{"id":714,"date":"2025-04-09T18:40:46","date_gmt":"2025-04-09T18:40:46","guid":{"rendered":"https:\/\/www.techrepublic.com\/?p=4301530"},"modified":"2025-04-09T18:40:46","modified_gmt":"2025-04-09T18:40:46","slug":"microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware","status":"publish","type":"post","link":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/","title":{"rendered":"Microsoft: Windows CLFS Vulnerability Could Lead to \u2018Widespread Deployment and Detonation of Ransomware\u2019"},"content":{"rendered":"<figure id=\"attachment_4293520\" aria-describedby=\"caption-attachment-4293520\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4293520\" src=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024.jpg\" alt=\"Flat vector illustration of a hand holding money for paying the key from hacker for unlock folder.\" width=\"1400\" height=\"900\" srcset=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024.jpg 1400w, https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024-300x193.jpg 300w, https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024-1024x658.jpg 1024w, https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024-768x494.jpg 768w, https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024-50x32.jpg 50w, https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024-770x495.jpg 770w, https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024-370x238.jpg 370w, https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024-270x174.jpg 270w, https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024-740x476.jpg 740w, https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024-540x347.jpg 540w, https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024-1110x714.jpg 1110w, https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250225-blackfog-ransomware-trend-report-2024-810x521.jpg 810w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\"><figcaption id=\"caption-attachment-4293520\" class=\"wp-caption-text\">Image: nicescene\/Adobe Stock<\/figcaption><\/figure>\n<p>Microsoft has detected a zero-day vulnerability in the Windows Common Log File System (CLFS) being exploited in the wild to deploy ransomware. Target industries include IT, real estate, finance, software, and retail, with companies based in the US, Spain, Venezuela, and Saudi Arabia.<\/p>\n<p>The vulnerability, tracked as CVE-2025-29824 and rated \u201cimportant,\u201d is present in the CLFS kernel driver. It allows an attacker who already has standard user access to a system to escalate their local privileges. The individual can then use their privileged access for \u201cwidespread deployment and detonation of ransomware within an environment,\u201d according to a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/04\/08\/exploitation-of-clfs-zero-day-leads-to-ransomware-activity\/\" target=\"_blank\" rel=\"noopener\">blog post by the Microsoft Threat Intelligence Center<\/a>.<\/p>\n<p>The CFLS driver is a key element of Windows used to write transaction logs, and its misuse could let an attacker gain SYSTEM privileges. From there, they could steal data or install backdoors. Microsoft often uncovers privilege escalation flaws in CFLS, the last one <a href=\"https:\/\/www.techrepublic.com\/article\/patch-tuesday-december-24\/\">being patched in December<\/a>.<\/p>\n<p>In instances of CVE-2025-29824 exploitation observed by Microsoft, the so-called \u201cPipeMagic\u201d malware was deployed before the attackers could exploit the vulnerability to escalate their privileges. PipeMagic gives attackers remote control over a system and lets them run commands or install more malicious tools.<\/p>\n<p><strong>SEE: TechRepublic Exclusive: <a href=\"https:\/\/www.techrepublic.com\/article\/news-ransomware-attackers-call-phones-sygnia\/\">New Ransomware Attacks are Getting More Personal<\/a> as Hackers \u2018Apply Psychological Pressure\u2019<\/strong><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Who_is_behind_the_exploitation\"><\/span>Who is behind the exploitation?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Microsoft has identified Storm-2460 as the threat actor exploiting this vulnerability with PipeMagic and ransomware, linking it to the RansomEXX group.<\/p>\n<p>Once known as Defray777, the attackers came onto the scene in 2018. They have since targeted high-profile organisations such as the Texas Department of Transportation, the Brazilian government, and Taiwanese hardware manufacturer GIGABYTE. The group has been <a href=\"https:\/\/home.treasury.gov\/news\/press-releases\/jy2114\" target=\"_blank\" rel=\"noopener\">linked to Russian nationals<\/a>.<\/p>\n<p>The US\u2019s cyber agency has added the 7.8-rated vulnerability <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/04\/08\/cisa-adds-two-known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener\">to its Known Exploited Vulnerabilities list<\/a>, meaning that federal civilian agencies are required to apply the patch by April 29.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Windows_10_Windows_11_and_Windows_Server_are_vulnerable\"><\/span>Windows 10, Windows 11, and Windows Server are vulnerable<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>On April 8, security updates were released to patch the vulnerability in Windows 11, Windows Server 2022, and Windows Server 2019. Windows 10 x64-based and 32-bit systems are still awaiting fixes, but Redmond says they will be released \u201c<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-29824\" target=\"_blank\" rel=\"noopener\">as soon as possible<\/a>,\u201d and \u201ccustomers will be notified via a revision to this CVE information\u201d as soon as they are.<\/p>\n<p>Devices running Windows 11 version 24H2 or newer cannot be exploited this way, even if the vulnerability exists. Access to the required system information is restricted to users with the \u201cSeDebugPrivilege\u201d permission, a level of access typically unavailable to standard users.<\/p>\n<aside class=\"pinbox right\">\n<h3 class=\"heading\">Must-read security coverage<\/h3>\n<\/aside>\n<h2><span class=\"ez-toc-section\" id=\"How_exploitation_works\"><\/span>How exploitation works<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Microsoft observed threat actors using the certutil command-line utility to download a malicious MSBuild file onto the victim\u2019s system.<\/p>\n<p>This file, which carried an encrypted PipeMagic payload, was available on a once-legitimate third-party website that had been compromised to host the threat actor\u2019s malware. One domain PipeMagic communicated to was aaaaabbbbbbb.eastus.cloudapp.azure[.]com, which has now been disabled.<\/p>\n<p>Once PipeMagic was decrypted and run in memory, the attackers used a dllhost.exe process to leak kernel addresses, or memory locations, to user mode. They overwrote the process\u2019s token, which defines what the process is allowed to do, with the value 0xFFFFFFFF, granting it full privileges and allowing the attackers to inject code into SYSTEM-level processes.<\/p>\n<p>Next, they injected a payload into the SYSTEM winlogon.exe process, which subsequently injected the Sysinternals procdump.exe tool into another dllhost.exe process and executed it. This enabled the threat actor to dump the memory of LSASS, a process that contains user credentials.<\/p>\n<p>Following credential theft, ransomware was deployed. Microsoft observed files being encrypted, a random extension added, and a ransom note named !_READ_ME_REXX2_!.txt dropped on affected systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Image: nicescene\/Adobe Stock Microsoft has detected a zero-day vulnerability in the Windows Common Log File System (CLFS) being exploited in the wild to deploy ransomware. Target industries include IT, real estate, finance, software, and retail, with companies based in the US, Spain, Venezuela, and Saudi Arabia. The vulnerability, tracked as CVE-2025-29824 and rated \u201cimportant,\u201d is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":715,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-714","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft: Windows CLFS Vulnerability Could Lead to \u2018Widespread Deployment and Detonation of Ransomware\u2019 - TecnoArtesanos Tech Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft: Windows CLFS Vulnerability Could Lead to \u2018Widespread Deployment and Detonation of Ransomware\u2019 - TecnoArtesanos Tech Blog\" \/>\n<meta property=\"og:description\" content=\"Image: nicescene\/Adobe Stock Microsoft has detected a zero-day vulnerability in the Windows Common Log File System (CLFS) being exploited in the wild to deploy ransomware. Target industries include IT, real estate, finance, software, and retail, with companies based in the US, Spain, Venezuela, and Saudi Arabia. The vulnerability, tracked as CVE-2025-29824 and rated \u201cimportant,\u201d is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoArtesanos Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-09T18:40:46+00:00\" \/>\n<meta name=\"author\" content=\"Sergio Morales\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sergio Morales\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/\",\"name\":\"Microsoft: Windows CLFS Vulnerability Could Lead to \u2018Widespread Deployment and Detonation of Ransomware\u2019 - TecnoArtesanos Tech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/04\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware.jpg\",\"datePublished\":\"2025-04-09T18:40:46+00:00\",\"author\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/#primaryimage\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/04\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware.jpg\",\"contentUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/04\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware.jpg\",\"width\":1400,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.tecnoartesanos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft: Windows CLFS Vulnerability Could Lead to \u2018Widespread Deployment and Detonation of Ransomware\u2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/\",\"name\":\"TecnoArtesanos Tech Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\",\"name\":\"Sergio Morales\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"caption\":\"Sergio Morales\"},\"sameAs\":[\"https:\/\/sergiomorales.space\"],\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft: Windows CLFS Vulnerability Could Lead to \u2018Widespread Deployment and Detonation of Ransomware\u2019 - TecnoArtesanos Tech Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft: Windows CLFS Vulnerability Could Lead to \u2018Widespread Deployment and Detonation of Ransomware\u2019 - TecnoArtesanos Tech Blog","og_description":"Image: nicescene\/Adobe Stock Microsoft has detected a zero-day vulnerability in the Windows Common Log File System (CLFS) being exploited in the wild to deploy ransomware. Target industries include IT, real estate, finance, software, and retail, with companies based in the US, Spain, Venezuela, and Saudi Arabia. The vulnerability, tracked as CVE-2025-29824 and rated \u201cimportant,\u201d is [&hellip;]","og_url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/","og_site_name":"TecnoArtesanos Tech Blog","article_published_time":"2025-04-09T18:40:46+00:00","author":"Sergio Morales","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sergio Morales","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/","url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/","name":"Microsoft: Windows CLFS Vulnerability Could Lead to \u2018Widespread Deployment and Detonation of Ransomware\u2019 - TecnoArtesanos Tech Blog","isPartOf":{"@id":"https:\/\/blog.tecnoartesanos.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/04\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware.jpg","datePublished":"2025-04-09T18:40:46+00:00","author":{"@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807"},"breadcrumb":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/#primaryimage","url":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/04\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware.jpg","contentUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/04\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware.jpg","width":1400,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/04\/09\/microsoft-windows-clfs-vulnerability-could-lead-to-widespread-deployment-and-detonation-of-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.tecnoartesanos.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft: Windows CLFS Vulnerability Could Lead to \u2018Widespread Deployment and Detonation of Ransomware\u2019"}]},{"@type":"WebSite","@id":"https:\/\/blog.tecnoartesanos.com\/#website","url":"https:\/\/blog.tecnoartesanos.com\/","name":"TecnoArtesanos Tech Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807","name":"Sergio Morales","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","caption":"Sergio Morales"},"sameAs":["https:\/\/sergiomorales.space"],"url":"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/comments?post=714"}],"version-history":[{"count":0,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/714\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media\/715"}],"wp:attachment":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media?parent=714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/categories?post=714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/tags?post=714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}