{"id":3201,"date":"2021-07-05T11:33:42","date_gmt":"2021-07-05T02:33:42","guid":{"rendered":"https:\/\/cyberenso.jp\/?page_id=3201"},"modified":"2021-08-19T14:40:17","modified_gmt":"2021-08-19T05:40:17","slug":"types-of-ransomware","status":"publish","type":"page","link":"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/","title":{"rendered":"Types of Ransomware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3201\" class=\"elementor elementor-3201\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-04ccf21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"04ccf21\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2780221\" data-id=\"2780221\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9d825d7 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"9d825d7\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">Types of Ransomware<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-97d7615 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"97d7615\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7ec9812\" data-id=\"7ec9812\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0cf7afc elementor-widget elementor-widget-text-editor\" data-id=\"0cf7afc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>There are hundreds of types of ransomware that pose a threat to your organisation and at NCD we are experienced in identifying and understanding the risk posed by these variants.<\/p><p>Many ransomware variants encrypt data but have decryption keys available. Other variants encrypt data and \u2018steal\u2019 your data with a threat to expose it publicly, causing more reputational and commercial damage. The latest variants now only exfiltrate huge amounts data without encryption and use social media and personal contact to employees to encourage the victim organisation to pay.<\/p><p>NCD support can help you understand the risk posed by particular variants and attackers and identify the best solution to assist in recovery and remediation.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f3b6b88 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f3b6b88\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6929854\" data-id=\"6929854\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d3b0ca9 elementor-grid-4 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-widget elementor-widget-posts\" data-id=\"d3b0ca9\" data-element_type=\"widget\" data-settings=\"{&quot;classic_columns&quot;:&quot;4&quot;,&quot;classic_columns_tablet&quot;:&quot;2&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-1745 page type-page status-publish has-post-thumbnail hentry\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/sodinokibi-ransomware\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"174\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/scan-3963099_1920.jpg?fit=300%2C174&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-1822\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/scan-3963099_1920.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/scan-3963099_1920.jpg?resize=300%2C174&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/scan-3963099_1920.jpg?resize=1024%2C594&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/scan-3963099_1920.jpg?resize=768%2C446&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/scan-3963099_1920.jpg?resize=1536%2C891&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/scan-3963099_1920.jpg?resize=16%2C9&amp;ssl=1 16w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/scan-3963099_1920.jpg?resize=252%2C146&amp;ssl=1 252w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/scan-3963099_1920.jpg?resize=50%2C29&amp;ssl=1 50w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/scan-3963099_1920.jpg?resize=129%2C75&amp;ssl=1 129w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/sodinokibi-ransomware\/\" >\n\t\t\t\tSodinokibi Ransomware\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>SODINOKIBI RANSOMWARE (REvil) Introduction Sodinokibi ransomware, which is also known as REvil, made its first appearance in 2019 as it was being distributed via the exploited CVE-2019-2725 vulnerability in Oracle WebLogic server. The threat actors were able to gain access to WebLogic servers with HTTP access.Sodinokibi ransomware is currently the most widespread active ransomware and have been recorded to target<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/sodinokibi-ransomware\/\" aria-label=\"Read more about Sodinokibi Ransomware\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-1773 page type-page status-publish has-post-thumbnail hentry\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/dharma-ransomware\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2321665_1920.png?fit=300%2C225&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-1838\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2321665_1920.png?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2321665_1920.png?resize=300%2C225&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2321665_1920.png?resize=1024%2C768&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2321665_1920.png?resize=768%2C576&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2321665_1920.png?resize=1536%2C1152&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2321665_1920.png?resize=16%2C12&amp;ssl=1 16w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2321665_1920.png?resize=195%2C146&amp;ssl=1 195w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2321665_1920.png?resize=50%2C38&amp;ssl=1 50w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2321665_1920.png?resize=100%2C75&amp;ssl=1 100w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/dharma-ransomware\/\" >\n\t\t\t\tDharma Ransomware\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>DHARMA (CRYSIS) RANSOMWARE Introduction Dharma ransomware which is also known as Crysis made its first appearance in 2016 as it was being manually delivered by exploiting Remote Desktop Protocol (RDP) services via TCP port 3389 and then the target computer would be brute forced to gain access.Attacks involving the Dharma ransomware have been frequent and have been recorded to target<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/dharma-ransomware\/\" aria-label=\"Read more about Dharma Ransomware\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-1806 page type-page status-publish has-post-thumbnail hentry\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/matrix-ransomware\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"193\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/1968-1-scaled.jpg?fit=300%2C193&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-1821\" alt=\"Business vector created by macrovector - www.freepik.com\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/1968-1-scaled.jpg?w=2560&amp;ssl=1 2560w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/1968-1-scaled.jpg?resize=300%2C193&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/1968-1-scaled.jpg?resize=1024%2C658&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/1968-1-scaled.jpg?resize=768%2C494&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/1968-1-scaled.jpg?resize=1536%2C987&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/1968-1-scaled.jpg?w=2440&amp;ssl=1 2440w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/matrix-ransomware\/\" >\n\t\t\t\tMatrix Ransomware\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>MATRIX RANSOMWARE Introduction Matrix ransomware made its first appearance in 2016 as it was being distributed by RIG exploit kits used by the EITest campaign. Although recently the threat actors who are distributing Matrix are following a playbook that is based on the playbook used by the SamSam Group. Attacks involving the Matrix ransomware have been infrequent and have been<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/matrix-ransomware\/\" aria-label=\"Read more about Matrix Ransomware\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-1985 page type-page status-publish has-post-thumbnail hentry\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/ryuk-ransomware\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"158\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-3998798_1920.jpg?fit=300%2C158&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-1994\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-3998798_1920.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-3998798_1920.jpg?resize=300%2C158&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-3998798_1920.jpg?resize=1024%2C538&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-3998798_1920.jpg?resize=768%2C403&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-3998798_1920.jpg?resize=1536%2C806&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-3998798_1920.jpg?resize=16%2C8&amp;ssl=1 16w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-3998798_1920.jpg?resize=260%2C137&amp;ssl=1 260w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-3998798_1920.jpg?resize=50%2C26&amp;ssl=1 50w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-3998798_1920.jpg?resize=143%2C75&amp;ssl=1 143w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-3998798_1920.jpg?resize=1630%2C860&amp;ssl=1 1630w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/ryuk-ransomware\/\" >\n\t\t\t\tRyuk Ransomware\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>RYUK RANSOMWARE Introduction Ryuk ransomware made its first appearance in 2018 as it was being distributed by spam emails that had the Ryuk dropper attached. Then the dropper would download Trickbot or Emotet as well as downloading the ransomware. Attacks involving the Ryuk ransomware have been frequent and have been recorded to target organisation of medium to large size from<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/ryuk-ransomware\/\" aria-label=\"Read more about Ryuk Ransomware\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2026 page type-page status-publish has-post-thumbnail hentry\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/egregor-ransomware\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"212\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-5231739_1920.jpg?fit=300%2C212&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-2033\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-5231739_1920.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-5231739_1920.jpg?resize=300%2C212&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-5231739_1920.jpg?resize=1024%2C725&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-5231739_1920.jpg?resize=768%2C544&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-5231739_1920.jpg?resize=1536%2C1087&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-5231739_1920.jpg?resize=16%2C12&amp;ssl=1 16w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-5231739_1920.jpg?resize=206%2C146&amp;ssl=1 206w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-5231739_1920.jpg?resize=50%2C35&amp;ssl=1 50w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-5231739_1920.jpg?resize=106%2C75&amp;ssl=1 106w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/egregor-ransomware\/\" >\n\t\t\t\tEgregor Ransomware\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>EGREGOR RANSOMWARE Introduction Egregor ransomware made its first appearance in 2020 as it was being distributed by phishing emails that has a malicious attachment. Attacks involving the Egregor ransomware have been frequent and have been recorded to target organisation of medium to large size from many countries including US, Japan, and UK. There is no decryptor for any of the<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/egregor-ransomware\/\" aria-label=\"Read more about Egregor Ransomware\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2184 page type-page status-publish has-post-thumbnail hentry\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/conti-ransomware\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320941_1920.jpg?fit=300%2C200&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-2197\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320941_1920.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320941_1920.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320941_1920.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320941_1920.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320941_1920.jpg?resize=1536%2C1024&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320941_1920.jpg?resize=16%2C12&amp;ssl=1 16w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320941_1920.jpg?resize=219%2C146&amp;ssl=1 219w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320941_1920.jpg?resize=50%2C33&amp;ssl=1 50w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320941_1920.jpg?resize=113%2C75&amp;ssl=1 113w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/conti-ransomware\/\" >\n\t\t\t\tConti Ransomware\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>CONTI RANSOMWARE Introduction Conti ransomware made its first appearance in 2020 as it was being distributed by phishing emails containing a link to Google Drive which stores the initial payload. Conti ransomware is currently the second most common active ransomware family and have been recorded to target organisations of medium to large size from many countries. There is no decryptor<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/conti-ransomware\/\" aria-label=\"Read more about Conti Ransomware\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2282 page type-page status-publish has-post-thumbnail hentry\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/nephilim-ransomware\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2318381_1920.jpg?fit=300%2C169&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-2284\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2318381_1920.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2318381_1920.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2318381_1920.jpg?resize=1024%2C575&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2318381_1920.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2318381_1920.jpg?resize=1536%2C863&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2318381_1920.jpg?resize=16%2C9&amp;ssl=1 16w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2318381_1920.jpg?resize=260%2C146&amp;ssl=1 260w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2318381_1920.jpg?resize=50%2C28&amp;ssl=1 50w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2318381_1920.jpg?resize=133%2C75&amp;ssl=1 133w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/nephilim-ransomware\/\" >\n\t\t\t\tNephilim Ransomware\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>NEPHILIM (NEFILIM) RANSOMWARE Introduction Nephilim ransomware, which is also known as Nefilim, made its first appearance in 2020 as it was being distributed through the targeting vulnerabilities in Citrix gateway devices. Attacks involving the Nephilim ransomware have been frequent and have been recorded to target organisations of medium to large size from many countries. There is no decryptor for any<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/nephilim-ransomware\/\" aria-label=\"Read more about Nephilim Ransomware\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2369 page type-page status-publish has-post-thumbnail hentry\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/lockbit-ransomware\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"175\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2315203_1920.jpg?fit=300%2C175&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-2388\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2315203_1920.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2315203_1920.jpg?resize=300%2C175&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2315203_1920.jpg?resize=1024%2C597&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2315203_1920.jpg?resize=768%2C448&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2315203_1920.jpg?resize=1536%2C896&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2315203_1920.jpg?resize=16%2C9&amp;ssl=1 16w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2315203_1920.jpg?resize=250%2C146&amp;ssl=1 250w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2315203_1920.jpg?resize=50%2C29&amp;ssl=1 50w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2315203_1920.jpg?resize=129%2C75&amp;ssl=1 129w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/lockbit-ransomware\/\" >\n\t\t\t\tLockBit Ransomware\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>LOCKBIT RANSOMWARE Introduction LockBit ransomware, formerly known as ABCD ransomware made its first appearance in 2019 as it was being distributed by phishing emails and brute force attacks on exposed machines. Attacks involving the LockBit ransomware have been frequent and have been recorded to target organisations of medium to large size from many countries including United States, China, India, Indonesia,<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/lockbit-ransomware\/\" aria-label=\"Read more about LockBit Ransomware\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2374 page type-page status-publish has-post-thumbnail hentry\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/phobos-ransomware\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"197\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320793_1920.jpg?fit=300%2C197&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-2393\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320793_1920.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320793_1920.jpg?resize=300%2C197&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320793_1920.jpg?resize=1024%2C671&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320793_1920.jpg?resize=768%2C503&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320793_1920.jpg?resize=1536%2C1006&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320793_1920.jpg?resize=16%2C10&amp;ssl=1 16w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320793_1920.jpg?resize=223%2C146&amp;ssl=1 223w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320793_1920.jpg?resize=50%2C33&amp;ssl=1 50w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-2320793_1920.jpg?resize=114%2C75&amp;ssl=1 114w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/phobos-ransomware\/\" >\n\t\t\t\tPhobos Ransomware\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>PHOBOS RANSOMWARE Introduction Phobos ransomware made its first appearance in 2018 as it was being distributed by exploits Remote Desktop Protocol (RDP) and poorly secured RDP credentials. Attacks involving the Phobos ransomware have been frequent and have been recorded to target organisations of small to medium size from many countries. There is no decryptor for any of the active variants<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/phobos-ransomware\/\" aria-label=\"Read more about Phobos Ransomware\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2398 page type-page status-publish has-post-thumbnail hentry\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/rapid-ransomware\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"180\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/cyber-security-3400657_1920.jpg?fit=300%2C180&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-2414\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/cyber-security-3400657_1920.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/cyber-security-3400657_1920.jpg?resize=300%2C180&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/cyber-security-3400657_1920.jpg?resize=1024%2C614&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/cyber-security-3400657_1920.jpg?resize=768%2C461&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/cyber-security-3400657_1920.jpg?resize=1536%2C922&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/cyber-security-3400657_1920.jpg?resize=16%2C10&amp;ssl=1 16w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/cyber-security-3400657_1920.jpg?resize=243%2C146&amp;ssl=1 243w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/cyber-security-3400657_1920.jpg?resize=50%2C30&amp;ssl=1 50w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/cyber-security-3400657_1920.jpg?resize=125%2C75&amp;ssl=1 125w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/rapid-ransomware\/\" >\n\t\t\t\tRapid Ransomware\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>RAPID RANSOMWARE Introduction Rapid ransomware made its first appearance in 2017 as it was being distributed through phishing campaigns of Fake Internal Revenue Service (IRS) emails with a malicious zip attachment. Attacks involving the active variants of Rapid ransomware have been frequent and have been recorded to target organisations of small to medium size from many countries including USA and<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/rapid-ransomware\/\" aria-label=\"Read more about Rapid Ransomware\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2399 page type-page status-publish has-post-thumbnail hentry\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/globeimposter-ransomware\/\" tabindex=\"-1\" >\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"207\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/michael-geiger-JJPqavJBy_k-unsplash-scaled.jpg?fit=300%2C207&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-2408\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/michael-geiger-JJPqavJBy_k-unsplash-scaled.jpg?w=2560&amp;ssl=1 2560w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/michael-geiger-JJPqavJBy_k-unsplash-scaled.jpg?resize=300%2C207&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/michael-geiger-JJPqavJBy_k-unsplash-scaled.jpg?resize=1024%2C706&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/michael-geiger-JJPqavJBy_k-unsplash-scaled.jpg?resize=768%2C530&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/michael-geiger-JJPqavJBy_k-unsplash-scaled.jpg?resize=1536%2C1059&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/michael-geiger-JJPqavJBy_k-unsplash-scaled.jpg?resize=2048%2C1412&amp;ssl=1 2048w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/michael-geiger-JJPqavJBy_k-unsplash-scaled.jpg?resize=16%2C12&amp;ssl=1 16w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/michael-geiger-JJPqavJBy_k-unsplash-scaled.jpg?resize=212%2C146&amp;ssl=1 212w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/michael-geiger-JJPqavJBy_k-unsplash-scaled.jpg?resize=50%2C34&amp;ssl=1 50w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/michael-geiger-JJPqavJBy_k-unsplash-scaled.jpg?resize=109%2C75&amp;ssl=1 109w, https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/michael-geiger-JJPqavJBy_k-unsplash-scaled.jpg?w=2440&amp;ssl=1 2440w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/globeimposter-ransomware\/\" >\n\t\t\t\tGlobeImposter Ransomware\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>GLOBELIMPOSTER RANSOMWARE Introduction GlobeImposter ransomware made its first appearance in 2017 as it was being distributed through a \u201cBlank Slate\u201d phishing campaign with a malicious ZIP file attachment. Attacks involving the GlobeImposter ransomware have been frequent and have been recorded to target organisations of any size from many countries especially the United States, and countries in Europe and Asia There<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/globeimposter-ransomware\/\" aria-label=\"Read more about GlobeImposter Ransomware\" tabindex=\"-1\" >\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Types of Ransomware There are hundreds of types of ransomware that pose a threat to your organisation and at NCD we are experienced in identifying and understanding the risk posed by these variants. Many ransomware variants encrypt data but have decryption keys available. Other variants encrypt data and \u2018steal\u2019 your data with a threat to expose it publicly, causing more<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":5278,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3201","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/3201"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=3201"}],"version-history":[{"count":27,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/3201\/revisions"}],"predecessor-version":[{"id":5273,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/3201\/revisions\/5273"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/5278"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=3201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}