Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2124,"date":"2024-01-11T19:52:19","date_gmt":"2024-01-11T19:52:19","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/"},"modified":"2024-01-11T19:52:19","modified_gmt":"2024-01-11T19:52:19","slug":"dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/","title":{"rendered":"DreamBus Unleashes Metabase Mayhem With New Exploit Module Brett Stone-Gross"},"content":{"rendered":"

Introduction<\/p>\n

Zscaler\u2019s ThreatLabz research team has been tracking the Linux-based malware family known as DreamBus. Not much has changed in the last few years other than minor bug fixes, and slight modifications to evade detection from security software. However, in the last 6 months, the threat actor operating DreamBus has introduced two new modules to target vulnerabilities in Metabase and Apache RocketMQ. This is likely in response to a decrease in new infections stemming from exploits utilized by DreamBus, many of which are dated and have been in use for several years. DreamBus also continues to use techniques that exploit implicit trust and weak passwords including Secure Shell (SSH), IT administration tools, cloud-based applications, and databases. The primary monetization vector for DreamBus infections is still through mining Monero cryptocurrency.
\nKey Takeaways<\/p>\n

\tDreamBus is a modular Linux-based botnet dating back to early 2019 with worm-like behavior that can spread across the internet as well as internal networks.
\n\tDreamBus uses a combination of implicit trust, application-specific exploits, and weak passwords to gain access to systems such as databases, cloud-based applications, and IT administration tools.
\n\tInfected systems are monetized by mining Monero cryptocurrency using XMRig.
\n\tIn June 2023, the DreamBus malware author introduced new changes to the code to further evade detection.
\n\tThe threat actor developed two new exploit modules that target vulnerabilities in Metabase (CVE-2023-38646) and Apache RocketMQ (CVE-2023-33246).<\/p>\n

Technical Analysis<\/p>\n

Zscaler ThreatLabz has previously analyzed DreamBus and its modules. Each DreamBus module is an Executable and Linkable Format (ELF) binary that is packed by UPX with a modified header and footer. This alteration is designed to prevent the UPX command-line tool from statically unpacking DreamBus binaries. The magic bytes UPX! (0x21585055) are typically replaced with values that change over time. In recent DreamBus samples, the UPX magic bytes have been replaced with the value .gnu (0x756e672e). <\/p>\n

DreamBus modules all have a very similar structure. The main difference between each module is the exploit code. Each module scans for servers listening on specific ports, performs exploitation, and if successful, executes shell scripts that download the main DreamBus module, which in turn deploys XMRig to mine Monero cryptocurrency. Each exploit module creates a lock file named \/tmp\/.systemd.3 to ensure that only one instance is running at a time. Each exploit module scans internal RFC 1918 ranges 172.16.0.0\/12, 192.168.0.0\/16, and 10.0.0.0\/8 as well as randomly scanning public IP ranges.<\/p>\n

Over the last 6 months, ThreatLabz observed DreamBus deploy modules for the following applications:<\/p>\n

\tMetabase (CVE-2023-38646)
\n\tRocketMQ (CVE-2023-33246)
\n\tHashiCorp Consul
\n\tHadoop YARN
\n\tRedis
\n\tPostgreSQL
\n\tSSH<\/p>\n

The most commonly deployed DreamBus modules target PostgreSQL. Links to the current password lists used by DreamBus to brute force Redis, PostgreSQL, and SSH credentials are provided in the Appendix.<\/p>\n

In this blog, we analyze the two exploit modules for Metabase and RocketMQ that were added recently.<\/p>\n

Metabase Exploit Module (CVE-2023-38646)<\/p>\n

Metabase is a popular business intelligence tool used to analyze and visualize data. The open source versions of Metabase 0.46.6.1 and earlier, as well as Metabase Enterprise 1.46.6.1 and earlier, are vulnerable to CVE-2023-38646, which was first documented in July 2023. The vulnerability allows an attacker to execute arbitrary commands on the server. The DreamBus exploit targeting the vulnerability is likely based on an open source proof-of-concept.<\/p>\n

The first step is to scan for Metabase servers listening on port 3000 by sending the following HTTP request:<\/p>\n

GET \/api\/session\/properties HTTP\/1.1
\nHost: 127.0.0.1:3000<\/p>\n

The DreamBus module checks the response for the string metabase.D to identify whether the server is running Metabase. This string is likely attempting to identify the metabase.DEVICE cookie value. If this string is found, DreamBus stages the exploit by writing the following content to the file \/tmp\/.json%s (where the format %s string is the IP address of the Metabase server).<\/p>\n

…….`
\n00000020 67 75 61 67 65 22 3a 22 4a 41 56 41 22 2c 22 6f filterSe<\/p>\n

DreamBus then executes the following bash command to send another request to the Metabase server to extract the setup token: <\/p>\n

setup_token=$(curl -4fs %s:%d\/api\/session\/properties<\/p>","protected":false},"excerpt":{"rendered":"

Introduction Zscaler\u2019s ThreatLabz research team has been tracking the Linux-based […]<\/p>\n","protected":false},"author":0,"featured_media":2125,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2124","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zenith-zscaler"],"yoast_head":"\nDreamBus Unleashes Metabase Mayhem With New Exploit Module Brett Stone-Gross - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DreamBus Unleashes Metabase Mayhem With New Exploit Module Brett Stone-Gross\" \/>\n<meta property=\"og:description\" content=\"Introduction Zscaler\u2019s ThreatLabz research team has been tracking the Linux-based […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-11T19:52:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/zscaler-blog-advanced-persistent-threats-1402x-Q8oebu.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"424\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"DreamBus Unleashes Metabase Mayhem With New Exploit Module Brett Stone-Gross\",\"datePublished\":\"2024-01-11T19:52:19+00:00\",\"dateModified\":\"2024-01-11T19:52:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/\"},\"wordCount\":670,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/zscaler-blog-advanced-persistent-threats-1402x-Q8oebu.jpeg\",\"articleSection\":[\"Zenith: Zscaler\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/\",\"name\":\"DreamBus Unleashes Metabase Mayhem With New Exploit Module Brett Stone-Gross - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/zscaler-blog-advanced-persistent-threats-1402x-Q8oebu.jpeg\",\"datePublished\":\"2024-01-11T19:52:19+00:00\",\"dateModified\":\"2024-01-11T19:52:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/zscaler-blog-advanced-persistent-threats-1402x-Q8oebu.jpeg\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/zscaler-blog-advanced-persistent-threats-1402x-Q8oebu.jpeg\",\"width\":1080,\"height\":424},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DreamBus Unleashes Metabase Mayhem With New Exploit Module Brett Stone-Gross\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DreamBus Unleashes Metabase Mayhem With New Exploit Module Brett Stone-Gross - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/","og_locale":"en_US","og_type":"article","og_title":"DreamBus Unleashes Metabase Mayhem With New Exploit Module Brett Stone-Gross","og_description":"Introduction Zscaler\u2019s ThreatLabz research team has been tracking the Linux-based […]","og_url":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/","og_site_name":"JHC","article_published_time":"2024-01-11T19:52:19+00:00","og_image":[{"width":1080,"height":424,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/zscaler-blog-advanced-persistent-threats-1402x-Q8oebu.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/"},"author":{"name":"","@id":""},"headline":"DreamBus Unleashes Metabase Mayhem With New Exploit Module Brett Stone-Gross","datePublished":"2024-01-11T19:52:19+00:00","dateModified":"2024-01-11T19:52:19+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/"},"wordCount":670,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/zscaler-blog-advanced-persistent-threats-1402x-Q8oebu.jpeg","articleSection":["Zenith: Zscaler"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/","url":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/","name":"DreamBus Unleashes Metabase Mayhem With New Exploit Module Brett Stone-Gross - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/zscaler-blog-advanced-persistent-threats-1402x-Q8oebu.jpeg","datePublished":"2024-01-11T19:52:19+00:00","dateModified":"2024-01-11T19:52:19+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/zscaler-blog-advanced-persistent-threats-1402x-Q8oebu.jpeg","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/01\/zscaler-blog-advanced-persistent-threats-1402x-Q8oebu.jpeg","width":1080,"height":424},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/dreambus-unleashes-metabase-mayhem-with-new-exploit-module-brett-stone-gross\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"DreamBus Unleashes Metabase Mayhem With New Exploit Module Brett Stone-Gross"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2124"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2124\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2125"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}