{"id":111124,"date":"2025-05-02T15:04:59","date_gmt":"2025-05-02T07:04:59","guid":{"rendered":"https:\/\/version-2.com\/?p=111124"},"modified":"2025-04-30T15:12:05","modified_gmt":"2025-04-30T07:12:05","slug":"the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/05\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods\/","title":{"rendered":"The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"111124\" class=\"elementor elementor-111124\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"content-c11623676\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/04\/250x250-PostCronos.png\" alt=\"\" width=\"250\" height=\"250\" \/><\/p><div><div class=\"meta\"><span class=\"author\">Roman Cuprik<\/span><time class=\"date hidden-to-sm\">28 Apr 2025<\/time><\/div><div id=\"content-c11667635\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em>Cybercriminals increasingly utilize Ransomware as a Service boosted by EDR Killers. ESET meets the challenge with its prevention-first approach.<\/em><\/p><p>2024 marked a significant milestone in the fight against ransomware, bringing some good news and some bad news.<\/p><p>Let\u2019s start with the good: the US Department of Justice and Europol <a href=\"https:\/\/www.justice.gov\/archives\/opa\/pr\/us-and-uk-disrupt-lockbit-ransomware-variant\" target=\"_blank\" rel=\"noopener\">cracked down on the infamous LockBit ransomware gang<\/a>, inflicting a serious blow to the ransomware underworld.<\/p><p>The bad news? ESET researchers discovered new players quickly stepping in to replace those notorious but dissolving ransomware groups by using aggressive \u201cbusiness strategies\u201d and tools to shut down endpoint protections.<\/p><p>Facing these new threats, businesses need to be prepared with prevention-oriented and multi-layered protection capable of staying one step ahead of cybercriminals.<\/p><\/div><div id=\"content-c11667636\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Hotshots with fancy tools<\/h3><\/header><p>Out of all the new players in the world of ransomware, perhaps RansomHub is the most notable, particularly due to its growth and tactics. The group posted its first victim in February 2024; by the end of that same year the group had taken a dominant position on the ransomware scene.<\/p><p>As any emerging Ransomware as a Service (RaaS) operator, to start, RansomHub needed to attract affiliates. To gather its \u201ccustomers\u201d quickly, the group allowed its affiliates to keep 90% of the collected ransoms, guaranteed the receipt of payments directly to the affiliate\u2019s wallet, and offered multiple ways to enter its RaaS program, allowing even low-skilled affiliates to try their luck.<\/p><p>In the meantime, the group posted several updates, and by May 2024, had taken another significant step \u2013 RansomHub introduced its own Endpoint Detection and Response (EDR) killer, a type of malware designed to terminate, blind, or crash the installed security solution, typically by abusing a vulnerable driver.<\/p><p>RansomHub\u2019s EDR killer, dubbed <a href=\"https:\/\/news.sophos.com\/en-us\/2024\/08\/14\/edr-kill-shifter\/\" target=\"_blank\" rel=\"noopener\">EDRKillShifter by Sophos<\/a>, is a custom tool developed and maintained by the operator. This unique approach goes against the traditional strategy of reusing or slightly modifying existing proof of concepts available online or utilizing EDR killers available as a service on the dark web.<\/p><p>Meanwhile, ESET researchers discovered a single threat actor in possession of two EDRKillShifter samples, linked to multiple ransomware groups (BianLian, RansomHub, Medusa, and Play). This demonstrates another trend in the world of ransomware \u2013 skilled affiliates working for multiple operators in parallel, which enhances the operators\u2019 malicious capabilities even further.<\/p><\/div><div id=\"content-c11667637\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Ransomware gangs milking businesses<\/h3><\/header><p>In 2023, organizations all around the world detected <a href=\"https:\/\/www.statista.com\/statistics\/494947\/ransomware-attempts-per-year-worldwide\/\" target=\"_blank\" rel=\"noopener\">317.59 million ransomware attempts<\/a>. Manufacturing and the food\/beverage industry were targeted the most.<\/p><p>Between 2022 and 2024, the combination of ransomware and other extortion breaches accounted for almost two-thirds (fluctuating between 59% and 66%) of financially motivated attacks, according to the <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\">Verizon 2024 Data Breach Investigations Report<\/a>. The reason is simple \u2013 it works, and financially motivated threat actors have no reason to change tactics giving them the most return on investment.<\/p><p><strong>Prevention vs. Response<\/strong><\/p><p>However, even worse than the financial cost of a ransom payment is the disruption in business continuity and the sense of unease caused by malicious actors\u2019 unfettered access, but that is not the whole story:<\/p><p><strong>(-) <\/strong>After a successful cyberattack, revenue losses due to <a href=\"https:\/\/www.securitymetrics.com\/blog\/what-does-cyber-forensic-investigation-do-and-how-much-does-it-cost\" target=\"_blank\" rel=\"noopener\">system downtime and missed opportunities<\/a> reach on average 9% of the company\u2019s <a href=\"https:\/\/www.splunk.com\/en_us\/campaigns\/the-hidden-costs-of-downtime.html\" target=\"_blank\" rel=\"noopener\">annual revenue, and stock price value drops<\/a> 2.5% on average.<\/p><p><strong>(-) <\/strong>Subsequent <a href=\"https:\/\/www.securitymetrics.com\/blog\/what-does-cyber-forensic-investigation-do-and-how-much-does-it-cost\" target=\"_blank\" rel=\"noopener\">forensic investigation<\/a> can range from $10K to $100K based on the business size.<\/p><p><strong>(-) <\/strong>Of the organizations that have experienced a cyberattack in 2024, 47% report greater <a title=\"2024\" href=\"https:\/\/www.hiscoxgroup.com\/sites\/group\/files\/documents\/2024-10\/HSX245\" target=\"%E2%80%93\">difficulty in attracting new customers<\/a> and 43% report <a title=\"2024\" href=\"https:\/\/www.hiscoxgroup.com\/sites\/group\/files\/documents\/2024-10\/HSX245\" target=\"%E2%80%93\">losing customers<\/a>.<\/p><p>As shown by <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">IBM\u2019s 2024 Cost of a Data Breach Report<\/a>, it took 284 days to identify and contain ransomware attacks. That\u2019s quite a lot of time to deal with a compromise. In the face of prolonged disruption, therefore, it makes sense to list some ways to prevent ransomware attacks, such as:<\/p><p><strong>(+) <\/strong><a href=\"https:\/\/www.eset.com\/us\/business\/cybertraining\/?srsltid=AfmBOoqWE3k8xSxmmofhLJcKlGh6TvZOAz3-F1N4ylA649vL66qfeZS7\" target=\"_blank\" rel=\"noopener\">Employee training<\/a> and AI, which are the <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">most significant factors<\/a> in reducing the costs of data breaches.<\/p><p><strong>(+) <\/strong>With <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">AI and automation deployed<\/a> extensively, organizations averaged $2.2 million less in costs of data breaches in 2024.<\/p><p><strong>(+)<\/strong> In a scenario where a business experiences two cyberattacks over a 10-year period, <a href=\"https:\/\/www.analysysmason.com\/consulting\/articles\/cyber-security-approach\/\" target=\"_blank\" rel=\"noopener\">the direct costs in the reactive scenario<\/a> are $17 million, compared to $8 million in the proactive scenario.<\/p><p>To support such net-positive and cost-effective security measures, it also makes sense to discuss just how practical some security solutions can be in preventing ransomware and EDR killers from causing costly business disruptions.<\/p><\/div><div id=\"content-c11667638\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">How ESET protects against ransomware<\/h3><\/header><p>ESET experts have put a lot of thought into combatting ransomware. By following a proactive and <a href=\"https:\/\/www.eset.com\/us\/business\/prevention-first-approach\/\" target=\"_blank\" rel=\"noopener\">prevention-first approach<\/a>, ESET regularly improves its solutions based on the latest trends and discoveries.<\/p><p>Let\u2019s start with the basics. To achieve powerful multilayered protection, <a href=\"https:\/\/www.eset.com\/us\/business\/small-and-medium\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT <\/a>combines endpoint security with full disk encryption and <a href=\"https:\/\/www.eset.com\/us\/about\/technology\/?srsltid=AfmBOoqCQkGWLaoCB4xdo-teGD83SL7tBV2ILox28GYfIcWPJHiTCDda\" target=\"_blank\" rel=\"noopener\">cloud sandbox analysis <\/a>of detected samples. ESET also developed a tool finetuned to catch ransomware \u2013 <a href=\"https:\/\/help.eset.com\/protect_cloud\/en-US\/ransomware_shield.html\" target=\"_blank\" rel=\"noopener\">ESET Ransomware Shield<\/a>, which detects and blocks processes that resemble the behaviors of ransomware. And this is \u201conly\u201d the first line of defense. Taking detection further, PROTECT integrates with Intel\u00ae Threat Detection Technology<\/p><p><a href=\"https:\/\/www.eset.com\/uk\/about\/newsroom\/blog\/optimised-malware-detection-from-eset-intel\/?srsltid=AfmBOoqQ9pFVH8Tjh8rzDiiZYrYngTE46Kn2H92bqpWiC4ymDRCZ_VrL\" target=\"_blank\" rel=\"noopener\">(Intel\u00ae TDT) at the CPU level <\/a>to improve detection of new ransomware variants.<\/p><p>Advanced users can also try their hand at using <a href=\"https:\/\/www.eset.com\/us\/business\/solutions\/xdr-extended-detection-and-response\/?srsltid=AfmBOoqqSYphjwe11JsUGTVE8dXXy5Eiv7-uEsCiX-UkY603eSDVroZe\" target=\"_blank\" rel=\"noopener\">ESET Inspect<\/a>, the XDR-enabling module of the ESET PROTECT Platform, which can easily pinpoint malicious behavior thanks to its AI-powered engine. As you can see on the image below, the detections are very easy to understand and can help in identifying sophisticated attempts at a compromise such as <a href=\"https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/edr-killers-get-popular-here-is-how-to-stop-them\/\" target=\"_blank\" rel=\"noopener\">bring-your-own-vulnerable-driver<\/a> (BYOVD) attacks, which can later introduce EDR killers on the impacted systems.<\/p><\/div><div id=\"content-c11667639\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\">\u00a0<\/div><div class=\"ce-column\"><img decoding=\"async\" src=\"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/04\/Protect_and_Inspect_-_Figure-2-1.png\" alt=\"\" width=\"800\" height=\"450\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11667640\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Worried about EDR Killers?<\/h3><\/header><p>EDR Killers\u2019 abuse of legitimate drivers to bypass cybersecurity solutions is a technique that is well-known to ESET experts. Therefore, <a href=\"https:\/\/www.eset.com\/us\/business\/small-and-medium\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT<\/a> allows security admins to create strong policies for Potentially Unsafe Applications (PUSA), preventing cybercriminals from abusing vulnerable drivers to breach EDR.<\/p><\/div><div id=\"content-c11667641\" class=\"frame frame-default frame-type-html frame-layout-0\"><span style=\"background-color: #ffffff;\"><a class=\"btn\" style=\"background-color: #ffffff;\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/shifting-sands-ransomhub-edrkillshifter\/\" target=\"_blank\" rel=\"noopener\"> To learn more about killing the EDR killers, check this blog. <\/a><\/span><\/div><div id=\"content-c11667642\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>Admins should also look to enable or tune detections for malicious code targeting specific drivers \u2013 something providers of the most effective EDRs have already provided detections for. Locking down the components of your EDR on each endpoint is also a must; the users of that endpoint should not be able to tamper with security controls if they don\u2019t have the necessary privileges. From this perspective, ESET has now received a prestigious anti-tampering award from AV-Comparatives for the second time, noting ESET PROTECT Elite\u2019s 100% effectiveness in stopping tampering attacks.<\/p><\/div><div id=\"content-c11667643\" class=\"frame frame-default frame-type-html frame-layout-0\"><span style=\"background-color: #ffffff;\"><a class=\"btn\" style=\"background-color: #ffffff;\" href=\"https:\/\/www.eset.com\/blog\/awards-and-testing\/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-these-advanced-security-features-in-business-products\/\" target=\"_blank\" rel=\"noopener\"> Discover how anti-tampering works. <\/a><\/span><\/div><div id=\"content-c11667644\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>Due to the increasing complexity of these solutions, a smart thing is to have all-in-one protection with all features available on a single security platform, which can deliver a comprehensive range of capabilities unified into a single pane of glass. This is exactly in line with ESET\u2019s <a href=\"https:\/\/www.eset.com\/us\/business\/prevention-first-approach\/\" target=\"_blank\" rel=\"noopener\">prevention-first approach<\/a>, which promotes reducing the complexity of cyber defense. Alternatively, pursuing a highly rated managed detection and response service like <a href=\"https:\/\/www.eset.com\/us\/business\/services\/managed-detection-and-response\/?srsltid=AfmBOooa8rC5Jxz2QvBVOWozs_TQ5n-lMnIn5T0A9tZWYNMmurxc6z40#compare-table\" target=\"_blank\" rel=\"noopener\">ESET MDR<\/a> can deliver a significant security impact without requiring costly internal security investments.<\/p><\/div><div id=\"content-c11667645\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Protect your business, your money, and your reputation<\/h3><\/header><p>Despite successful law enforcement operations against ransomware gangs, this field of cybercrime is so profitable that businesses around the world can hardly expect this threat to simply vanish. On the contrary, we can see the rise of new groups, tactics, and tools that pose new challenges.<\/p><p>To defend their hard-won business, companies need to be proactive, <a href=\"https:\/\/www.eset.com\/us\/business\/cybertraining\/?srsltid=AfmBOoqWE3k8xSxmmofhLJcKlGh6TvZOAz3-F1N4ylA649vL66qfeZS7\" target=\"_blank\" rel=\"noopener\">train their employees<\/a>, set up reliable multilayered defenses utilizing the latest technology, and pursue a preventive security approach. As the latest data show, putting extra effort into cybersecurity is definitely worth it.<\/p><\/div><div id=\"content-c11667649\" class=\"frame frame-default frame-type-html frame-layout-0\">\u00a0<\/div><\/div><p>\u00a0<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Roman Cuprik28 Apr 2025 Cybercriminals increasingly uti [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1305,40,61],"tags":[41,1077],"class_list":["post-111124","post","type-post","status-publish","format-standard","hentry","category-1305","category-eset","category-press-release","tag-eset","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods - Version 2\" \/>\n<meta property=\"og:description\" content=\"Roman Cuprik28 Apr 2025 Cybercriminals increasingly uti [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-02T07:04:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/04\/250x250-PostCronos.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/05\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods\",\"datePublished\":\"2025-05-02T07:04:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/05\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods\\\/\"},\"wordCount\":1245,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com.sg\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/250x250-PostCronos.png\",\"keywords\":[\"ESET\",\"2025\"],\"articleSection\":[\"2025\",\"ESET\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/05\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\\\/\",\"name\":\"The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com.sg\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/250x250-PostCronos.png\",\"datePublished\":\"2025-05-02T07:04:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/version-2.com.sg\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/250x250-PostCronos.png\",\"contentUrl\":\"https:\\\/\\\/version-2.com.sg\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/250x250-PostCronos.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/","og_locale":"zh_HK","og_type":"article","og_title":"The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods - Version 2","og_description":"Roman Cuprik28 Apr 2025 Cybercriminals increasingly uti [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/","og_site_name":"Version 2","article_published_time":"2025-05-02T07:04:59+00:00","og_image":[{"url":"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/04\/250x250-PostCronos.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/05\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods","datePublished":"2025-05-02T07:04:59+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/05\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods\/"},"wordCount":1245,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/04\/250x250-PostCronos.png","keywords":["ESET","2025"],"articleSection":["2025","ESET","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/05\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods\/","url":"https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/","name":"The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/04\/250x250-PostCronos.png","datePublished":"2025-05-02T07:04:59+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/#primaryimage","url":"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/04\/250x250-PostCronos.png","contentUrl":"https:\/\/version-2.com.sg\/wp-content\/uploads\/2025\/04\/250x250-PostCronos.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/business\/the-world-of-ransomware-sees-new-players-and-tactics-businesses-need-to-improve-their-prevention-methods-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The world of ransomware sees new players and tactics. Businesses need to improve their prevention methods"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-sUk","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/111124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=111124"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/111124\/revisions"}],"predecessor-version":[{"id":111128,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/111124\/revisions\/111128"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=111124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=111124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=111124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}