":31,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[496],"class_list":["post-70489","post","type-post","status-publish","format-standard","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BlackByte Ransomware Breach: Can\u2019t Forget Compliance Basics - Forescout<\/title>\n<meta name=\"description\" content=\"While vulnerabilities are both system-level and people-centric, it takes the former for the adversary to traverse around the environment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can\u2019t-forget-compliance-basics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Asset Management: Know What\u2019s on Your Network\" \/>\n<meta property=\"og:description\" content=\"With the growing number and type of devices spread across campus, data center, cloud and OT\/IoMT networks, it has become increasingly difficult to identify them all. Unlike marbles, you need to know a lot more than just the number of devices. You need to know what they are, how they\u2019re connected (wired\/wireless), where they\u2019re physically located (building, closet, switch, port) and what their purpose is.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can\u2019t-forget-compliance-basics\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-24T21:43:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-03T16:26:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/FS-2022-Blog-BlackByte-02-2022-v2-Facebook.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shawn Taylor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersecurity Asset Management: Know What\u2019s on Your Network\" \/>\n<meta name=\"twitter:description\" content=\"With the growing number and type of devices spread across campus, data center, cloud and OT\/IoMT networks, it has become increasingly difficult to identify them all. Unlike marbles, you need to know a lot more than just the number of devices. You need to know what they are, how they\u2019re connected (wired\/wireless), where they\u2019re physically located (building, closet, switch, port) and what their purpose is.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/FS-2022-Blog-BlackByte-02-2022-v2-Twitter.png\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/\"},\"author\":{\"name\":\"Shawn Taylor\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/4e4da249cb27a992b0c6bffd491bd247\"},\"headline\":\"BlackByte Ransomware Breach: Can\u2019t Forget Compliance Basics\",\"datePublished\":\"2022-02-24T21:43:14+00:00\",\"dateModified\":\"2024-06-03T16:26:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/\"},\"wordCount\":491,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/\",\"name\":\"BlackByte Ransomware Breach: Can\u2019t Forget Compliance Basics - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"datePublished\":\"2022-02-24T21:43:14+00:00\",\"dateModified\":\"2024-06-03T16:26:54+00:00\",\"description\":\"While vulnerabilities are both system-level and people-centric, it takes the former for the adversary to traverse around the environment.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BlackByte Ransomware Breach: Can\u2019t Forget Compliance Basics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/4e4da249cb27a992b0c6bffd491bd247\",\"name\":\"Shawn Taylor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/3ccb599f28cf7d28c077f84773b22d35\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6e5a2c0b2f246c31f9d0b4a8d6744a1abd7a23a91aa261bc7e8969032c3edba8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6e5a2c0b2f246c31f9d0b4a8d6744a1abd7a23a91aa261bc7e8969032c3edba8?s=96&d=mm&r=g\",\"caption\":\"Shawn Taylor\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlackByte Ransomware Breach: Can\u2019t Forget Compliance Basics - Forescout","description":"While vulnerabilities are both system-level and people-centric, it takes the former for the adversary to traverse around the environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can\u2019t-forget-compliance-basics\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Asset Management: Know What\u2019s on Your Network","og_description":"With the growing number and type of devices spread across campus, data center, cloud and OT\/IoMT networks, it has become increasingly difficult to identify them all. Unlike marbles, you need to know a lot more than just the number of devices. You need to know what they are, how they\u2019re connected (wired\/wireless), where they\u2019re physically located (building, closet, switch, port) and what their purpose is.","og_url":"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can\u2019t-forget-compliance-basics\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2022-02-24T21:43:14+00:00","article_modified_time":"2024-06-03T16:26:54+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/FS-2022-Blog-BlackByte-02-2022-v2-Facebook.png","type":"image\/png"}],"author":"Shawn Taylor","twitter_card":"summary_large_image","twitter_title":"Cybersecurity Asset Management: Know What\u2019s on Your Network","twitter_description":"With the growing number and type of devices spread across campus, data center, cloud and OT\/IoMT networks, it has become increasingly difficult to identify them all. Unlike marbles, you need to know a lot more than just the number of devices. You need to know what they are, how they\u2019re connected (wired\/wireless), where they\u2019re physically located (building, closet, switch, port) and what their purpose is.","twitter_image":"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/02\/FS-2022-Blog-BlackByte-02-2022-v2-Twitter.png","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/"},"author":{"name":"Shawn Taylor","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/4e4da249cb27a992b0c6bffd491bd247"},"headline":"BlackByte Ransomware Breach: Can\u2019t Forget Compliance Basics","datePublished":"2022-02-24T21:43:14+00:00","dateModified":"2024-06-03T16:26:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/"},"wordCount":491,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/","url":"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/","name":"BlackByte Ransomware Breach: Can\u2019t Forget Compliance Basics - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"datePublished":"2022-02-24T21:43:14+00:00","dateModified":"2024-06-03T16:26:54+00:00","description":"While vulnerabilities are both system-level and people-centric, it takes the former for the adversary to traverse around the environment.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/blackbyte-ransomware-breach-can%e2%80%99t-forget-compliance-basics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"BlackByte Ransomware Breach: Can\u2019t Forget Compliance Basics"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/4e4da249cb27a992b0c6bffd491bd247","name":"Shawn Taylor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/3ccb599f28cf7d28c077f84773b22d35","url":"https:\/\/secure.gravatar.com\/avatar\/6e5a2c0b2f246c31f9d0b4a8d6744a1abd7a23a91aa261bc7e8969032c3edba8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6e5a2c0b2f246c31f9d0b4a8d6744a1abd7a23a91aa261bc7e8969032c3edba8?s=96&d=mm&r=g","caption":"Shawn Taylor"}}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/70489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=70489"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/70489\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=70489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=70489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=70489"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=70489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}