{"id":10374,"date":"2025-12-22T12:14:52","date_gmt":"2025-12-22T12:14:52","guid":{"rendered":"https:\/\/www.aicerts.ai\/news\/?post_type=news&#038;p=10374"},"modified":"2025-12-22T12:14:55","modified_gmt":"2025-12-22T12:14:55","slug":"wired-leak-massive-credential-exposure-demands-action","status":"publish","type":"news","link":"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/","title":{"rendered":"Wired Leak: Massive Credential Exposure Demands Action"},"content":{"rendered":"\n<p>Meanwhile, follow-on investigations revealed dozens more datasets on the Dark Web feeding an ever-growing underground credential economy. Moreover, Cybernews traced an aggregated 16 billion records, confirming the incident\u2019s larger context. National-security observers warned about 220 .gov addresses spanning 29 nations inside the files. Therefore, this analysis explains the exposure, assesses business impact, and outlines practical mitigation steps. Additionally, it references relevant standards and training paths for professionals seeking deeper expertise. Readers will finish equipped to respond decisively and prevent the next Wired Leak scenario.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exposure Scale And Impact<\/h2>\n\n\n\n<p>Fowler\u2019s discovery contained 184,162,718 unique rows occupying nearly 47 gigabytes. Each row listed a site URL, username, and a plain-text password. Furthermore, the Wired Leak sample showed hundreds of Google, Meta, Microsoft, and PayPal accounts. In contrast, 220 records used government domains, broadening potential damage.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2025\/12\/team-plans-response.jpg\" alt=\"Cybersecurity team discusses Wired Leak incident and mitigation steps.\"\/><figcaption class=\"wp-element-caption\">A cybersecurity team gathers to develop a response plan for the Wired Leak.<\/figcaption><\/figure>\n\n\n\n<p>Cybernews later reported 30 similar caches, merging into roughly 16 billion credentials. Nevertheless, duplication across sets complicates precise victim counting. Analysts still agree the volume aids automated credential-stuffing at industrial scale.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>184,162,718 records in original cache<\/li>\n\n\n\n<li>\u224847.42 GB storage size<\/li>\n\n\n\n<li>16,000,000,000 records across 30 caches<\/li>\n\n\n\n<li>220 government email addresses across 29 countries<\/li>\n\n\n\n<li>Plain-text passwords for major consumer services<\/li>\n<\/ul>\n\n\n\n<p>These numbers highlight unprecedented reach for a single misconfigured Database. Consequently, attackers possess ready-made ammunition for massive account takeover campaigns. Understanding the origin of such stockpiles is the next critical step.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Record Sources And Origins<\/h2>\n\n\n\n<p>Investigators traced the Elasticsearch instance to World Host Group infrastructure. However, the provider clarified the server belonged to an unmanaged client now suspended. Metadata within the index used the Portuguese label \u201cSenha,\u201d suggesting Lusophone operators.<\/p>\n\n\n\n<p>Moreover, security vendors link many similar dumps to infostealer malware like RedLine and Lumma. Subsequently, infected endpoints upload browser vaults to criminal collectors who resell data wholesale. Attribution remains muddy because sellers often recycle information into each new Wired Leak Database.<\/p>\n\n\n\n<p>The unclear ownership complicates law enforcement pursuit. Nevertheless, root causes consistently involve infostealers and cloud misconfiguration. Dark Web demand magnifies these causes, as the following section reveals.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Dark Web Market Dynamics<\/h2>\n\n\n\n<p>Criminal forums exchange fresh credential logs minutes after an exposure appears. Additionally, threat actors prefer plain-text pairs because they bypass hashing cracking chores. Wired Leak files therefore fetch premium prices compared with older hashed leaks.<\/p>\n\n\n\n<p>Meanwhile, botnet operators integrate new lists into credential-stuffing tools like OpenBullet. In contrast, ransomware crews use compromised accounts for initial access rather than brute malware. Researchers observed Telegram channels advertising the Database alongside stealer malware subscriptions.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Account resale for streaming and gaming services<\/li>\n\n\n\n<li>Business email compromise launchpads<\/li>\n\n\n\n<li>Phishing kit credential validation<\/li>\n\n\n\n<li>Nation-state espionage infiltration routes<\/li>\n<\/ul>\n\n\n\n<p>Historic forum posts reveal each Wired Leak drives spikes in credential-stuffing chatter. These monetization streams keep Dark Web prices stable despite record oversupply. Consequently, defenders must raise the cost of exploitation through layered controls. Enterprises can start by following the mitigation guide outlined next.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Enterprise Risk Mitigation Guide<\/h2>\n\n\n\n<p>Security teams should ingest vetted leak indicators into monitoring platforms. Furthermore, anomaly engines must flag login attempts using exposed credentials and enforce step-up authentication. CISA recommends blocking IPs that trigger repeated failures.<\/p>\n\n\n\n<p>Additionally, administrators ought to audit every public-facing Database instance for open access. Implement network segmentation and role-based policies around Elasticsearch clusters. Align logging retention with NIST SP 800-92 to support forensic reconstruction.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Force password resets on matching accounts<\/li>\n\n\n\n<li>Deploy phishing-resistant MFA enterprise-wide<\/li>\n\n\n\n<li>Enable rate limiting on authentication endpoints<\/li>\n\n\n\n<li>Harden cloud object permissions<\/li>\n\n\n\n<li>Automate inventory of unmanaged assets<\/li>\n<\/ul>\n\n\n\n<p>Following these steps reduces immediate takeover risk. Moreover, standard frameworks reinforce sustainable cyber hygiene. Next, aligning actions with recognized standards further institutionalizes progress.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Aligning With Security Standards<\/h2>\n\n\n\n<p>NIST SP 800-63B urges service providers to store passwords using salted hashing. However, the Wired Leak demonstrates many operators still neglect basics. Therefore, adopting automatic hashing enforcement in development pipelines becomes vital.<\/p>\n\n\n\n<p>CISA Cybersecurity Performance Goals map controls to specific attack techniques, including credential stuffing. Moreover, MITRE ATT&amp;CK ID T1110.004 offers detection guidance for anomalous reuse attempts. Professionals can enhance expertise with the <a href=\"https:\/\/www.aicerts.ai\/certifications\/learning-education\/ai-learning-development\">AI Learning Development<\/a> certification.<\/p>\n\n\n\n<p>Standards convert reactive fixes into measurable practice. Consequently, teams earn executive trust and budget support. Individuals also retain responsibility, as the following actions illustrate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Immediate User Protection Steps<\/h2>\n\n\n\n<p>Users must first change reused passwords on critical services. Additionally, a password manager generates unique, high-entropy phrases quickly. Meanwhile, multifactor authentication blocks most automated attacks even when passwords leak.<\/p>\n\n\n\n<p>Consumers should monitor financial and email accounts for unfamiliar activity. Moreover, Have I Been Pwned notifications offer early warning, though not every Wired Leak appears there.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Update passwords immediately<\/li>\n\n\n\n<li>Enable hardware or app-based MFA<\/li>\n\n\n\n<li>Review account activity logs<\/li>\n\n\n\n<li>Delete unnecessary saved browser credentials<\/li>\n\n\n\n<li>Educate family members about phishing<\/li>\n<\/ol>\n\n\n\n<p>These tasks require minimal cost yet deliver strong protection. Nevertheless, vigilance must remain continual. Sustaining that vigilance involves structured monitoring, addressed in the final section.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Future Monitoring And Compliance<\/h2>\n\n\n\n<p>Organizations should schedule quarterly scans for exposed credentials across Dark Web feeds. Subsequently, detected matches should trigger incident response workflows within defined service-level agreements. Automated tooling can compare fresh leaks against internal identity stores.<\/p>\n\n\n\n<p>Moreover, board dashboards must display key metrics such as attempts blocked due to Wired Leak sources. In contrast, compliance teams ought to document mitigation steps for regulators. Transparent reporting reduces breach-notification penalties and brand damage.<\/p>\n\n\n\n<p>Continuous monitoring transforms security from project into process. Therefore, businesses stay resilient even when the next Wired Leak surfaces.<\/p>\n\n\n\n<p>The Wired Leak saga underscores how one misconfigured asset can imperil millions of users worldwide. Moreover, aggregated discoveries suggest similar dangers lurk inside many forgotten cloud corners. Consequently, security teams must combine technical controls, standards adherence, and continuous surveillance. Individuals likewise need password hygiene and multifactor authentication to blunt inevitable credential spills. Additionally, adopting automated asset inventory and exposure scanning shrinks attack windows. Professionals seeking deeper mastery can pursue the <a href=\"https:\/\/www.aicerts.ai\/certifications\/learning-education\/ai-learning-development\">AI Learning Development<\/a> certification and advance defensive capabilities. Therefore, act today, review configurations, and bring every exposed Database under proper governance. Staying proactive will keep future headlines from repeating this costly narrative.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shock rippled through security circles when the Wired Leak story broke in May 2025. Suddenly, 184 million plain-text credentials were visible to anyone scanning an unsecured Elasticsearch node. Consequently, corporate defenders and government agencies confronted a stark reminder of misconfiguration risks. Fowler, the independent researcher, disclosed the trove to Wired and triggered immediate takedown actions. <\/p>\n","protected":false},"featured_media":10371,"parent":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Wired Leak","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Find out how the Wired Leak exposing 184M credentials reshapes cyber risk. Learn key mitigation, standards, and user actions to stay secure.","_yoast_wpseo_canonical":""},"tags":[15244,15249,15246,15242,15247,15241,15248,15243,15245],"news_category":[4,3441],"communities":[],"class_list":["post-10374","news","type-news","status-publish","has-post-thumbnail","hentry","tag-cisa-guidelines","tag-credential-stuffing","tag-cybersecurity-standards","tag-dark-web-leaks","tag-data-breach-mitigation","tag-elasticsearch-misconfiguration","tag-infostealer-malware","tag-password-hygiene","tag-wired-leak","news_category-ai","news_category-education"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wired Leak: Massive Credential Exposure Demands Action - AI CERTs News<\/title>\n<meta name=\"description\" content=\"Find out how the Wired Leak exposing 184M credentials reshapes cyber risk. Learn key mitigation, standards, and user actions to stay secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wired Leak: Massive Credential Exposure Demands Action - AI CERTs News\" \/>\n<meta property=\"og:description\" content=\"Find out how the Wired Leak exposing 184M credentials reshapes cyber risk. Learn key mitigation, standards, and user actions to stay secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/\" \/>\n<meta property=\"og:site_name\" content=\"AI CERTs News\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-22T12:14:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2025\/12\/reacting-to-wired-leak.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/\",\"url\":\"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/\",\"name\":\"Wired Leak: Massive Credential Exposure Demands Action - AI CERTs News\",\"isPartOf\":{\"@id\":\"https:\/\/www.aicerts.ai\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2025\/12\/reacting-to-wired-leak.jpg\",\"datePublished\":\"2025-12-22T12:14:52+00:00\",\"dateModified\":\"2025-12-22T12:14:55+00:00\",\"description\":\"Find out how the Wired Leak exposing 184M credentials reshapes cyber risk. Learn key mitigation, standards, and user actions to stay secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/#primaryimage\",\"url\":\"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2025\/12\/reacting-to-wired-leak.jpg\",\"contentUrl\":\"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2025\/12\/reacting-to-wired-leak.jpg\",\"width\":1536,\"height\":1024,\"caption\":\"A professional reacts to the Wired Leak notification during their workday.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aicerts.ai\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/www.aicerts.ai\/news\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Wired Leak: Massive Credential Exposure Demands Action\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aicerts.ai\/news\/#website\",\"url\":\"https:\/\/www.aicerts.ai\/news\/\",\"name\":\"Aicerts News\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.aicerts.ai\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aicerts.ai\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.aicerts.ai\/news\/#organization\",\"name\":\"Aicerts News\",\"url\":\"https:\/\/www.aicerts.ai\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aicerts.ai\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.aicerts.ai\/news\/wp-content\/uploads\/2024\/09\/news_logo.svg\",\"contentUrl\":\"https:\/\/www.aicerts.ai\/news\/wp-content\/uploads\/2024\/09\/news_logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Aicerts News\"},\"image\":{\"@id\":\"https:\/\/www.aicerts.ai\/news\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wired Leak: Massive Credential Exposure Demands Action - AI CERTs News","description":"Find out how the Wired Leak exposing 184M credentials reshapes cyber risk. Learn key mitigation, standards, and user actions to stay secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/","og_locale":"en_US","og_type":"article","og_title":"Wired Leak: Massive Credential Exposure Demands Action - AI CERTs News","og_description":"Find out how the Wired Leak exposing 184M credentials reshapes cyber risk. Learn key mitigation, standards, and user actions to stay secure.","og_url":"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/","og_site_name":"AI CERTs News","article_modified_time":"2025-12-22T12:14:55+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2025\/12\/reacting-to-wired-leak.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/","url":"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/","name":"Wired Leak: Massive Credential Exposure Demands Action - AI CERTs News","isPartOf":{"@id":"https:\/\/www.aicerts.ai\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/#primaryimage"},"image":{"@id":"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/#primaryimage"},"thumbnailUrl":"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2025\/12\/reacting-to-wired-leak.jpg","datePublished":"2025-12-22T12:14:52+00:00","dateModified":"2025-12-22T12:14:55+00:00","description":"Find out how the Wired Leak exposing 184M credentials reshapes cyber risk. Learn key mitigation, standards, and user actions to stay secure.","breadcrumb":{"@id":"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/#primaryimage","url":"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2025\/12\/reacting-to-wired-leak.jpg","contentUrl":"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2025\/12\/reacting-to-wired-leak.jpg","width":1536,"height":1024,"caption":"A professional reacts to the Wired Leak notification during their workday."},{"@type":"BreadcrumbList","@id":"https:\/\/www.aicerts.ai\/news\/wired-leak-massive-credential-exposure-demands-action\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aicerts.ai\/news\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.aicerts.ai\/news\/news\/"},{"@type":"ListItem","position":3,"name":"Wired Leak: Massive Credential Exposure Demands Action"}]},{"@type":"WebSite","@id":"https:\/\/www.aicerts.ai\/news\/#website","url":"https:\/\/www.aicerts.ai\/news\/","name":"Aicerts News","description":"","publisher":{"@id":"https:\/\/www.aicerts.ai\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aicerts.ai\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.aicerts.ai\/news\/#organization","name":"Aicerts News","url":"https:\/\/www.aicerts.ai\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aicerts.ai\/news\/#\/schema\/logo\/image\/","url":"https:\/\/www.aicerts.ai\/news\/wp-content\/uploads\/2024\/09\/news_logo.svg","contentUrl":"https:\/\/www.aicerts.ai\/news\/wp-content\/uploads\/2024\/09\/news_logo.svg","width":1,"height":1,"caption":"Aicerts News"},"image":{"@id":"https:\/\/www.aicerts.ai\/news\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/news\/10374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/types\/news"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/comments?post=10374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/media\/10371"}],"wp:attachment":[{"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/media?parent=10374"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/tags?post=10374"},{"taxonomy":"news_category","embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/news_category?post=10374"},{"taxonomy":"communities","embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/communities?post=10374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}