{"id":8612,"date":"2023-08-16T06:13:00","date_gmt":"2023-08-16T06:13:00","guid":{"rendered":"https:\/\/www.trustrecipe.in\/?p=8612"},"modified":"2023-09-27T08:41:43","modified_gmt":"2023-09-27T08:41:43","slug":"wormhole-bridge-hack-feb-2-2022-detailed-hack-analysis","status":"publish","type":"post","link":"https:\/\/immunebytes.com\/blog\/wormhole-bridge-hack-feb-2-2022-detailed-hack-analysis\/","title":{"rendered":"Wormhole Bridge Hack &#8211; Feb 2, 2022 &#8211; Detailed Hack Analysis"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Overview<\/h3>\n\n\n\n<p>On February 2, 2022, at 5:58 PM +UTC, Wormhole Bridge on <a href=\"https:\/\/www.trustrecipe.in\/exploring-solana-a-technical-deep-dive\/\" title=\"\">Solana <\/a>was exploited for ~$320 million due to <a href=\"https:\/\/www.trustrecipe.in\/smart-contract-vulnerabilities\/\" title=\"\">smart contract vulnerability.<\/a> These malicious actions resulted in one of the most significant cryptocurrency thefts in DeFi history, leading to the loss of approximately 120,000 Wormhole Ethereum (WeETH) tokens, valued at over $320 million.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hack in a Nutshell<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Before initiating the attack, the assailant received 0.94 ETH from <a href=\"https:\/\/www.trustrecipe.in\/what-is-tornado-cash-why-is-it-popular-with-hackers\/\" title=\"\">Tornado Cash<\/a>, a privacy-focused Ethereum mixer, to facilitate the payment of transaction fees associated with their subsequent actions.<\/li><li>An additional 0.1 ETH was transferred to an address associated with a prominent international cryptocurrency exchange.<\/li><li>During the exploitation phase, the attacker manipulated the verification process by introducing a counterfeit Sysvar account, allowing them to create a fraudulent &#8220;message&#8221; requesting the minting of 120,000 wETH.<\/li><li>By invoking the <strong>&#8220;complete_wrapped&#8221;<\/strong> function with this malicious &#8220;message,&#8221; the attacker successfully minted 120,000 wETH tokens.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"840\" height=\"726\" src=\"https:\/\/www.trustrecipe.in\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-1.png\" alt=\"\" class=\"wp-image-8614\" srcset=\"https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-1.png 840w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-1-300x259.png 300w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-1-768x664.png 768w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-1-585x506.png 585w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>Shortly thereafter, the assailant executed a transaction, bridging 10,000 ETH to the <a href=\"https:\/\/www.trustrecipe.in\/ethereum-virtual-machine-in-blockchain\/\" title=\"\">Ethereum blockchain<\/a>, followed by another transaction involving 80,000 ETH roughly 20 minutes later.<\/li><li>As of the present, the ill-gotten assets remain within the attacker&#8217;s control, with primary addresses being Account CxegPrfn2ge5dNiQberUrQJkHCcimeR4VXkeawcFBBka and 0x629e7Da20197a5429d30da36E77d06CdF796b71A, among others.<\/li><li>Wormhole acknowledged the security breach on the day of the incident through their official Twitter account.<\/li><li>On February 3, 2022, Jump Trading, the parent company of Wormhole, attempted to reach out to the attacker by offering a $10 million bounty in exchange for the return of the stolen assets. Unfortunately, this offer was met with silence.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Attack Technical Analysis<\/h3>\n\n\n\n<p>The attacker meticulously executed a series of steps to exploit vulnerabilities within the Wormhole bridge&#8217;s verification process:<\/p>\n\n\n\n<p><strong>Step 1: Spoofed &#8220;verify_signatures&#8221; Function<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The attacker initiated the attack by invoking the &#8220;verify_signatures&#8221; function. This function is integral to the verification process and plays a critical role in ensuring the authenticity of transactions.<\/li><li>Within this function, a malicious &#8220;Sysvar account&#8221; was introduced to deceive the system. You can view the transaction here: (https:\/\/solscan.io\/tx\/25Zu1L2Q9uk998d5GMnX43t9u9eVBKvbVtgHndkc2GmUFed8Pu73LGW6hiDsmGXHykKUTLkvUdh4yXPdL3Jo4wVS).<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.trustrecipe.in\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-2-1024x574.png\" alt=\"\" class=\"wp-image-8615\" srcset=\"https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-2-1024x574.png 1024w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-2-300x168.png 300w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-2-768x431.png 768w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-2-585x328.png 585w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-2.png 1066w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Step 2: Counterfeit &#8220;verify_signatures&#8221; Function<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The attacker employed a counterfeit &#8220;verify_signatures&#8221; function with the injected malicious &#8220;sysvar account.&#8221; This deceptive function aimed to subvert the verification process and grant the attacker unauthorized access.<\/li><li>A genuine &#8220;verify_signatures&#8221; function with a legitimate &#8220;Sysvar account&#8221; is shown for reference.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"561\" src=\"https:\/\/www.trustrecipe.in\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-3-1024x561.png\" alt=\"\" class=\"wp-image-8616\" srcset=\"https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-3-1024x561.png 1024w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-3-300x164.png 300w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-3-768x420.png 768w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-3-585x320.png 585w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-3.png 1074w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Step 3: Exploiting &#8220;load_current_index&#8221; Vulnerability<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Within the legitimate &#8220;verify_signatures&#8221; function, the system typically loads the current instructions from the Sysvar, specifically at instruction L92.<\/li><li>However, a critical vulnerability was exposed in the function &#8220;load_current_index.&#8221; This vulnerability failed to validate whether the injected &#8220;Sysvar account&#8221; corresponded to the authentic &#8220;system sysvar.&#8221;<\/li><li>As the current instruction (L92) retrieved from the &#8220;sysvar&#8221; was under the attacker&#8217;s control, it enabled the attacker to manipulate the verification process with impunity.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"548\" src=\"https:\/\/www.trustrecipe.in\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-4-1024x548.png\" alt=\"\" class=\"wp-image-8617\" srcset=\"https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-4-1024x548.png 1024w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-4-300x161.png 300w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-4-768x411.png 768w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-4-1536x823.png 1536w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-4-1170x627.png 1170w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-4-585x313.png 585w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-4.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Step 4: Malicious &#8220;post_vaa&#8221; Function<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>With the verification process compromised, the attacker proceeded to invoke the &#8220;post_vaa&#8221; function using the verified signatures obtained in the previous step.<\/li><li>Within this action, the attacker created a malevolent message account specifying the minting of 120,000 wETH. The transaction can be viewed here: (https:\/\/solscan.io\/tx\/2SohoVoPDSdzgsGCgKQPByKQkLAXHrYmvtE7EEqwKi3qUBTGDDJ7DcfYS7YJC2f8xwKVVa6SFUpH5MZ5xcyn1BCK).<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"452\" src=\"https:\/\/www.trustrecipe.in\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-5-1024x452.png\" alt=\"\" class=\"wp-image-8618\" srcset=\"https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-5-1024x452.png 1024w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-5-300x132.png 300w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-5-768x339.png 768w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-5-1170x518.png 1170w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-5-585x258.png 585w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-5.png 1174w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Step 5: Executing &#8220;complete_wrapped&#8221; Function<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Building on the foundation established in the previous steps, the attacker proceeded to invoke the &#8220;complete_wrapped&#8221; function.<\/li><li>This function processed the data contained within the malicious message account created in the &#8220;post_vaa&#8221; step, culminating in the minting of 120,000 wETH tokens. The transaction details can be found here: (https:\/\/solscan.io\/tx\/2zCz2GgSoSS68eNJENWrYB48dMM1zmH8SZkgYneVDv2G4gRsVfwu5rNXtK5BKFxn7fSqX9BvrBc1rdPAeBEcD6Es).<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"999\" height=\"1024\" src=\"https:\/\/www.trustrecipe.in\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-6-999x1024.png\" alt=\"\" class=\"wp-image-8619\" srcset=\"https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-6-999x1024.png 999w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-6-293x300.png 293w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-6-768x787.png 768w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-6-585x599.png 585w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-6.png 1138w\" sizes=\"auto, (max-width: 999px) 100vw, 999px\" \/><\/figure>\n\n\n\n<p><strong>Step 6: Asset Movements<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Following the minting of wETH, the attacker orchestrated a series of asset movements:<\/li><li>Some of the minted wETH tokens were transferred to the Ethereum blockchain.<\/li><li>The remaining wETH tokens were exchanged for USDC and SOL on the Solana blockchain, utilizing various transactions:<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\"><li>https:\/\/solscan.io\/tx\/j3jUDG43di8Dsg7Q3jQhstamtBovu1GLqnDJ7yNvM3r4pnK9e7uqgt9uBobCjT5S1BKhZZFQNQwDxypEYqLknec<\/li><li>https:\/\/solscan.io\/tx\/5UaqPus91wvAzKNve6L8YAHsESomZQ7GWi37gPFyzTHcXNMZA641bb8m8txo7bS7A5cAnzKDKYyiKcQC8GgDcAuf<\/li><li>https:\/\/solscan.io\/tx\/3AugXqrXunBa96YfqENhPBiWZWpnSnJdqAHS64qcHTVU9KtfGon8cN9cUuXsDmBobBBXjYUtuRxnYxgERS42nh6G<\/li><li>https:\/\/solscan.io\/tx\/2SndtH3tU4j6v14HJzEde3d3dnpdHqTPn4VnvhTj4zKLo26H5kmtCwjn2nANfjXNVbmFsyEGtD4Jte25azsPwaRk<\/li><\/ol>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Contract Vulnerability Analysis<\/h3>\n\n\n\n<p>The underlying cause of this exploit can be attributed to a critical oversight within the verification process, specifically within the <strong>&#8220;verify_signatures&#8221;<\/strong> function. The flaw resided in the usage of the deprecated function <strong>&#8220;load_current_index&#8221;<\/strong> which failed to validate the authenticity of the provided &#8220;sysvar account.&#8221; Consequently, the attacker could manipulate this critical account, enabling the successful execution of the exploit.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"746\" src=\"https:\/\/www.trustrecipe.in\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-7-1024x746.png\" alt=\"\" class=\"wp-image-8620\" srcset=\"https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-7-1024x746.png 1024w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-7-300x218.png 300w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-7-768x559.png 768w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-7-1170x852.png 1170w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-7-585x426.png 585w, https:\/\/immunebytes.com\/blog\/wp-content\/uploads\/2023\/09\/Wormhole-Bridge-Hack-7.png 1516w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Fund Movement<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>The stolen assets include 432,662.14 SOL, 93,750 ETH, and 1444.16 USDC.<\/li><li>Key attacker-controlled addresses encompass CxegPrfn2ge5dNiQberUrQJkHCcimeR4VXkeawcFBBka and 0x629, collectively holding assets valued at approximately 297.6 million USD.<\/li><\/ul>\n\n\n\n<p><strong>Attacker Accounts Holding Assets<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>SOL Account (CxegPrfn2ge5dNiQberUrQJkHCcimeR4VXkeawcFBBka):<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Holds 432,662.14 SOL valued at $46,649,632.46.<\/li><li>Ethereum address: 0x629e7da20197a5429d30da36e77d06cdf796b71a.<\/li><li>Total assets held: Approximately 297.6 million USD.<\/li><\/ul>\n\n\n\n<p><strong>Assets Transfers<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>1444.16 USDC were sent to DiLuXdZ5TbQ1jUNEF6tNstHNqXJ3mTCrsVrM6DeX18Mh<br><strong>Txn: <\/strong>https:\/\/solscan.io\/tx\/29Rb5q5hYb2bxMKNeT2jkJ4WLqgGWqYmA8aNvrE5vG8BTtHMUDesxbyGMcmGaZj3tqXDacPQAQkPbz1kaF5fYer6<\/li><li>16879.39 ETH was converted to 269,356.66 SOL. <br><strong>Txn: <\/strong>https:\/\/solscan.io\/tx\/2SndtH3tU4j6v14HJzEde3d3dnpdHqTPn4VnvhTj4zKLo26H5kmtCwjn2nANfjXNVbmFsyEGtD4Jte25azsPwaRk<\/li><li>1866 ETH was exchanged for 4.9 million USDC.<br><strong>Txn: <\/strong>https:\/\/solscan.io\/tx\/29Rb5q5hYb2bxMKNeT2jkJ4WLqgGWqYmA8aNvrE5vG8BTtHMUDesxbyGMcmGaZj3tqXDacPQAQkPbz1kaF5fYer6<\/li><li>7504 ETH was swapped for 18 million USDC. <br><strong>Txn: <\/strong>https:\/\/solscan.io\/tx\/4ZYmPrwPUXfyUqp4GAh6thxe8TM8rJ5JEC7ns7nhE6Jeq4dbp3PpLem1TX6b4Ntg3fPF5gU7ZDYvXkQQcsj3RyvC<\/li><li>18,044,852.11 USDC was converted to 122,049 SOL.<br><strong>Txn: <\/strong>https:\/\/solscan.io\/tx\/2wor1JjWFLLwgzVgjREXbHDk9HVkPAnY5xjWnVKRK18hvkFtSw9KkmdQyUbWdSQu8KTTMv43x7VWpA1527zQjArH<\/li><\/ul>\n\n\n\n<p><strong>Attacker Accounts on Solana<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The account responsible for minting 120,000 Ether (Wormhole) is 2SDN4vEJdCdW3pGyhx2km9gB3LeHzMGLrG2j4uVNZfrx.<\/li><li>Account CxegPrfn2ge5dNiQberUrQJkHCcimeR4VXkeawcFBBka created the above account.<\/li><\/ul>\n\n\n\n<p><strong>Source of the First Transaction Fees<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The transaction fees for the initial attack were sourced from Account 2ojv9BAiHUrvsm9gxDe7fJSzbNZSJcxZvf8dqmWGHG8S. <br><strong>Txn: <\/strong>https:\/\/solscan.io\/tx\/mHJoRkfJGiUy54LQjRtMBd8pz82GgZmDVx8jVzXWVkzpg7JUT3EDb4BEBq8HcYZ15HjRUojoroMpYs7KBCYyzE9<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Similar Incidents<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>A notable cross-chain bridge attack targeted the Harmony network, where an attacker took control of a MultiSig Wallet to authorize the transfer of 13,100 ETH to their own address.<\/li><li>An earlier attack on the Qubit network resulted in an $80 million theft. In this instance, the attacker manipulated the QBridge contract to mint 77,162 qxETH on the target blockchain.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>The Wormhole bridge exploit can be attributed to the oversight in validating &#8220;guardian&#8221; accounts, ultimately allowing the attacker to mint 120,000 wETH tokens without proper backing. <\/p>\n\n\n\n<p>This incident underscores the critical importance of fortifying security measures within DeFi protocols and cross-chain bridges. Always get your projects <a href=\"https:\/\/immunebytes.com\/blog\/smart-contract-audit\/\" title=\"\">audited<\/a> by Top leaders like Immunebytes to avoid loss of funds and reputation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview On February 2, 2022, at 5:58 PM +UTC, Wormhole Bridge on Solana was exploited for ~$320 million due to&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8673,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[6,679],"tags":[],"class_list":["post-8612","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crypto-hacks-exploits","category-web3-security"],"_links":{"self":[{"href":"https:\/\/immunebytes.com\/blog\/wp-json\/wp\/v2\/posts\/8612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immunebytes.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/immunebytes.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/immunebytes.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/immunebytes.com\/blog\/wp-json\/wp\/v2\/comments?post=8612"}],"version-history":[{"count":17,"href":"https:\/\/immunebytes.com\/blog\/wp-json\/wp\/v2\/posts\/8612\/revisions"}],"predecessor-version":[{"id":8802,"href":"https:\/\/immunebytes.com\/blog\/wp-json\/wp\/v2\/posts\/8612\/revisions\/8802"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immunebytes.com\/blog\/wp-json\/wp\/v2\/media\/8673"}],"wp:attachment":[{"href":"https:\/\/immunebytes.com\/blog\/wp-json\/wp\/v2\/media?parent=8612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/immunebytes.com\/blog\/wp-json\/wp\/v2\/categories?post=8612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/immunebytes.com\/blog\/wp-json\/wp\/v2\/tags?post=8612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}