{"id":5214,"date":"2020-12-10T11:22:41","date_gmt":"2020-12-10T10:22:41","guid":{"rendered":"https:\/\/www.retarus.com\/blog\/en\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons"},"modified":"2024-05-07T13:15:20","modified_gmt":"2024-05-07T11:15:20","slug":"treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons","status":"publish","type":"post","link":"https:\/\/www.retarus.com\/blog\/en\/treacherous-cyber-scams-phishers-disguise-themselves-as-mailer-daemons\/","title":{"rendered":"Treacherous cyber scams: Phishers disguise themselves as mailer daemons"},"content":{"rendered":"\n<p>Every email user has encountered such messages in their own inbox \u2013 notifications from a \u201cmailer daemon\u201d, informing them about emails that could not be delivered. Mailer daemon is the designation used for a program which is responsible for delivering emails. Should the delivery fail for some reason, the daemon sends back a corresponding error message. The sender shown in the \u201cFrom\u201d field of such notifications usually follows the pattern mailer-daemon@servername.com.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-concrete-instructions-exert-pressure-on-recipients-to-act\">Concrete instructions exert pressure on recipients to act<\/h2>\n\n\n\n<p>Nothing out of the ordinary, so far? It is precisely these everyday messages that scammers are now increasingly seeking to exploit, as the security experts at Retarus have recently discovered. As far as the layout, sender and subject lines are concerned, these emails resemble the genuine \u201cmessage undeliverable\u201d emails very closely. The text of the message, as is typical for these types of phishing emails, exerts pressure on the reader to take action. The recipient is informed that a number of emails could not be delivered and is advised to take action to rectify this problem. The link contained in the message, which purportedly allows the target of the scam to view the messages which have been held up, deliberately aims to arouse the recipient\u2019s curiosity. Of course, hiding behind the link is not the expected email folder, but a phishing site with its sights set on committing fraud. &nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2020\/12\/phishing-mail-mailer-daemon.png\" alt=\"\" class=\"wp-image-5216\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-genuine-email-address-and-reference-to-microsoft-aim-to-create-impression-of-trustworthiness\">Genuine email address and reference to Microsoft aim to create impression of trustworthiness<\/h2>\n\n\n\n<p>The tricky thing about the emails increasingly cropping up at the moment is that the text makes direct reference to the Microsoft system as the sender, and mentions the correct email address of the potential victim again as the user name within the text of the message. The linked URL also takes up this address to suggest authenticity. What\u2019s more, it also <a href=\"https:\/\/www.retarus.com\/blog\/en\/phishing-flourishes-during-covid-pandemic\/\">employs TLS transport encryption<\/a> so that it can use the https:\/\/ prefix to pretend it is trustworthy, when in fact it is anything but secure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-email-security-services-help-block-phishing-urls\">Email security services help block phishing URLs<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.retarus.com\/services\/email-security\/\">Retarus Email Security<\/a> detects these kinds of scams using more than one approach. With the <a href=\"https:\/\/www.retarus.com\/services\/email-security\/tech-specs\/#time-of-click-protection\">Time-of-Click Protection service<\/a>, the URLs contained in emails are rewritten by default and checked against continually updating phishing databases at the time the link is clicked on. Only once this test has been passed, is the user forwarded to the destination page. Should the URL be classified as suspicious, the user receives a warning to this end in the browser.<\/p>\n\n\n\n<p>And with the <a href=\"https:\/\/www.retarus.com\/services\/email-security\/tech-specs\/#patient-zero-detection\" target=\"_blank\" rel=\"noreferrer noopener\">patented Patient Zero Detection<\/a>, Retarus identifies suspect messages even when the links included in them are only identified as potentially harmful once the emails have already been delivered. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-regularly-sensitizing-users-remains-essential\">Regularly sensitizing users remains essential<\/h2>\n\n\n\n<p>As no email security solution can provide 100 percent protection from phishing attacks, it is essential for companies to sensitize their users regarding these threats on a regular basis (to raise user awareness). The following instructions for dealing with inbound messages have proved to be successful in averting phishing attacks:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Avoid clicking on links in suspect emails (this includes unsubscribe links, with which you are only confirming the existence of your email address).<\/li><li>Never open\/download attachments from suspicious emails (malware).<\/li><li>Do not answer suspect emails or forward them to others.<\/li><li>Never enter your user name, passwords or any other personal details on untrustworthy websites.<\/li><li>If you doubt the authenticity of an email, check back with the purported sender in person or by phone. In cases such as the \u201cmailer daemon\u201d message described above or similar system notifications, get in touch with the IT administrator\/support at your organization.<\/li><\/ul>\n\n\n\n<p>To heighten awareness about fraudulent emails, Retarus has compiled these and many other valuable tips into an easy to understand \u201cAnti-Phishing Guide\u201d. You can <a href=\"https:\/\/www.retarus.com\/services\/email-security\/#anti-phishing-guide\">download the guide for free in five languages<\/a> from our website and share it with your employees.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A phishing method in the style of a Microsoft undeliverable message is currently on the rise urging users to release unsent emails via a link.<\/p>\n","protected":false},"author":12,"featured_media":5125,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","_s2mail":"","footnotes":""},"categories":[8,15],"tags":[],"class_list":["post-5214","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Treacherous cyber scams: Phishers disguise themselves as mailer daemons - Retarus Corporate Blog - EN<\/title>\n<meta name=\"description\" content=\"Aktuelle Phishing-Methode im Stile einer Microsoft-Unzustellbarkeitsnachricht fordert Nutzer auf, nicht versendete E-Mails per Link freizugeben.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Treacherous cyber scams: Phishers disguise themselves as mailer daemons\" \/>\n<meta property=\"og:description\" content=\"Aktuelle Phishing-Methode ruft Nutzer auf, nicht versendete E-Mails per Link freizugeben.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/\" \/>\n<meta property=\"og:site_name\" content=\"Retarus Corporate Blog - EN\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-10T10:22:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T11:15:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/05\/phishing-mail-mailer-daemon-1.png\" \/>\n<meta name=\"author\" content=\"S\u00f6ren Schulte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Aktuelle Phishing-Methode ruft Nutzer auf, nicht versendete E-Mails per Link freizugeben.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"S\u00f6ren Schulte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/\"},\"author\":{\"name\":\"S\u00f6ren Schulte\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/da5eb37e5936738ea4e12be8b429433d\"},\"headline\":\"Treacherous cyber scams: Phishers disguise themselves as mailer daemons\",\"datePublished\":\"2020-12-10T10:22:41+00:00\",\"dateModified\":\"2024-05-07T11:15:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/\"},\"wordCount\":649,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/22\\\/2020\\\/12\\\/phishing-attack_16zu9.jpg\",\"articleSection\":[\"News\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/\",\"name\":\"Treacherous cyber scams: Phishers disguise themselves as mailer daemons - Retarus Corporate Blog - EN\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/22\\\/2020\\\/12\\\/phishing-attack_16zu9.jpg\",\"datePublished\":\"2020-12-10T10:22:41+00:00\",\"dateModified\":\"2024-05-07T11:15:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/da5eb37e5936738ea4e12be8b429433d\"},\"description\":\"Aktuelle Phishing-Methode im Stile einer Microsoft-Unzustellbarkeitsnachricht fordert Nutzer auf, nicht versendete E-Mails per Link freizugeben.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/22\\\/2020\\\/12\\\/phishing-attack_16zu9.jpg\",\"contentUrl\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/sites\\\/22\\\/2020\\\/12\\\/phishing-attack_16zu9.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Treacherous cyber scams: Phishers disguise themselves as mailer daemons\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/\",\"name\":\"Retarus Corporate Blog - EN\",\"description\":\"Always up to date\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/da5eb37e5936738ea4e12be8b429433d\",\"name\":\"S\u00f6ren Schulte\",\"url\":\"https:\\\/\\\/www.retarus.com\\\/blog\\\/en\\\/author\\\/sschulte\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Treacherous cyber scams: Phishers disguise themselves as mailer daemons - Retarus Corporate Blog - EN","description":"Aktuelle Phishing-Methode im Stile einer Microsoft-Unzustellbarkeitsnachricht fordert Nutzer auf, nicht versendete E-Mails per Link freizugeben.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/","og_locale":"en_US","og_type":"article","og_title":"Treacherous cyber scams: Phishers disguise themselves as mailer daemons","og_description":"Aktuelle Phishing-Methode ruft Nutzer auf, nicht versendete E-Mails per Link freizugeben.","og_url":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/","og_site_name":"Retarus Corporate Blog - EN","article_published_time":"2020-12-10T10:22:41+00:00","article_modified_time":"2024-05-07T11:15:20+00:00","og_image":[{"url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2024\/05\/phishing-mail-mailer-daemon-1.png","type":"","width":"","height":""}],"author":"S\u00f6ren Schulte","twitter_card":"summary_large_image","twitter_description":"Aktuelle Phishing-Methode ruft Nutzer auf, nicht versendete E-Mails per Link freizugeben.","twitter_misc":{"Written by":"S\u00f6ren Schulte","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/#article","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/"},"author":{"name":"S\u00f6ren Schulte","@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d"},"headline":"Treacherous cyber scams: Phishers disguise themselves as mailer daemons","datePublished":"2020-12-10T10:22:41+00:00","dateModified":"2024-05-07T11:15:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/"},"wordCount":649,"commentCount":0,"image":{"@id":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2020\/12\/phishing-attack_16zu9.jpg","articleSection":["News","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/","url":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/","name":"Treacherous cyber scams: Phishers disguise themselves as mailer daemons - Retarus Corporate Blog - EN","isPartOf":{"@id":"https:\/\/www.retarus.com\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/#primaryimage"},"image":{"@id":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2020\/12\/phishing-attack_16zu9.jpg","datePublished":"2020-12-10T10:22:41+00:00","dateModified":"2024-05-07T11:15:20+00:00","author":{"@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d"},"description":"Aktuelle Phishing-Methode im Stile einer Microsoft-Unzustellbarkeitsnachricht fordert Nutzer auf, nicht versendete E-Mails per Link freizugeben.","breadcrumb":{"@id":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/#primaryimage","url":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2020\/12\/phishing-attack_16zu9.jpg","contentUrl":"https:\/\/www.retarus.com\/blog\/en\/wp-content\/uploads\/sites\/22\/2020\/12\/phishing-attack_16zu9.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.retarus.com\/blog\/en\/perfide-angriffsmasche-phisher-tarnen-sich-als-mailer-daemon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retarus.com\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Treacherous cyber scams: Phishers disguise themselves as mailer daemons"}]},{"@type":"WebSite","@id":"https:\/\/www.retarus.com\/blog\/en\/#website","url":"https:\/\/www.retarus.com\/blog\/en\/","name":"Retarus Corporate Blog - EN","description":"Always up to date","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retarus.com\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.retarus.com\/blog\/en\/#\/schema\/person\/da5eb37e5936738ea4e12be8b429433d","name":"S\u00f6ren Schulte","url":"https:\/\/www.retarus.com\/blog\/en\/author\/sschulte\/"}]}},"_links":{"self":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/5214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=5214"}],"version-history":[{"count":11,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/5214\/revisions"}],"predecessor-version":[{"id":10499,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/posts\/5214\/revisions\/10499"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/media\/5125"}],"wp:attachment":[{"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=5214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=5214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retarus.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=5214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}