{"id":5566,"date":"2022-08-22T11:36:43","date_gmt":"2022-08-22T11:36:43","guid":{"rendered":"https:\/\/www.opsshield.com\/blog\/?p=5566"},"modified":"2022-08-22T13:54:42","modified_gmt":"2022-08-22T13:54:42","slug":"repeated-php-file-injections","status":"publish","type":"post","link":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/","title":{"rendered":"Repeated PHP File Injections"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Injecting bad code into a legitimate file or inserting a bad file into an application folder is a very common type of virus attack. But there are some specific cases where repeated file injection happens to the same file or folder. In such cases even if the scanner detects and take action against the detected instance, it may happen again and causes a scanner log flood. In this blog, we are discussing some common reasons that can cause such issues based on the cases that we handled in the past.<\/p>\n<h4>1. Cron Jobs<\/h4>\n<p>This is a very common type of cause for repeated file injections and is easy to find. In this scenario, the user account is compromised and the attacker is taking advantage of it to install malicious cron jobs to repeatedly inject files into the account.<\/p>\n<p>Given below is an active campaign specifically targeting to cPanel account, where the compromised cPanel accounts through some campaign are being abused with similar cron jobs for the past couple of weeks.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/08\/base_cron_job-e1661172732467.png&#8221; title_text=&#8221;base_cron_job&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>There can be other types of cron jobs as well, which will download the file from a remote location and execute it. This will run as a daemon on the server which will monitor and upload\/update malicious code into the account.<\/p>\n<h4>2. Process or Daemon run under the user account<\/h4>\n<p>This type of abuse is also common and a bit more aggressive than the scheduled cron-based injections. As it is a running process, it actively tracks any change to the targeted infected file or location and adds infection if it cannot find the bad code in it. This type of abuse is easy to find because the bad process keeps running and consumes resources. You can easily track such jobs by listing the processes owned by the affected user using &#8220;ps&#8221; command. Few such examples are given below&#8230;<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/08\/bad_process.png&#8221; title_text=&#8221;bad_process&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; header_4_line_height=&#8221;1.7em&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p>cPGuard has a process monitoring module integrated, which will peridiocally scan the processes running under the user accounts, take action and report them if\u00a0 matches to any of the known abuse patterns.<\/p>\n<h4>3. Using hidden code in nulled third-party modules<\/h4>\n<p>This is another method and is difficult to find because it needs source code verification of all files within the account. This often happens with nulled WordPress plugins\/themes which the users often install to save some money. But such packages will cause more damage and can ultimately turn your website not unable and vulnerable. You need to go through each files or use\u00a0 a malware scanner like cPGuard to find such hidden malicious code. An example for such case is given below, which will run every time you access th website and include malcious code into the index.php file<\/p>\n<h4>Conclusion<\/h4>\n<p>The reason for repeated file infection is not just limited to this but can happen due to other reasons as well. But these are the most common reason behind repeated infections and cPGuard is being trained to handle many such cases already. But ultilamtely it is required to find the security hole using which the hacker got access to the account and patch it. Otherwise the attacker can come back any time and repeat the action.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Injecting bad code into a legitimate file or inserting a bad file into an application folder is a very common type of virus attack. But there are some specific cases where repeated file injection happens to the same file or folder. In such cases even if the scanner detects and take action against the detected [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5579,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[10,11],"tags":[],"class_list":["post-5566","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cpguard","category-most-popular"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Repeated PHP File Injections - OPSSHIELD Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Repeated PHP File Injections - OPSSHIELD Blog\" \/>\n<meta property=\"og:description\" content=\"Injecting bad code into a legitimate file or inserting a bad file into an application folder is a very common type of virus attack. But there are some specific cases where repeated file injection happens to the same file or folder. In such cases even if the scanner detects and take action against the detected [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/\" \/>\n<meta property=\"og:site_name\" content=\"OPSSHIELD Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/opsshield\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-22T11:36:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-22T13:54:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/08\/repeated-file-infections-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1946\" \/>\n\t<meta property=\"og:image:height\" content=\"1096\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nibin V M\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@opsshieldllp\" \/>\n<meta name=\"twitter:site\" content=\"@opsshieldllp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nibin V M\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/\"},\"author\":{\"name\":\"Nibin V M\",\"@id\":\"https:\/\/www.opsshield.com\/blog\/#\/schema\/person\/508a3abbc0270572602f2665c1cf8488\"},\"headline\":\"Repeated PHP File Injections\",\"datePublished\":\"2022-08-22T11:36:43+00:00\",\"dateModified\":\"2022-08-22T13:54:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/\"},\"wordCount\":725,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.opsshield.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/08\/repeated-file-infections-1.jpg\",\"articleSection\":[\"CPGUARD\",\"Most Popular\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/\",\"url\":\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/\",\"name\":\"Repeated PHP File Injections - OPSSHIELD Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.opsshield.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/08\/repeated-file-infections-1.jpg\",\"datePublished\":\"2022-08-22T11:36:43+00:00\",\"dateModified\":\"2022-08-22T13:54:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#primaryimage\",\"url\":\"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/08\/repeated-file-infections-1.jpg\",\"contentUrl\":\"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/08\/repeated-file-infections-1.jpg\",\"width\":1946,\"height\":1096},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.opsshield.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Repeated PHP File Injections\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.opsshield.com\/blog\/#website\",\"url\":\"https:\/\/www.opsshield.com\/blog\/\",\"name\":\"OPSSHIELD Blog\",\"description\":\"OPSSHIELD blogs\",\"publisher\":{\"@id\":\"https:\/\/www.opsshield.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.opsshield.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.opsshield.com\/blog\/#organization\",\"name\":\"OPSSHIELD LLP\",\"url\":\"https:\/\/www.opsshield.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.opsshield.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/06\/image.png\",\"contentUrl\":\"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/06\/image.png\",\"width\":1500,\"height\":300,\"caption\":\"OPSSHIELD LLP\"},\"image\":{\"@id\":\"https:\/\/www.opsshield.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/opsshield\",\"https:\/\/x.com\/opsshieldllp\",\"https:\/\/linkedin.com\/company\/opsshield\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.opsshield.com\/blog\/#\/schema\/person\/508a3abbc0270572602f2665c1cf8488\",\"name\":\"Nibin V M\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.opsshield.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4a6e0d6816741537caeaa1cbdda05a47f533d0af3aa66d351735edaec736c2ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4a6e0d6816741537caeaa1cbdda05a47f533d0af3aa66d351735edaec736c2ff?s=96&d=mm&r=g\",\"caption\":\"Nibin V M\"},\"description\":\"Is an experienced Linux System Analyst with over 15 years of experience in Web Hosting, Web Security and server management. Holding the extensive experience in the industry, Nibin helps to coordinate the operations and support at OPSSHIELD LLP\",\"sameAs\":[\"https:\/\/www.opsshield.com\/blog\"],\"url\":\"https:\/\/www.opsshield.com\/blog\/author\/opsadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Repeated PHP File Injections - OPSSHIELD Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/","og_locale":"en_US","og_type":"article","og_title":"Repeated PHP File Injections - OPSSHIELD Blog","og_description":"Injecting bad code into a legitimate file or inserting a bad file into an application folder is a very common type of virus attack. But there are some specific cases where repeated file injection happens to the same file or folder. In such cases even if the scanner detects and take action against the detected [&hellip;]","og_url":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/","og_site_name":"OPSSHIELD Blog","article_publisher":"https:\/\/www.facebook.com\/opsshield","article_published_time":"2022-08-22T11:36:43+00:00","article_modified_time":"2022-08-22T13:54:42+00:00","og_image":[{"width":1946,"height":1096,"url":"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/08\/repeated-file-infections-1.jpg","type":"image\/jpeg"}],"author":"Nibin V M","twitter_card":"summary_large_image","twitter_creator":"@opsshieldllp","twitter_site":"@opsshieldllp","twitter_misc":{"Written by":"Nibin V M","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#article","isPartOf":{"@id":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/"},"author":{"name":"Nibin V M","@id":"https:\/\/www.opsshield.com\/blog\/#\/schema\/person\/508a3abbc0270572602f2665c1cf8488"},"headline":"Repeated PHP File Injections","datePublished":"2022-08-22T11:36:43+00:00","dateModified":"2022-08-22T13:54:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/"},"wordCount":725,"commentCount":0,"publisher":{"@id":"https:\/\/www.opsshield.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#primaryimage"},"thumbnailUrl":"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/08\/repeated-file-infections-1.jpg","articleSection":["CPGUARD","Most Popular"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/","url":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/","name":"Repeated PHP File Injections - OPSSHIELD Blog","isPartOf":{"@id":"https:\/\/www.opsshield.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#primaryimage"},"image":{"@id":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#primaryimage"},"thumbnailUrl":"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/08\/repeated-file-infections-1.jpg","datePublished":"2022-08-22T11:36:43+00:00","dateModified":"2022-08-22T13:54:42+00:00","breadcrumb":{"@id":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#primaryimage","url":"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/08\/repeated-file-infections-1.jpg","contentUrl":"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/08\/repeated-file-infections-1.jpg","width":1946,"height":1096},{"@type":"BreadcrumbList","@id":"https:\/\/www.opsshield.com\/blog\/repeated-php-file-injections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.opsshield.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Repeated PHP File Injections"}]},{"@type":"WebSite","@id":"https:\/\/www.opsshield.com\/blog\/#website","url":"https:\/\/www.opsshield.com\/blog\/","name":"OPSSHIELD Blog","description":"OPSSHIELD blogs","publisher":{"@id":"https:\/\/www.opsshield.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.opsshield.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.opsshield.com\/blog\/#organization","name":"OPSSHIELD LLP","url":"https:\/\/www.opsshield.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.opsshield.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/06\/image.png","contentUrl":"https:\/\/www.opsshield.com\/blog\/wp-content\/uploads\/2022\/06\/image.png","width":1500,"height":300,"caption":"OPSSHIELD LLP"},"image":{"@id":"https:\/\/www.opsshield.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/opsshield","https:\/\/x.com\/opsshieldllp","https:\/\/linkedin.com\/company\/opsshield"]},{"@type":"Person","@id":"https:\/\/www.opsshield.com\/blog\/#\/schema\/person\/508a3abbc0270572602f2665c1cf8488","name":"Nibin V M","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.opsshield.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4a6e0d6816741537caeaa1cbdda05a47f533d0af3aa66d351735edaec736c2ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a6e0d6816741537caeaa1cbdda05a47f533d0af3aa66d351735edaec736c2ff?s=96&d=mm&r=g","caption":"Nibin V M"},"description":"Is an experienced Linux System Analyst with over 15 years of experience in Web Hosting, Web Security and server management. Holding the extensive experience in the industry, Nibin helps to coordinate the operations and support at OPSSHIELD LLP","sameAs":["https:\/\/www.opsshield.com\/blog"],"url":"https:\/\/www.opsshield.com\/blog\/author\/opsadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.opsshield.com\/blog\/wp-json\/wp\/v2\/posts\/5566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.opsshield.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.opsshield.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.opsshield.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.opsshield.com\/blog\/wp-json\/wp\/v2\/comments?post=5566"}],"version-history":[{"count":12,"href":"https:\/\/www.opsshield.com\/blog\/wp-json\/wp\/v2\/posts\/5566\/revisions"}],"predecessor-version":[{"id":5625,"href":"https:\/\/www.opsshield.com\/blog\/wp-json\/wp\/v2\/posts\/5566\/revisions\/5625"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.opsshield.com\/blog\/wp-json\/wp\/v2\/media\/5579"}],"wp:attachment":[{"href":"https:\/\/www.opsshield.com\/blog\/wp-json\/wp\/v2\/media?parent=5566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.opsshield.com\/blog\/wp-json\/wp\/v2\/categories?post=5566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.opsshield.com\/blog\/wp-json\/wp\/v2\/tags?post=5566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}