{"id":989535,"date":"2024-10-11T18:33:00","date_gmt":"2024-10-11T18:33:00","guid":{"rendered":"https:\/\/digital.neptween.com\/?p=989535"},"modified":"2024-10-15T01:38:27","modified_gmt":"2024-10-15T01:38:27","slug":"cisa-warns-of-threat-actors-exploiting-f5-big-ip-cookies-for-network-reconnaissance","status":"publish","type":"post","link":"https:\/\/digital.neptween.com\/?p=989535","title":{"rendered":"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"989535\" class=\"elementor elementor-989535\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2b695261 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2b695261\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-57835e0b\" data-id=\"57835e0b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-5a940bd0 elementor-widget elementor-widget-text-editor\" data-id=\"5a940bd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that it has observed threat actors leveraging unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic Manager (LTM) module to conduct reconnaissance of target networks.<\/p><p>It said the module is being used to enumerate other non-internet-facing devices on the network. The agency, however, did not disclose who is behind the activity, or what the end goals of the campaign are.<\/p><p>\u00ab\u00a0A malicious cyber actor could leverage the information gathered from unencrypted persistence cookies to infer or identify additional network resources and potentially exploit vulnerabilities found in other devices present on the network,\u00a0\u00bb CISA <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/10\/10\/best-practices-configure-big-ip-ltm-systems-encrypt-http-persistence-cookies\" target=\"_blank\" rel=\"noopener\">said<\/a> in an advisory.<\/p><p>It has also recommended organizations encrypt persistent cookies employed in F5 BIG-IP devices by <a href=\"https:\/\/my.f5.com\/manage\/s\/article\/K14784\" target=\"_blank\" rel=\"noopener\">configuring cookie encryption<\/a> within the HTTP profile. Furthermore, it&rsquo;s urging users to verify the protection of their systems by running a diagnostic utility provided by F5 called <a href=\"https:\/\/www.f5.com\/support\/big-ip-ihealth-diagnostic-tool\" target=\"_blank\" rel=\"noopener\">BIG-IP iHealth<\/a> to identify potential issues.<\/p><p>\u00ab\u00a0The BIG-IP iHealth Diagnostics component of the BIG-IP iHealth system evaluates the logs, command output, and configuration of your BIG-IP system against a database of known issues, common mistakes, and published F5 best practices,\u00a0\u00bb F5 notes in a support document.<\/p><p>\u00ab\u00a0The prioritized results provide tailored feedback about configuration issues or code defects and provide a description of the issue, [and] recommendations for resolution.\u00a0\u00bb<\/p><p>The disclosure comes as cybersecurity agencies from the U.K. and the U.S. have published a joint bulletin detailing Russian state-sponsored actors&rsquo; attempts to target diplomatic, defense, technology, and finance sectors to collect foreign intelligence and enable future cyber operations.<\/p><p>The activity has been attributed to a threat actor tracked as <a href=\"https:\/\/thehackernews.com\/2024\/08\/russian-hackers-exploit-safari-and.html\" target=\"_blank\" rel=\"noopener\">APT29<\/a>, which is also known as BlueBravo, Cloaked Ursa, Cozy Bear, and Midnight Blizzard. APT29 is understood to be a key cog in the Russian military intelligence machine and is affiliated with the Foreign Intelligence Service (SVR).<\/p><p>\u00ab\u00a0SVR cyber intrusions include a heavy focus on remaining anonymous and undetected. The actors use TOR extensively throughout intrusions \u2013 from initial targeting to data collection \u2013 and across network infrastructure,\u00a0\u00bb the agencies <a href=\"https:\/\/www.ic3.gov\/Media\/News\/2024\/241010.pdf\" target=\"_blank\" rel=\"noopener\">said<\/a>.<\/p><p>\u00ab\u00a0The actors lease operational infrastructure using a variety of fake identities and low reputation email accounts. The SVR obtains infrastructure from resellers of major hosting providers.\u00a0\u00bb<\/p><p>Attacks mounted by APT29 have been categorized as those designed to harvest intelligence and establish persistent access so as to facilitate supply chain compromises (i.e., targets of intent), as well as those that allow them to host malicious infrastructure or conduct follow-on operations from compromised accounts by taking advantage of publicly known flaws, weak credentials, or other misconfigurations (i.e., targets of opportunity).<\/p><p>Some of the significant security vulnerabilities highlighted include <a href=\"https:\/\/thehackernews.com\/2022\/08\/cisa-adds-zimbra-email-vulnerability-to.html\" target=\"_blank\" rel=\"noopener\">CVE-2022-27924<\/a>, a command injection flaw in Zimbra Collaboration, and <a href=\"https:\/\/thehackernews.com\/2023\/10\/cisa-warns-of-active-exploitation-of.html\" target=\"_blank\" rel=\"noopener\">CVE-2023-42793<\/a>, a critical authentication bypass bug that allows for remote code execution on TeamCity Server.<\/p><p>APT29 is a relevant example of threat actors continuously innovating their tactics, techniques and procedures in an attempt to stay stealthy and circumvent defenses, even going to the extent of destroying their infrastructure and erasing any evidence should it suspect their intrusions have been detected, either by the victim or law enforcement.<\/p><p>Another notable technique is the extensive use of proxy networks, comprising mobile telephone providers or residential internet services, to interact with victims located in North America and blend in with legitimate traffic.<\/p><p>\u00ab\u00a0To disrupt this activity, organizations should baseline authorized devices and apply additional scrutiny to systems accessing their network resources that do not adhere to the baseline,\u00a0\u00bb the agencies said.<\/p><p>Cybersecurity company Tenable said APT29 has used an assortment of security vulnerabilities, including known vulnerabilities with patches available, to target organizations and that ensuring software remains up-to-date is the primary line of defense against countering attacks by the threat actor and others.<\/p><p>\u00ab\u00a0APT29 embodies the &lsquo;persistent&rsquo; part of advanced persistent threat (APT) group,\u00a0\u00bb Satnam Narang, senior staff research engineer at Tenable, said in a statement shared with The Hacker News.<\/p><p>\u00ab\u00a0APT29 has persistently targeted organizations in the United States and Europe for years, utilizing various techniques, including spear-phishing and exploitation of vulnerabilities to gain initial access and elevate privileges. The modus operandi of APT29 is the collection of foreign intelligence as well as maintaining persistence in compromised organizations in order to conduct future operations.\u00a0\u00bb<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-14df692 elementor-widget elementor-widget-text-editor\" data-id=\"14df692\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/thehackernews.com\/2024\/10\/cisa-warns-of-threat-actors-exploiting.html\"><strong>Source : TheHackerNews :: Lire plus\u2026<\/strong><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that it has observed threat actors leveraging unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic Manager (LTM) module to conduct reconnaissance of target networks.<\/p>\n","protected":false},"author":1,"featured_media":989537,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,67],"tags":[86,77,85],"class_list":["post-989535","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites","category-cybersecurite","tag-fonds-dinvestissement","tag-international","tag-service-public"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance - NEPTWEEN DIGITAL<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance - NEPTWEEN DIGITAL\" \/>\n<meta property=\"og:description\" content=\"The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that it has observed threat actors leveraging unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic Manager (LTM) module to conduct reconnaissance of target networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digital.neptween.com\/?p=989535\" \/>\n<meta property=\"og:site_name\" content=\"NEPTWEEN DIGITAL\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-11T18:33:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-15T01:38:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0016.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"728\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"support@neptween.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"support@neptween.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/?p=989535#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/?p=989535\"},\"author\":{\"name\":\"support@neptween.com\",\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/#\\\/schema\\\/person\\\/f821a2072bb3fbcfddaef68e02be928f\"},\"headline\":\"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance\",\"datePublished\":\"2024-10-11T18:33:00+00:00\",\"dateModified\":\"2024-10-15T01:38:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/?p=989535\"},\"wordCount\":718,\"publisher\":{\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/?p=989535#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digital.neptween.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/IMG_2024-10-0016.jpeg\",\"keywords\":[\"Fonds d\u2019investissement\",\"International\",\"Service public\"],\"articleSection\":[\"Actualit\u00e9s\",\"Cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/?p=989535\",\"url\":\"https:\\\/\\\/digital.neptween.com\\\/?p=989535\",\"name\":\"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance - NEPTWEEN DIGITAL\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/?p=989535#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/?p=989535#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digital.neptween.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/IMG_2024-10-0016.jpeg\",\"datePublished\":\"2024-10-11T18:33:00+00:00\",\"dateModified\":\"2024-10-15T01:38:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/?p=989535#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digital.neptween.com\\\/?p=989535\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/?p=989535#primaryimage\",\"url\":\"https:\\\/\\\/digital.neptween.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/IMG_2024-10-0016.jpeg\",\"contentUrl\":\"https:\\\/\\\/digital.neptween.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/IMG_2024-10-0016.jpeg\",\"width\":728,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/?p=989535#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digital.neptween.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/#website\",\"url\":\"https:\\\/\\\/digital.neptween.com\\\/\",\"name\":\"NEPTWEEN DIGITAL\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digital.neptween.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/#organization\",\"name\":\"NEPTWEEN DIGITAL\",\"url\":\"https:\\\/\\\/digital.neptween.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digital.neptween.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/ND_LOGO_V2.png\",\"contentUrl\":\"https:\\\/\\\/digital.neptween.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/ND_LOGO_V2.png\",\"width\":832,\"height\":239,\"caption\":\"NEPTWEEN DIGITAL\"},\"image\":{\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digital.neptween.com\\\/#\\\/schema\\\/person\\\/f821a2072bb3fbcfddaef68e02be928f\",\"name\":\"support@neptween.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/086138f49888b7bacd47a295dcd5d64e144b2b539c110f251239210248a602c1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/086138f49888b7bacd47a295dcd5d64e144b2b539c110f251239210248a602c1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/086138f49888b7bacd47a295dcd5d64e144b2b539c110f251239210248a602c1?s=96&d=mm&r=g\",\"caption\":\"support@neptween.com\"},\"sameAs\":[\"https:\\\/\\\/digital.neptween.com\"],\"url\":\"https:\\\/\\\/digital.neptween.com\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance - NEPTWEEN DIGITAL","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance - NEPTWEEN DIGITAL","og_description":"The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that it has observed threat actors leveraging unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic Manager (LTM) module to conduct reconnaissance of target networks.","og_url":"https:\/\/digital.neptween.com\/?p=989535","og_site_name":"NEPTWEEN DIGITAL","article_published_time":"2024-10-11T18:33:00+00:00","article_modified_time":"2024-10-15T01:38:27+00:00","og_image":[{"width":728,"height":380,"url":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0016.jpeg","type":"image\/jpeg"}],"author":"support@neptween.com","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"support@neptween.com","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digital.neptween.com\/?p=989535#article","isPartOf":{"@id":"https:\/\/digital.neptween.com\/?p=989535"},"author":{"name":"support@neptween.com","@id":"https:\/\/digital.neptween.com\/#\/schema\/person\/f821a2072bb3fbcfddaef68e02be928f"},"headline":"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance","datePublished":"2024-10-11T18:33:00+00:00","dateModified":"2024-10-15T01:38:27+00:00","mainEntityOfPage":{"@id":"https:\/\/digital.neptween.com\/?p=989535"},"wordCount":718,"publisher":{"@id":"https:\/\/digital.neptween.com\/#organization"},"image":{"@id":"https:\/\/digital.neptween.com\/?p=989535#primaryimage"},"thumbnailUrl":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0016.jpeg","keywords":["Fonds d\u2019investissement","International","Service public"],"articleSection":["Actualit\u00e9s","Cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/digital.neptween.com\/?p=989535","url":"https:\/\/digital.neptween.com\/?p=989535","name":"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance - NEPTWEEN DIGITAL","isPartOf":{"@id":"https:\/\/digital.neptween.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digital.neptween.com\/?p=989535#primaryimage"},"image":{"@id":"https:\/\/digital.neptween.com\/?p=989535#primaryimage"},"thumbnailUrl":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0016.jpeg","datePublished":"2024-10-11T18:33:00+00:00","dateModified":"2024-10-15T01:38:27+00:00","breadcrumb":{"@id":"https:\/\/digital.neptween.com\/?p=989535#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digital.neptween.com\/?p=989535"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/digital.neptween.com\/?p=989535#primaryimage","url":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0016.jpeg","contentUrl":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2024\/10\/IMG_2024-10-0016.jpeg","width":728,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/digital.neptween.com\/?p=989535#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digital.neptween.com\/"},{"@type":"ListItem","position":2,"name":"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance"}]},{"@type":"WebSite","@id":"https:\/\/digital.neptween.com\/#website","url":"https:\/\/digital.neptween.com\/","name":"NEPTWEEN DIGITAL","description":"","publisher":{"@id":"https:\/\/digital.neptween.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digital.neptween.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/digital.neptween.com\/#organization","name":"NEPTWEEN DIGITAL","url":"https:\/\/digital.neptween.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/digital.neptween.com\/#\/schema\/logo\/image\/","url":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2023\/11\/ND_LOGO_V2.png","contentUrl":"https:\/\/digital.neptween.com\/wp-content\/uploads\/2023\/11\/ND_LOGO_V2.png","width":832,"height":239,"caption":"NEPTWEEN DIGITAL"},"image":{"@id":"https:\/\/digital.neptween.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/digital.neptween.com\/#\/schema\/person\/f821a2072bb3fbcfddaef68e02be928f","name":"support@neptween.com","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/086138f49888b7bacd47a295dcd5d64e144b2b539c110f251239210248a602c1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/086138f49888b7bacd47a295dcd5d64e144b2b539c110f251239210248a602c1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/086138f49888b7bacd47a295dcd5d64e144b2b539c110f251239210248a602c1?s=96&d=mm&r=g","caption":"support@neptween.com"},"sameAs":["https:\/\/digital.neptween.com"],"url":"https:\/\/digital.neptween.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/posts\/989535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=989535"}],"version-history":[{"count":4,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/posts\/989535\/revisions"}],"predecessor-version":[{"id":989541,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/posts\/989535\/revisions\/989541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=\/wp\/v2\/media\/989537"}],"wp:attachment":[{"href":"https:\/\/digital.neptween.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=989535"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=989535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digital.neptween.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=989535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}