{"id":922,"date":"2026-01-29T16:04:38","date_gmt":"2026-01-29T16:04:38","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/"},"modified":"2026-01-29T16:04:38","modified_gmt":"2026-01-29T16:04:38","slug":"supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/","title":{"rendered":"Supply chain attack on eScan antivirus: detecting and remediating malicious updates"},"content":{"rendered":"<div>\n<p><img width=\"990\" height=\"400\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/29135522\/SL-TR-escan-supply-chain-attack-featured-990x400.png\" class=\"attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image\" alt=\"\" decoding=\"async\" fetchpriority=\"high\"><\/p>\n<p>On January 20, a supply chain attack has occurred, with the infected software being the eScan antivirus developed by an Indian company MicroWorld Technologies. The previously unknown malware was distributed through the eScan update server. The same day, our security solutions detected and prevented cyberattacks involving this malware. On January 21, having been <a href=\"https:\/\/www.morphisec.com\/blog\/critical-escan-threat-bulletin\/\" target=\"_blank\">informed by Morphisec<\/a>, the developers of eScan contained the security incident related to the attack.<\/p>\n<h2 id=\"malicious-software-used-in-the-attack\">Malicious software used in the attack<\/h2>\n<p>Users of the eScan security product received a malicious Reload.exe file, which initiated a multi-stage infection chain. According to <a href=\"https:\/\/www.morphisec.com\/blog\/critical-escan-threat-bulletin\/\" target=\"_blank\">colleagues at Morphisec<\/a> who were the first to investigate the attack, Reload.exe prevented further antivirus product updates by modifying the HOSTS file, thereby blocking the ability of security solution developers to automatically fix the problem, which, among other things, led to the update service error.<\/p>\n<p>The malware also ensured its persistence in the system, communicated with control servers, and downloaded additional malicious payloads. Persistence was achieved by creating scheduled tasks; one example of such a malicious task is named CorelDefrag. Additionally, the consctlx.exe malicious file was written to the disk during the infection.<\/p>\n<h2 id=\"how-the-attackers-managed-to-pull-off-this-attack\">How the attackers managed to pull off this attack<\/h2>\n<p>At the request of the BleepingComputer information portal, eScan developers <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/escan-confirms-update-server-breached-to-push-malicious-update\/\" target=\"_blank\">explained<\/a> that the attackers managed to gain access to one of the regional update servers and deploy a malicious file, which was automatically delivered to customers. They emphasize that this is not a vulnerability \u2014 the incident is classified as unauthorized access to infrastructure. The malicious file was distributed with a fake invalid digital signature.<\/p>\n<p>According to the developers, the infrastructure affected by the incident was quickly isolated, and all access credentials were reset.<\/p>\n<h2 id=\"how-to-stay-safe\">How to stay safe?<\/h2>\n<p>To detect infection, it is recommended to review scheduled tasks for traces of malware, check the <code>%WinDir%System32driversetchosts<\/code> file for blocked eScan domains, and review the eScan update logs for January 20.<\/p>\n<p>The developers of eScan have created a utility for their users that removes the malware, rolls back the modifications it has made, and restores the normal functionality of the antivirus. The utility is sent to customers upon request to <a href=\"https:\/\/www.escanav.com\/en\/?srsltid=AfmBOooqWC0R6TK8ELDg-gdsIK5iRBxMekMLQ9ZBpCoy1qwTtDhEbyeS\" target=\"_blank\">technical support<\/a>.<\/p>\n<p>Users of the solution are also advised to block known malware control server addresses.<\/p>\n<p>Kaspersky\u2019s security solutions, such as <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr?icid=gl_sl_next-edr-lnk_sm-team_dc34482e3f882e81\" target=\"_blank\">Kaspersky Next<\/a>, successfully detect all malware used by attackers with its <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/wiki-section\/products\/behavior-based-protection?icid=gl_securelist_acq_ona_smm__onl_b2b_securelist_lnk_sm-team_______07b2e7cd1d493f81\" target=\"_blank\">Behavior Detection component<\/a>.<\/p>\n<h2 id=\"indicators-of-compromise\">Indicators of compromise<\/h2>\n<p>Several malicious domain names and links were <a href=\"https:\/\/www.morphisec.com\/blog\/critical-escan-threat-bulletin\/\" target=\"_blank\">listed<\/a> in the Morphisec blog:<\/p>\n<ul>\n<li>https:\/\/vhs.delrosal[.]net\/i<\/li>\n<li>https:\/\/tumama.hns[.]to<\/li>\n<li>https:\/\/blackice.sol-domain[.]org<\/li>\n<li>https:\/\/codegiant[.]io\/dd\/dd\/dd.git\/download\/main\/middleware.ts<\/li>\n<\/ul>\n<p>Our experts have discovered additional network IoCs related to this attack:<\/p>\n<ul>\n<li>https:\/\/airanks.hns[.]to<\/li>\n<li>https:\/\/csc.biologii[.]net\/sooc<\/li>\n<\/ul>\n<p>Right now we are analyzing the malware used in this incident, and will post more details as soon as possible.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>On January 20, a supply chain attack has occurred, with the infected software being the eScan antivirus developed by an Indian company MicroWorld Technologies. The previously unknown malware was distributed through the eScan update server. The same day, our security solutions detected and prevented cyberattacks involving this malware. On January 21, having been informed by [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[560,90,559,99,561,257],"tags":[91],"class_list":["post-922","post","type-post","status-publish","format-standard","hentry","category-antiviruses","category-cybersecurity","category-incidents","category-malware","category-supply-chain-attack","category-windows-malware","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Supply chain attack on eScan antivirus: detecting and remediating malicious updates - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Supply chain attack on eScan antivirus: detecting and remediating malicious updates - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"On January 20, a supply chain attack has occurred, with the infected software being the eScan antivirus developed by an Indian company MicroWorld Technologies. The previously unknown malware was distributed through the eScan update server. The same day, our security solutions detected and prevented cyberattacks involving this malware. On January 21, having been informed by [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-29T16:04:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/29135522\/SL-TR-escan-supply-chain-attack-featured-990x400.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Supply chain attack on eScan antivirus: detecting and remediating malicious updates\",\"datePublished\":\"2026-01-29T16:04:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/\"},\"wordCount\":477,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/29135522\/SL-TR-escan-supply-chain-attack-featured-990x400.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Antiviruses\",\"Cybersecurity\",\"Incidents\",\"Malware\",\"Supply-chain attack\",\"Windows malware\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/\",\"name\":\"Supply chain attack on eScan antivirus: detecting and remediating malicious updates - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/29135522\/SL-TR-escan-supply-chain-attack-featured-990x400.png\",\"datePublished\":\"2026-01-29T16:04:38+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#primaryimage\",\"url\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/29135522\/SL-TR-escan-supply-chain-attack-featured-990x400.png\",\"contentUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/29135522\/SL-TR-escan-supply-chain-attack-featured-990x400.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Supply chain attack on eScan antivirus: detecting and remediating malicious updates\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Supply chain attack on eScan antivirus: detecting and remediating malicious updates - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/","og_locale":"en_US","og_type":"article","og_title":"Supply chain attack on eScan antivirus: detecting and remediating malicious updates - Imperative Business Ventures Limited","og_description":"On January 20, a supply chain attack has occurred, with the infected software being the eScan antivirus developed by an Indian company MicroWorld Technologies. The previously unknown malware was distributed through the eScan update server. The same day, our security solutions detected and prevented cyberattacks involving this malware. On January 21, having been informed by [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-01-29T16:04:38+00:00","og_image":[{"url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/29135522\/SL-TR-escan-supply-chain-attack-featured-990x400.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Supply chain attack on eScan antivirus: detecting and remediating malicious updates","datePublished":"2026-01-29T16:04:38+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/"},"wordCount":477,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/29135522\/SL-TR-escan-supply-chain-attack-featured-990x400.png","keywords":["Cybersecurity"],"articleSection":["Antiviruses","Cybersecurity","Incidents","Malware","Supply-chain attack","Windows malware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/","name":"Supply chain attack on eScan antivirus: detecting and remediating malicious updates - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/29135522\/SL-TR-escan-supply-chain-attack-featured-990x400.png","datePublished":"2026-01-29T16:04:38+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#primaryimage","url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/29135522\/SL-TR-escan-supply-chain-attack-featured-990x400.png","contentUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/01\/29135522\/SL-TR-escan-supply-chain-attack-featured-990x400.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/01\/29\/supply-chain-attack-on-escan-antivirus-detecting-and-remediating-malicious-updates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Supply chain attack on eScan antivirus: detecting and remediating malicious updates"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=922"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/922\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}