{"id":3861,"date":"2023-11-15T17:56:57","date_gmt":"2023-11-15T17:56:57","guid":{"rendered":"https:\/\/www.propelex.com\/?p=3861"},"modified":"2023-11-01T18:05:42","modified_gmt":"2023-11-01T18:05:42","slug":"general-bytes-bitcoin-atm-hit-by-zero-day-bug","status":"publish","type":"post","link":"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/","title":{"rendered":"General Bytes Bitcoin ATM Hit by Zero Day Bug"},"content":{"rendered":"

General Bytes Bitcoin ATM hit by Zero day bug. Stay updated on the security implications and actions needed to protect your crypto assets. Bitcoin ATM manufacturer General Bytes was hacked, with hackers siphoning off cryptocurrencies worth about $1.5 million. This happened after a zero-day flaw in the ATM\u2019s server was exploited by attackers.<\/p>\n

The attackers uploaded a Java application through the master service interface that allows ATMs to upload videos and run it with \u201cbatm\u201d user privileges. This allowed them to access the ATM\u2019s database, read and decrypt encoded API keys; download usernames and password hashes; and turn off two-factor authentication.<\/p>\n

Using a Zero-Day Vulnerability to Steal Cryptocurrency<\/h2>\n

A zero day vulnerability is a flaw in software or hardware that hackers know about but the company responsible for fixing it hasn\u2019t. Hackers exploit the flaw and use it to adversely affect programs, data or additional computers. Once a hacker discovers a zero day vulnerability, they can attack and steal information or money before the vendor fixes it.<\/p>\n

When a security flaw is discovered, it\u2019s often disclosed to the software developer by an ethical hacker or white hat. The white hat can choose to privately disclose the flaw to the software maker, allowing them to fix it before criminal hackers take advantage of it. However, the white hat can also decide to sell the vulnerability to the criminal underground for profit.<\/p>\n

Once a zero day bug crypto hacker finds a vulnerability, they can attack it and steal the information or money that the victim intended to share. This is why it\u2019s so important to only connect to trusted Wi-Fi networks and keep all software and devices updated.<\/p>\n

This week, a cryptocurrency ATM producer was attacked by hackers who took control of its servers and siphoned off 56 bitcoin, worth more than $1.5 million at current prices. The hackers used a zero day flaw in the company\u2019s Crypto Application Server (CAS) to gain access to its customers\u2019 bitcoin wallets and drained their funds.<\/p>\n

The attack was successful because the hackers were able to create a default admin user via the CAS administrative interface. They then tampered with the preset \u201cbuy,\u201d \u201csell,\u201d and \u201cinvalid transaction address\u201d settings to redirect deposited cryptocurrency to their own wallets.<\/p>\n

General Bytes believes the attacker scanned for exposed servers on the internet, including those hosted by Digital Ocean and its own cloud service. Once they found an open port, they added a default administrator user named \u201cgb\u201d to the CAS. Then, they tampered with the CAS\u2019s \u201cbuy\u201d and \u201csell\u201d crypto settings to direct any cryptocurrency sent to it to their own wallets.<\/p>\n

This is a common way for hackers to gain access to a person\u2019s computer and steal their private keys and funds. Once the hackers have your private keys, they can spend your bitcoins and steal other types of cryptocurrency as well. This is why you should only trust the most secure cryptocurrency exchanges.<\/p>\n

General Bytes\u2019 Servers Exploited<\/h2>\n

During the weekend, hackers exploited an unpatched vulnerability in servers at crypto ATM manufacturer General Bytes to steal digital coins from their customers. The company, one of the three largest crypto ATM manufacturers in the world, disclosed that attackers stole about $1.5 million worth of cryptocurrency from a number of its ATMs. The company believes that the hackers exploited a weakness in its BATM management platform.<\/p>\n

Specifically, the attack used a zero-day bug to take advantage of the ATMs\u2019 master service interface on port 7741, which is designed for uploading videos. The hackers were able to remotely upload a Java application and run it with batm user privileges. This allowed them to gain access to the ATMs\u2019 database, API keys, hot wallets, and other information including user names and password hashes.<\/p>\n

Once the hacker had access to this information, they could tamper with the ATMs\u2019 buy and sell settings to channel incoming cryptocurrency into their own wallets. This is what caused the heist of around 56 bitcoin, or about $1.5 million, from the affected machines.<\/p>\n

The hack also gave the hackers the ability to access a number of user accounts and change their passwords to gain control of them. It\u2019s unclear how many users were impacted by this security breach, but General Bytes says that it is notifying all of its customers who operate the machines.<\/p>\n

General Bytes is now shuttering its cloud service and advising all ATM owners to install their own standalone CAS servers, which it suggests should be placed behind a firewall and VPN. It\u2019s also providing support with data migration for those who would like to do this.<\/p>\n

This hack serves as a reminder that even if a business has a strong cybersecurity system, there is always a chance that hackers will find a way to get into it and steal digital currency or other valuable data. That\u2019s why it is critical to stay up-to-date with all patches and updates, and conduct regular security audits. It\u2019s also important to separate your cryptocurrency from the rest of your personal assets, so that in the event of a breach you can limit the impact.<\/p>\n

General Bytes Discloses the Security Breach<\/h2>\n

A Czech-based company that claims to be the world\u2019s largest crypto ATM manufacturer has disclosed a security breach<\/a> involving its machines. According to a company statement published on March 18 that was updated later, hackers were able to exploit a zero-day vulnerability in its ATM software to steal $1.5 million worth of cryptocurrency from customers who used the ATMs to exchange cash for bitcoin and other digital assets.<\/p>\n

The hackers were able to exploit the ATM management platform, called BATM, by remotely uploading a Java application through the master service interface with batm user privileges. This allowed them to access the database and read and decrypt API keys that could be used to access funds on exchanges and \u201chot\u201d cryptocurrency wallets. Additionally, the attackers were able to download user names and password hashes, access terminal event logs, and turn off two-factor authentication.<\/p>\n

General Bytes is urging its customers to take measures to protect themselves against future attacks. It has released patches for its ATM software that should be installed on both the ATM server (CAS) and terminals themselves. The company also recommends that users of its ATMs keep their CAS servers behind a firewall and VPN.<\/p>\n

Karel Kyovsky, the CEO of General Bytes, noted that he was \u201cvery disappointed\u201d by the attack and apologized for any inconvenience caused to the customers. However, he added that he is confident the company can secure its products from such attacks in the future. \u201cWe\u2019ve concluded multiple security audits since 2021 and none of them identified the vulnerable mechanism,\u201d he said.<\/p>\n

It is not the first time that General Bytes has been the victim of a security breach, either. Hackers were able to gain control of its servers in August 2022 and make changes that would allow them to steal cryptocurrency. It has long been recommended by cybersecurity experts that bitcoin users avoid using internet-connected wallets, or \u201chot\u201d wallets, in favor of cold wallets, which are stored offline.<\/p>\n

The zero-day vulnerability exploited by the hackers is tracked as BATM-4780, and is part of a larger set of vulnerabilities that affects many different platforms, including Android devices. The exploit can be used to target a wide range of applications, from banking to gaming and social media. It can be used by threat actors who support cyber warfare or for financial gain, as well as by hacktivists and activists seeking to promote their causes.<\/p>\n

General Bytes Closes its Cloud Service<\/h2>\n

Bitcoin ATM manufacturer General Bytes recently shut down its cloud service and urged all operators to use standalone servers following the discovery of a security vulnerability that allowed an attacker to steal crypto. The company said that the hacker was able to remotely upload and run a Java application via the master service interface into its terminals that allowed them to access user information and funds stored in hot wallets.<\/p>\n

According to the notice posted by Karel Kyovsky, the founder of the Czech-based firm, the attack was successful as the malware enabled attackers to access the bank\u2019s database; read and decrypt API keys that allow users to access their exchange or hot wallets; download usernames, password hashes, turn off two-factor authentication, and scan for devices scanning their private keys at an ATM (which older versions of General Bytes software would log). On-chain transactions indicate that 56 BTC was stolen in total from about 15 ATM operators.<\/p>\n

The attack happened on March 17-18 and exploited a vulnerability in the master service interface. It enabled the attacker to scan for CAS servers hosted on Digital Ocean, which General Bytes recommends its customers use to host their ATMs (it also offers standalone management). The attackers then inserted their malicious Java application, which ran on the server when logged in as admin. By default, the server was configured to start applications in the deployment folder, which the attacker took advantage of.<\/p>\n

In the notice, General Bytes said that while the attack could have been prevented by properly configuring a dedicated IP address for the CAS server, the attacker used a public IP address to gain access. The company advised all impacted ATM owners to consider their passwords, API keys for hot wallets, and accounts on cryptocurrency exchanges as compromised and change their credentials.<\/p>\n

While the amount stolen was relatively small, it was still an unpleasant surprise for the General Bytes community. The company has since issued a security fix for the ATM\u2019s Crypto Application Server and urged all ATM operators to install the patches. It also encouraged them to keep CAS and their ATMs behind a firewall and VPN.<\/p>\n","protected":false},"excerpt":{"rendered":"

General Bytes Bitcoin ATM hit by Zero day bug. Stay updated on the security implications and actions needed to protect your crypto assets. Bitcoin ATM manufacturer General Bytes was hacked, with hackers siphoning off cryptocurrencies worth about $1.5 million. This happened after a zero-day flaw in the ATM\u2019s server was exploited by attackers. The attackers […]<\/p>\n","protected":false},"author":3,"featured_media":3862,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[47],"tags":[],"acf":[],"yoast_head":"\nGeneral Bytes Bitcoin ATM Hit by Zero Day Bug - Propelex<\/title>\n<meta name=\"description\" content=\"General Bytes Bitcoin ATM hit by Zero day bug. Stay updated on the security implications and actions needed to protect your crypto assets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"General Bytes Bitcoin ATM Hit by Zero Day Bug - Propelex\" \/>\n<meta property=\"og:description\" content=\"General Bytes Bitcoin ATM hit by Zero day bug. Stay updated on the security implications and actions needed to protect your crypto assets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/\" \/>\n<meta property=\"og:site_name\" content=\"Propelex\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-15T17:56:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-01T18:05:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.propelex.com\/wp-content\/uploads\/2023\/11\/General-Bytes-Bitcoin-ATM-Hit-by-Zero-Day-Bug.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mansoor Yusaf\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mansoor Yusaf\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/\"},\"author\":{\"name\":\"Mansoor Yusaf\",\"@id\":\"https:\/\/www.propelex.com\/#\/schema\/person\/d26f38406cd7e6db71a88c57b9c677d1\"},\"headline\":\"General Bytes Bitcoin ATM Hit by Zero Day Bug\",\"datePublished\":\"2023-11-15T17:56:57+00:00\",\"dateModified\":\"2023-11-01T18:05:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/\"},\"wordCount\":1624,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.propelex.com\/#organization\"},\"articleSection\":[\"Blogs\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/\",\"url\":\"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/\",\"name\":\"General Bytes Bitcoin ATM Hit by Zero Day Bug - Propelex\",\"isPartOf\":{\"@id\":\"https:\/\/www.propelex.com\/#website\"},\"datePublished\":\"2023-11-15T17:56:57+00:00\",\"dateModified\":\"2023-11-01T18:05:42+00:00\",\"description\":\"General Bytes Bitcoin ATM hit by Zero day bug. Stay updated on the security implications and actions needed to protect your crypto assets.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.propelex.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"General Bytes Bitcoin ATM Hit by Zero Day Bug\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.propelex.com\/#website\",\"url\":\"https:\/\/www.propelex.com\/\",\"name\":\"Propelex\",\"description\":\"Business focused cybersecurity\",\"publisher\":{\"@id\":\"https:\/\/www.propelex.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.propelex.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.propelex.com\/#organization\",\"name\":\"Propelex\",\"url\":\"https:\/\/www.propelex.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.propelex.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/propelex-logo-footer.svg\",\"contentUrl\":\"https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/propelex-logo-footer.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"Propelex\"},\"image\":{\"@id\":\"https:\/\/www.propelex.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.propelex.com\/#\/schema\/person\/d26f38406cd7e6db71a88c57b9c677d1\",\"name\":\"Mansoor Yusaf\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.propelex.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d76d14bf6abfcf18a09a61173e386174?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d76d14bf6abfcf18a09a61173e386174?s=96&d=mm&r=g\",\"caption\":\"Mansoor Yusaf\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"General Bytes Bitcoin ATM Hit by Zero Day Bug - Propelex","description":"General Bytes Bitcoin ATM hit by Zero day bug. Stay updated on the security implications and actions needed to protect your crypto assets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/","og_locale":"en_US","og_type":"article","og_title":"General Bytes Bitcoin ATM Hit by Zero Day Bug - Propelex","og_description":"General Bytes Bitcoin ATM hit by Zero day bug. Stay updated on the security implications and actions needed to protect your crypto assets.","og_url":"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/","og_site_name":"Propelex","article_published_time":"2023-11-15T17:56:57+00:00","article_modified_time":"2023-11-01T18:05:42+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.propelex.com\/wp-content\/uploads\/2023\/11\/General-Bytes-Bitcoin-ATM-Hit-by-Zero-Day-Bug.jpg","type":"image\/jpeg"}],"author":"Mansoor Yusaf","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mansoor Yusaf","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/#article","isPartOf":{"@id":"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/"},"author":{"name":"Mansoor Yusaf","@id":"https:\/\/www.propelex.com\/#\/schema\/person\/d26f38406cd7e6db71a88c57b9c677d1"},"headline":"General Bytes Bitcoin ATM Hit by Zero Day Bug","datePublished":"2023-11-15T17:56:57+00:00","dateModified":"2023-11-01T18:05:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/"},"wordCount":1624,"commentCount":0,"publisher":{"@id":"https:\/\/www.propelex.com\/#organization"},"articleSection":["Blogs"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/","url":"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/","name":"General Bytes Bitcoin ATM Hit by Zero Day Bug - Propelex","isPartOf":{"@id":"https:\/\/www.propelex.com\/#website"},"datePublished":"2023-11-15T17:56:57+00:00","dateModified":"2023-11-01T18:05:42+00:00","description":"General Bytes Bitcoin ATM hit by Zero day bug. Stay updated on the security implications and actions needed to protect your crypto assets.","breadcrumb":{"@id":"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.propelex.com\/general-bytes-bitcoin-atm-hit-by-zero-day-bug\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.propelex.com\/"},{"@type":"ListItem","position":2,"name":"General Bytes Bitcoin ATM Hit by Zero Day Bug"}]},{"@type":"WebSite","@id":"https:\/\/www.propelex.com\/#website","url":"https:\/\/www.propelex.com\/","name":"Propelex","description":"Business focused cybersecurity","publisher":{"@id":"https:\/\/www.propelex.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.propelex.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.propelex.com\/#organization","name":"Propelex","url":"https:\/\/www.propelex.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.propelex.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/propelex-logo-footer.svg","contentUrl":"https:\/\/www.propelex.com\/wp-content\/uploads\/2022\/11\/propelex-logo-footer.svg","width":"1024","height":"1024","caption":"Propelex"},"image":{"@id":"https:\/\/www.propelex.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.propelex.com\/#\/schema\/person\/d26f38406cd7e6db71a88c57b9c677d1","name":"Mansoor Yusaf","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.propelex.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d76d14bf6abfcf18a09a61173e386174?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d76d14bf6abfcf18a09a61173e386174?s=96&d=mm&r=g","caption":"Mansoor Yusaf"}}]}},"_links":{"self":[{"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/posts\/3861"}],"collection":[{"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/comments?post=3861"}],"version-history":[{"count":1,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/posts\/3861\/revisions"}],"predecessor-version":[{"id":3863,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/posts\/3861\/revisions\/3863"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/media\/3862"}],"wp:attachment":[{"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/media?parent=3861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/categories?post=3861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.propelex.com\/wp-json\/wp\/v2\/tags?post=3861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}