{"id":5200,"date":"2019-04-24T10:09:53","date_gmt":"2019-04-24T08:09:53","guid":{"rendered":"https:\/\/soflab.pl\/2021\/08\/13\/is-your-organization-ready-for-a-social-engineering-attack\/"},"modified":"2021-11-24T13:41:25","modified_gmt":"2021-11-24T12:41:25","slug":"is-your-organization-ready-for-a-social-engineering-attack","status":"publish","type":"post","link":"https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/","title":{"rendered":"Is your organization ready for a social engineering attack?"},"content":{"rendered":"<p>The mobile on the desk rang for about sixth time on that day. John picked it up reluctantly just to hear a bored voice saying:<\/p>\n<p>&#8211; Hello. My name is Adam Nowak, I am calling on behalf of SuperTelco. I would like to arrange a technician\u2019s visit to check the bandwidth in your company. We have received a notification no. CRT 2019\/098542M concerning a slow Internet connection at your location.<\/p>\n<p>John had been working in the company as an administrator for just a week, his predecessor had left to another organization and left his follower barely any information. He hesitated but after a while remembered the \u201eslow website loading\u201d problem discussed by some people he heard in the corridor.<\/p>\n<p>Do you, by any chance, know the name of the person who sent the notification? &#8211;&nbsp; asked hoping to find a way to somehow delay, or at least postpone the technician\u2019s visit and all the extra tasks resulting from the unplanned notification.<\/p>\n<p>Unfortunately, the voice on the other end of the line relentlessly gave the name of his predecessor as the reporting person. John sighed and scheduled the visit for the upcoming Wednesday.<\/p>\n<p>The visit went exactly as our administrator remembered it from the dozens of previous meetings with technicians from telecom companies. There were a few jokes told, funny only for the \u201etech-savvy\u201d, they drank some coffee, and the technician mounted a device in one of the Ethernet router ports in the server room.<\/p>\n<p>This longitudinal box did not raise any suspicions, plus the technician himself seemed like a nice professional.<\/p>\n<p>They agreed that more data concerning a longer period would be needed to determine the reason for the \u201eslow Internet\u201d (they both smiled knowingly when using this expression) and this device was supposed to allow it to happen. Besides, both LED indicators on the Ethernet port were already flashing steadily at the rate of the received data packets. After about half an hour, the technician said goodbye and walked by John left the company building.<\/p>\n<p>Somewhere on the other side of the city, a man in front of the laptop screen smiled pleased with the effects of his partner\u2019s work, who had just mounted a device allowing remote access to the network and to eavesdrop the entire network traffic in some insurance company\u2019s server room. The console started to display the very first filtered users\u2019 login data used in internal systems of the attacked company. Communication was not encrypted, which was not really surprising or strange. Most companies do not encrypt communication in their intranet, assuming it is a safe zone for the users.<\/p>\n<p>It did not take much time for the consequences of such a careless approach for the company to emerge.<\/p>\n<p>Access to billing department allowed to replace most of the bank account numbers of the company\u2019s contractors for the fake ones. When the accounting department workers realized that the transfers had been sent to the wrong accounts, over sixty percent of the payments had already been withdrawn by the robbers\u2019 coworkers.<\/p>\n<p>Apart from the purely financial loss, the company has also suffered severe reputation damage when other contractors began to send payment requests for the past due invoices.<\/p>\n<h3 style=\"text-align: center;\"><a href=\"mailto:oferta.security@soflab.pl\" target=\"_blank\" rel=\"noopener noreferrer\">If you want to conduct a controlled social engineering attack, check the compliance with security procedures and the level of information security awareness in your company, contact us.<\/a><\/h3>\n<h2><strong>Social engineering attack does not have to be complicated<\/strong><\/h2>\n<p>Let us focus on the crucial elements of the above-described attack.<\/p>\n<p>All the vital sensitive data such as name and last name of John\u2019s predecessor was gained via LinkedIn. Information shared by the users of this platform includes employment dates as well as job titles and positions taken within those periods.<\/p>\n<p>The name of the telecom company providing services for the \u201eattack victim\u201d was acquired via a number of regular phone calls presenting fictional offers of companies from this business sector. After the third phone call, a very nice lady claimed that she appreciated the services they had been receiving and that she was not interested in any new offer.<\/p>\n<p>Clothing and telecom technician\u2019s ID card was made for order, however, neither the printing company nor the shop offering t-shirt prints had asked any extra questions.<\/p>\n<p>The device installed in the server room by the fake technician is the so-called \u201eLAN Turtle\u201d. Anyone can order such a gadget for about 90 USD. It allows to monitor and intercept LAN network traffic on which it has been installed.<\/p>\n<p>All the costs and time invested in such a simple but effective attack are not too high. However, its consequences for the organization are very difficult to predict. Surely, all the clients\u2019 data, employees\u2019 logins and passwords became the intruders\u2019 property.<\/p>\n<p>If you want to perform a controlled social engineering attack to verify procedures compliance, as well as the level of information security awareness in your company,&nbsp; contact us.<\/p>\n<h2><strong>How to defend from social engineering attack?<\/strong><\/h2>\n<p><strong>Social engineering, in ICT, is a set of methods aimed at obtaining confidential and sensitive information by a cybercriminal.<\/strong> Very often, hackers use the ignorance or credulity of the system users to overcome the security systems resistant to various forms of attack. &nbsp;They use the weakest link in security &#8211; a human.<\/p>\n<p>Social engineering attack on a company or organization is of <strong>psychological nature<\/strong>. It takes advantage of the natural tendency people have to trust others. The attacker uses an alter ego that is trustworthy and persuades an individual to do all the actions he needs which lead to data disclosure. It can involve confidential data, such as logins and passwords, that very rarely is the real goal of the attacker. It can also concern some other things such as a manager\u2019s or contractor\u2019s name and will lead to the ultimate goal. It is especially dangerous as while gaining seemingly insignificant data the attacker may easily build his story background while contacting the people within the organization.<\/p>\n<p>This leads us to the conclusion that a company that truly cares about its own and its clients\u2019 security should <strong>continuously implement, test and improve procedures and controls that prevent such incidents from occurring.<\/strong><\/p>\n<p>We need to remember that <strong>security is a process<\/strong> and the creativity of the criminals is limited only by the time and technical tools they possess.<\/p>\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/soflab.pl\/en\/our-services\/security-test\/\" target=\"_blank\" rel=\"noopener noreferrer\">Find out more about social engineering tests, procedures and physical security measures in our offer.<\/a><\/h3>\n<p>&nbsp;<\/p>\n<p>The article was written by Dominik Lewandowski, Penetration Tests Coordinator in Soflab Technology<\/p>\n<p>Photo by Taskin Ashiq\/ Unplash<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The mobile on the desk rang for about sixth time on that day. John picked it up reluctantly just to hear a bored voice saying: &#8211; Hello. My name is Adam Nowak, I am calling on behalf of SuperTelco. I would like to arrange a technician\u2019s visit to check the bandwidth in your company. We [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[190],"tags":[],"class_list":["post-5200","post","type-post","status-publish","format-standard","hentry","category-news-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is your organization ready for a social engineering attack? | Soflab Technology<\/title>\n<meta name=\"description\" content=\"Soflab to firma zajmuj\u0105ca si\u0119 przeprowadzaniem profesjonalnych test\u00f3w oprogramowania i zapewnieniem jako\u015bci system\u00f3w. Wybierz us\u0142ugi najlepszej jako\u015bci!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is your organization ready for a social engineering attack? | Soflab Technology\" \/>\n<meta property=\"og:description\" content=\"Soflab to firma zajmuj\u0105ca si\u0119 przeprowadzaniem profesjonalnych test\u00f3w oprogramowania i zapewnieniem jako\u015bci system\u00f3w. Wybierz us\u0142ugi najlepszej jako\u015bci!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Soflab\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoflabTechnology\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-24T08:09:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-24T12:41:25+00:00\" \/>\n<meta name=\"author\" content=\"Katarzyna Wojtiuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katarzyna Wojtiuk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/is-your-organization-ready-for-a-social-engineering-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/is-your-organization-ready-for-a-social-engineering-attack\\\/\"},\"author\":{\"name\":\"Katarzyna Wojtiuk\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#\\\/schema\\\/person\\\/91a6eb77e23b7c82e0e5435e731ca7c1\"},\"headline\":\"Is your organization ready for a social engineering attack?\",\"datePublished\":\"2019-04-24T08:09:53+00:00\",\"dateModified\":\"2021-11-24T12:41:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/is-your-organization-ready-for-a-social-engineering-attack\\\/\"},\"wordCount\":1104,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#organization\"},\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/is-your-organization-ready-for-a-social-engineering-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/is-your-organization-ready-for-a-social-engineering-attack\\\/\",\"url\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/is-your-organization-ready-for-a-social-engineering-attack\\\/\",\"name\":\"Is your organization ready for a social engineering attack? | Soflab Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#website\"},\"datePublished\":\"2019-04-24T08:09:53+00:00\",\"dateModified\":\"2021-11-24T12:41:25+00:00\",\"description\":\"Soflab to firma zajmuj\u0105ca si\u0119 przeprowadzaniem profesjonalnych test\u00f3w oprogramowania i zapewnieniem jako\u015bci system\u00f3w. Wybierz us\u0142ugi najlepszej jako\u015bci!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/is-your-organization-ready-for-a-social-engineering-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/is-your-organization-ready-for-a-social-engineering-attack\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/is-your-organization-ready-for-a-social-engineering-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/soflab.pl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is your organization ready for a social engineering attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/soflab.pl\\\/en\\\/\",\"name\":\"Soflab\",\"description\":\"Soflab QA &amp; Testing\",\"publisher\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/soflab.pl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#organization\",\"name\":\"Soflab\",\"url\":\"https:\\\/\\\/soflab.pl\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/soflab.pl\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/logo-soflab.png\",\"contentUrl\":\"https:\\\/\\\/soflab.pl\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/logo-soflab.png\",\"width\":171,\"height\":35,\"caption\":\"Soflab\"},\"image\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/SoflabTechnology\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/soflab-technology-sp--z-o-o-\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#\\\/schema\\\/person\\\/91a6eb77e23b7c82e0e5435e731ca7c1\",\"name\":\"Katarzyna Wojtiuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb60d5b6ea62f3b278da1e7a3120405d74e8059d81c4ecd2d6177e4f864ccfe8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb60d5b6ea62f3b278da1e7a3120405d74e8059d81c4ecd2d6177e4f864ccfe8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb60d5b6ea62f3b278da1e7a3120405d74e8059d81c4ecd2d6177e4f864ccfe8?s=96&d=mm&r=g\",\"caption\":\"Katarzyna Wojtiuk\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is your organization ready for a social engineering attack? | Soflab Technology","description":"Soflab to firma zajmuj\u0105ca si\u0119 przeprowadzaniem profesjonalnych test\u00f3w oprogramowania i zapewnieniem jako\u015bci system\u00f3w. Wybierz us\u0142ugi najlepszej jako\u015bci!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/","og_locale":"en_US","og_type":"article","og_title":"Is your organization ready for a social engineering attack? | Soflab Technology","og_description":"Soflab to firma zajmuj\u0105ca si\u0119 przeprowadzaniem profesjonalnych test\u00f3w oprogramowania i zapewnieniem jako\u015bci system\u00f3w. Wybierz us\u0142ugi najlepszej jako\u015bci!","og_url":"https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/","og_site_name":"Soflab","article_publisher":"https:\/\/www.facebook.com\/SoflabTechnology","article_published_time":"2019-04-24T08:09:53+00:00","article_modified_time":"2021-11-24T12:41:25+00:00","author":"Katarzyna Wojtiuk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Katarzyna Wojtiuk","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/#article","isPartOf":{"@id":"https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/"},"author":{"name":"Katarzyna Wojtiuk","@id":"https:\/\/soflab.pl\/en\/#\/schema\/person\/91a6eb77e23b7c82e0e5435e731ca7c1"},"headline":"Is your organization ready for a social engineering attack?","datePublished":"2019-04-24T08:09:53+00:00","dateModified":"2021-11-24T12:41:25+00:00","mainEntityOfPage":{"@id":"https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/"},"wordCount":1104,"commentCount":0,"publisher":{"@id":"https:\/\/soflab.pl\/en\/#organization"},"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/","url":"https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/","name":"Is your organization ready for a social engineering attack? | Soflab Technology","isPartOf":{"@id":"https:\/\/soflab.pl\/en\/#website"},"datePublished":"2019-04-24T08:09:53+00:00","dateModified":"2021-11-24T12:41:25+00:00","description":"Soflab to firma zajmuj\u0105ca si\u0119 przeprowadzaniem profesjonalnych test\u00f3w oprogramowania i zapewnieniem jako\u015bci system\u00f3w. Wybierz us\u0142ugi najlepszej jako\u015bci!","breadcrumb":{"@id":"https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/soflab.pl\/en\/news-en\/is-your-organization-ready-for-a-social-engineering-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/soflab.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Is your organization ready for a social engineering attack?"}]},{"@type":"WebSite","@id":"https:\/\/soflab.pl\/en\/#website","url":"https:\/\/soflab.pl\/en\/","name":"Soflab","description":"Soflab QA &amp; Testing","publisher":{"@id":"https:\/\/soflab.pl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/soflab.pl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/soflab.pl\/en\/#organization","name":"Soflab","url":"https:\/\/soflab.pl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/soflab.pl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/soflab.pl\/wp-content\/uploads\/2021\/08\/logo-soflab.png","contentUrl":"https:\/\/soflab.pl\/wp-content\/uploads\/2021\/08\/logo-soflab.png","width":171,"height":35,"caption":"Soflab"},"image":{"@id":"https:\/\/soflab.pl\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoflabTechnology","https:\/\/www.linkedin.com\/company\/soflab-technology-sp--z-o-o-"]},{"@type":"Person","@id":"https:\/\/soflab.pl\/en\/#\/schema\/person\/91a6eb77e23b7c82e0e5435e731ca7c1","name":"Katarzyna Wojtiuk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cb60d5b6ea62f3b278da1e7a3120405d74e8059d81c4ecd2d6177e4f864ccfe8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb60d5b6ea62f3b278da1e7a3120405d74e8059d81c4ecd2d6177e4f864ccfe8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb60d5b6ea62f3b278da1e7a3120405d74e8059d81c4ecd2d6177e4f864ccfe8?s=96&d=mm&r=g","caption":"Katarzyna Wojtiuk"}}]}},"_links":{"self":[{"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/posts\/5200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/comments?post=5200"}],"version-history":[{"count":2,"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/posts\/5200\/revisions"}],"predecessor-version":[{"id":7694,"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/posts\/5200\/revisions\/7694"}],"wp:attachment":[{"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/media?parent=5200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/categories?post=5200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/tags?post=5200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}