{"id":5176,"date":"2026-05-20T12:33:34","date_gmt":"2026-05-20T15:33:34","guid":{"rendered":"https:\/\/criadix.com\/?p=5176"},"modified":"2026-05-20T12:33:34","modified_gmt":"2026-05-20T15:33:34","slug":"turla-botnet-modular-p2p-kazuar-continuous-access","status":"publish","type":"post","link":"https:\/\/criadix.com\/en\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/","title":{"rendered":"How Turla's modular P2P botnet evolves Kazuar malware for more persistent attacks"},"content":{"rendered":"<p>Groups specializing in cyberattacks are constantly improving their methods for maintaining prolonged and hidden access to target systems. Among them, the Turla collective has attracted attention by transforming the well-known Kazuar backdoor into a modular botnet with peer-to-peer (P2P) architecture.<\/p>\n<p>This new design turns infected machines into active nodes in a distributed network, which facilitates the spread of malware and makes it more difficult to detect or remove by traditional methods.<\/p>\n<h2>What has changed in the Turla botnet?<\/h2>\n<p>Instead of relying on central servers to command the hacked machines, the group distributes these functions among the infected devices themselves. This decentralization makes monitoring the network a more complex task for those trying to contain the threat.<\/p>\n<p>Modularity brings flexibility: new functionalities can be added or updated as needed, whether to spy on data, execute commands or eliminate digital traces. This allows attackers to maintain virtually invisible and lasting control over compromised systems.<\/p>\n<h2>Why does this development worry experts?<\/h2>\n<p>When a <a href=\"https:\/\/criadix.com\/en\/technology-2\/golpe-com-ia-clonagem-de-voz-chamadas-falsas\/\">modular p2p botnet<\/a> If the network adopts the P2P and modulated model, traditional defense strategies, which usually focus on identifying the central server, lose their effectiveness. Even companies with robust firewalls and up-to-date antivirus software are vulnerable, as malicious activity spreads and hides in multiple layers within the network.<\/p>\n<h3>Practical consequences for companies and users<\/h3>\n<p>IT professionals need to review their defenses to deal with these persistent and highly camouflaged threats. Botnet persistence can result in sensitive information being lost, affecting the integrity of corporate data.<\/p>\n<p>In addition, end users may notice slowdowns or instabilities in their devices, which end up being used as nodes in the malicious network. In more serious cases, critical infrastructures - such as public services or financial institutions - can suffer serious impacts, increasing the risk to society.<\/p>\n<h2>Technical points that deserve attention<\/h2>\n<p>The Turla botnet incorporates sophisticated encryption methods for communication between infected devices, which makes it difficult to intercept and analyze operations during digital forensic investigations.<\/p>\n<p>Another challenge is the rapid mutation of malware variants, which deviate from the traditional signatures identified by automatic systems, requiring more advanced tools to keep up with these changes in real time.<\/p>\n<h3>How can you protect yourself against this threat?<\/h3>\n<p>To begin with, reinforcing basic measures such as strict segmentation of internal networks, limiting administrative privileges and implementing behavioral monitoring focused on detecting anomalies are fundamental steps. This approach goes beyond simple signature blocking, which is no longer enough.<\/p>\n<h2>Future prospects and challenges<\/h2>\n<p>Turla's actions indicate a clear trend: increasingly sophisticated attacks, with modular and decentralized structures, which increase persistence and the difficulty of detection.<\/p>\n<p>For the Brazilian and global technology scene, this means that companies and public bodies need to continually invest in sophisticated defense strategies, combining technology, intelligence and processes capable of mitigating risks to critical data and privacy.<\/p>\n<h3>Frequently asked questions<\/h3>\n<dl>\n<dt>What differentiates this new Turla botnet from the traditional ones?<\/dt>\n<dd>Decentralization via P2P and the modular format make the network more resilient, making it difficult for conventional methods based on central servers to detect and remove malware.<\/dd>\n<dt>Who could be targeted by this botnet?<\/dt>\n<dd>Although attacks tend to focus on large governmental and strategic organizations, any vulnerable Internet-connected device can be compromised.<\/dd>\n<dt>How do you detect infections of this nature?<\/dt>\n<dd>Traditional tools have limitations when it comes to identifying these rapidly changing distributed networks. For this reason, the use of <a href=\"https:\/\/criadix.com\/en\/technology-2\/rj-scaringe-fundraising-us12bi-startups-artificial-intelligence\/\">artificial intelligence applied to behavioral analysis<\/a> has been an important differentiator for early detection.<\/dd>\n<\/dl>","protected":false},"excerpt":{"rendered":"<p>Turla enhances Kazuar with a modular P2P botnet, increasing persistence and discretion in digital intrusions.<\/p>","protected":false},"author":1,"featured_media":5178,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"googlesitekit_rrm_CAowqoyiDA:productID":"","footnotes":""},"categories":[43],"tags":[527,373,529,530,528],"class_list":["post-5176","post","type-post","status-publish","format-standard","has-post-thumbnail","category-tecnologia","tag-botnet","tag-ciberseguranca","tag-kazuar","tag-malware","tag-turla"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Turla cria botnet modular P2P usando Kazuar para manter acesso persistente<\/title>\n<meta name=\"description\" content=\"Turla aprimora o Kazuar com botnet modular P2P, aumentando a persist\u00eancia e discri\u00e7\u00e3o em invas\u00f5es digitais.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/criadix.com\/en\/technology-2\/turla-botnet-modular-p2p-kazuar-continuous-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Conhe\u00e7a a nova botnet P2P modular da Turla que explora Kazuar\" \/>\n<meta property=\"og:description\" content=\"A Turla aprimora sua backdoor Kazuar em uma botnet modular peer-to-peer garantindo controle furtivo sobre sistemas comprometidos.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/criadix.com\/en\/technology-2\/turla-botnet-modular-p2p-kazuar-continuous-access\/\" \/>\n<meta property=\"og:site_name\" content=\"Criadix\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/criadixonline\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/lecestaro\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-20T15:33:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/criadix.com\/wp-content\/uploads\/2026\/05\/criadix-featured-5176-1779039362.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Cestaro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Como a botnet modular P2P do Turla evolui o malware Kazuar para ataques mais persistentes\" \/>\n<meta name=\"twitter:creator\" content=\"@criadix\" \/>\n<meta name=\"twitter:site\" content=\"@criadix\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cestaro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/\"},\"author\":{\"name\":\"Cestaro\",\"@id\":\"https:\/\/criadix.com\/es\/#\/schema\/person\/a3e9c6bf0a087b25f2b54aca550ac5d6\"},\"headline\":\"Como a botnet modular P2P do Turla evolui o malware Kazuar para ataques mais persistentes\",\"datePublished\":\"2026-05-20T15:33:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/\"},\"wordCount\":674,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/criadix.com\/wp-content\/uploads\/2026\/05\/criadix-featured-5176-1779039362.webp\",\"keywords\":[\"botnet\",\"ciberseguran\u00e7a\",\"Kazuar\",\"malware\",\"Turla\"],\"articleSection\":[\"Tecnologia\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#respond\"]}],\"copyrightYear\":\"2026\",\"copyrightHolder\":{\"@id\":\"https:\/\/criadix.com\/en\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/\",\"url\":\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/\",\"name\":\"Turla cria botnet modular P2P usando Kazuar para manter acesso persistente\",\"isPartOf\":{\"@id\":\"https:\/\/criadix.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/criadix.com\/wp-content\/uploads\/2026\/05\/criadix-featured-5176-1779039362.webp\",\"datePublished\":\"2026-05-20T15:33:34+00:00\",\"author\":{\"@id\":\"https:\/\/criadix.com\/es\/#\/schema\/person\/a3e9c6bf0a087b25f2b54aca550ac5d6\"},\"description\":\"Turla aprimora o Kazuar com botnet modular P2P, aumentando a persist\u00eancia e discri\u00e7\u00e3o em invas\u00f5es digitais.\",\"breadcrumb\":{\"@id\":\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#primaryimage\",\"url\":\"https:\/\/criadix.com\/wp-content\/uploads\/2026\/05\/criadix-featured-5176-1779039362.webp\",\"contentUrl\":\"https:\/\/criadix.com\/wp-content\/uploads\/2026\/05\/criadix-featured-5176-1779039362.webp\",\"width\":1024,\"height\":1024,\"caption\":\"Como a botnet modular P2P do Turla evolui o malware Kazuar para ataques mais persistentes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/criadix.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Como a botnet modular P2P do Turla evolui o malware Kazuar para ataques mais persistentes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/criadix.com\/es\/#website\",\"url\":\"https:\/\/criadix.com\/es\/\",\"name\":\"Criadix\",\"description\":\"Cria\u00e7\u00e3o de conte\u00fados digitais\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/criadix.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/criadix.com\/es\/#\/schema\/person\/a3e9c6bf0a087b25f2b54aca550ac5d6\",\"name\":\"Cestaro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/criadix.com\/wp-content\/litespeed\/avatar\/0331060360abda439ced40107140ed91.jpg?ver=1779206770\",\"url\":\"https:\/\/criadix.com\/wp-content\/litespeed\/avatar\/0331060360abda439ced40107140ed91.jpg?ver=1779206770\",\"contentUrl\":\"https:\/\/criadix.com\/wp-content\/litespeed\/avatar\/0331060360abda439ced40107140ed91.jpg?ver=1779206770\",\"caption\":\"Cestaro\"},\"description\":\"Ol\u00e1! Sou Leandro Cestaro, criador do Criadix.com. Sou analista de dados, entusiasta de tecnologia e apaixonado por WordPress, intelig\u00eancia artificial e cria\u00e7\u00e3o de conte\u00fados digitais. Tenho s\u00f3lida experi\u00eancia em infraestrutura de TI e estou sempre em busca de solu\u00e7\u00f5es criativas para ambientes complexos, unindo t\u00e9cnica e praticidade. Al\u00e9m do lado profissional, sou pai, casado e acredito no poder do conhecimento para transformar vidas. No Criadix, compartilho experi\u00eancias, tutoriais e insights para ajudar pessoas a explorarem o universo digital com mais autonomia e inspira\u00e7\u00e3o. Seja bem-vindo(a)!\",\"sameAs\":[\"https:\/\/www.facebook.com\/lecestaro\",\"https:\/\/www.instagram.com\/lecestaro\",\"https:\/\/www.linkedin.com\/in\/lcestaro\/\",\"https:\/\/www.youtube.com\/@lcestaro\"],\"birthDate\":\"1982-06-08\",\"gender\":\"masculino\",\"knowsAbout\":[\"Wordpress\",\"Power BI\",\"McroStrategy\",\"Excel\",\"Linux\",\"Windows\",\"Linux\"],\"jobTitle\":\"Data Analyst\",\"worksFor\":\"Sonae MC\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Turla creates modular P2P botnet using Kazuar to maintain persistent access","description":"Turla enhances Kazuar with a modular P2P botnet, increasing persistence and discretion in digital intrusions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/criadix.com\/en\/technology-2\/turla-botnet-modular-p2p-kazuar-continuous-access\/","og_locale":"en_US","og_type":"article","og_title":"Conhe\u00e7a a nova botnet P2P modular da Turla que explora Kazuar","og_description":"A Turla aprimora sua backdoor Kazuar em uma botnet modular peer-to-peer garantindo controle furtivo sobre sistemas comprometidos.","og_url":"https:\/\/criadix.com\/en\/technology-2\/turla-botnet-modular-p2p-kazuar-continuous-access\/","og_site_name":"Criadix","article_publisher":"https:\/\/www.facebook.com\/criadixonline","article_author":"https:\/\/www.facebook.com\/lecestaro","article_published_time":"2026-05-20T15:33:34+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/criadix.com\/wp-content\/uploads\/2026\/05\/criadix-featured-5176-1779039362.webp","type":"image\/webp"}],"author":"Cestaro","twitter_card":"summary_large_image","twitter_title":"Como a botnet modular P2P do Turla evolui o malware Kazuar para ataques mais persistentes","twitter_creator":"@criadix","twitter_site":"@criadix","twitter_misc":{"Written by":"Cestaro","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#article","isPartOf":{"@id":"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/"},"author":{"name":"Cestaro","@id":"https:\/\/criadix.com\/es\/#\/schema\/person\/a3e9c6bf0a087b25f2b54aca550ac5d6"},"headline":"Como a botnet modular P2P do Turla evolui o malware Kazuar para ataques mais persistentes","datePublished":"2026-05-20T15:33:34+00:00","mainEntityOfPage":{"@id":"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/"},"wordCount":674,"commentCount":0,"image":{"@id":"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#primaryimage"},"thumbnailUrl":"https:\/\/criadix.com\/wp-content\/uploads\/2026\/05\/criadix-featured-5176-1779039362.webp","keywords":["botnet","ciberseguran\u00e7a","Kazuar","malware","Turla"],"articleSection":["Tecnologia"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#respond"]}],"copyrightYear":"2026","copyrightHolder":{"@id":"https:\/\/criadix.com\/en\/#organization"}},{"@type":"WebPage","@id":"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/","url":"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/","name":"Turla creates modular P2P botnet using Kazuar to maintain persistent access","isPartOf":{"@id":"https:\/\/criadix.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#primaryimage"},"image":{"@id":"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#primaryimage"},"thumbnailUrl":"https:\/\/criadix.com\/wp-content\/uploads\/2026\/05\/criadix-featured-5176-1779039362.webp","datePublished":"2026-05-20T15:33:34+00:00","author":{"@id":"https:\/\/criadix.com\/es\/#\/schema\/person\/a3e9c6bf0a087b25f2b54aca550ac5d6"},"description":"Turla enhances Kazuar with a modular P2P botnet, increasing persistence and discretion in digital intrusions.","breadcrumb":{"@id":"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#primaryimage","url":"https:\/\/criadix.com\/wp-content\/uploads\/2026\/05\/criadix-featured-5176-1779039362.webp","contentUrl":"https:\/\/criadix.com\/wp-content\/uploads\/2026\/05\/criadix-featured-5176-1779039362.webp","width":1024,"height":1024,"caption":"Como a botnet modular P2P do Turla evolui o malware Kazuar para ataques mais persistentes"},{"@type":"BreadcrumbList","@id":"https:\/\/criadix.com\/tecnologia\/turla-botnet-modular-p2p-kazuar-acesso-continuo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/criadix.com\/"},{"@type":"ListItem","position":2,"name":"Como a botnet modular P2P do Turla evolui o malware Kazuar para ataques mais persistentes"}]},{"@type":"WebSite","@id":"https:\/\/criadix.com\/es\/#website","url":"https:\/\/criadix.com\/es\/","name":"Criadix","description":"Digital content creation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/criadix.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/criadix.com\/es\/#\/schema\/person\/a3e9c6bf0a087b25f2b54aca550ac5d6","name":"Cestaro","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/criadix.com\/wp-content\/litespeed\/avatar\/0331060360abda439ced40107140ed91.jpg?ver=1779206770","url":"https:\/\/criadix.com\/wp-content\/litespeed\/avatar\/0331060360abda439ced40107140ed91.jpg?ver=1779206770","contentUrl":"https:\/\/criadix.com\/wp-content\/litespeed\/avatar\/0331060360abda439ced40107140ed91.jpg?ver=1779206770","caption":"Cestaro"},"description":"Hi, I'm Leandro Cestaro, creator of Criadix.com. I'm a data analyst, technology enthusiast and passionate about WordPress, artificial intelligence and digital content creation. I have solid experience in IT infrastructure and I'm always looking for creative solutions for complex environments, combining technique and practicality. As well as my professional side, I'm a father, married and believe in the power of knowledge to transform lives. At Criadix, I share experiences, tutorials and insights to help people explore the digital universe with more autonomy and inspiration. Welcome!","sameAs":["https:\/\/www.facebook.com\/lecestaro","https:\/\/www.instagram.com\/lecestaro","https:\/\/www.linkedin.com\/in\/lcestaro\/","https:\/\/www.youtube.com\/@lcestaro"],"birthDate":"1982-06-08","gender":"masculino","knowsAbout":["Wordpress","Power BI","McroStrategy","Excel","Linux","Windows","Linux"],"jobTitle":"Data Analyst","worksFor":"Sonae MC"}]}},"_links":{"self":[{"href":"https:\/\/criadix.com\/en\/wp-json\/wp\/v2\/posts\/5176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/criadix.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/criadix.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/criadix.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/criadix.com\/en\/wp-json\/wp\/v2\/comments?post=5176"}],"version-history":[{"count":2,"href":"https:\/\/criadix.com\/en\/wp-json\/wp\/v2\/posts\/5176\/revisions"}],"predecessor-version":[{"id":5596,"href":"https:\/\/criadix.com\/en\/wp-json\/wp\/v2\/posts\/5176\/revisions\/5596"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/criadix.com\/en\/wp-json\/wp\/v2\/media\/5178"}],"wp:attachment":[{"href":"https:\/\/criadix.com\/en\/wp-json\/wp\/v2\/media?parent=5176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/criadix.com\/en\/wp-json\/wp\/v2\/categories?post=5176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/criadix.com\/en\/wp-json\/wp\/v2\/tags?post=5176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}