{"id":30074,"date":"2017-05-29T18:01:42","date_gmt":"2017-05-29T10:01:42","guid":{"rendered":"https:\/\/www.hongkiat.com\/blog\/?p=30074"},"modified":"2023-04-06T19:14:28","modified_gmt":"2023-04-06T11:14:28","slug":"android-cloak-and-dagger-vulnerability","status":"publish","type":"post","link":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/","title":{"rendered":"Android Exploit &#8216;Cloak &#038; Dagger&#8217; Can Steal Your Passwords"},"content":{"rendered":"<p>Android users may want to <strong>keep a close eye on the apps they download<\/strong> onto their devices as researchers have discovered a series of vulnerabilities in the operating system that <strong>relies on two particular Android permissions to work<\/strong>.<\/p>\n<p>Dubbed <strong>Cloak & Dagger <\/strong>by the research team that discovered the vulnerability, the attack relies on abusing the <strong><code>SYSTEM_ALERT_WINDOW<\/code><\/strong> and <strong><code>BIND_ACCESSIBILITY_SERVICE<\/code><\/strong> permissions in order to compromise the system.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/android-cloak-and-dagger-vulnerability\/01-system-vulnerabilities.jpg\" width=\"610\" height=\"1080\" alt=\"system vulnerabilities\"><\/figure>\n<p>The way the exploit works is pretty straightforward: a malicious app gets <strong>downloaded and installed to the Android device<\/strong>, with the necessary permissions being granted without requiring the user\u2019s input.<\/p>\n<p>From there, <strong>hackers are able to perform clickjacking, record keystrokes, phishing, and even installing a God-mode app, all without the user being aware of it<\/strong>.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/android-cloak-and-dagger-vulnerability\/02-god-mode-app.jpg\" width=\"611\" height=\"1077\" alt=\"god-mode-app\"><\/figure>\n<p>In order to <strong>illustrate the danger that the vulnerability poses<\/strong>, the researchers have prepared three videos that demonstrates the potential attacks that could be carried out.<\/p>\n<p>The first one is called the <strong>Invisible Grid Attack, and it works by placing an invisible overlay over the device\u2019s keyboard<\/strong>. With it, the hacker could identify the information that is being typed out.<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/NceNhsu87iA\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n<p>The second video depicts a clickjacking attempt that eventually culminates in a God-mode application being <strong>silently installed in the background without the user even noticing it<\/strong>.<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/RYQ1i03OVpI\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n<p>Finally, the third video showcases <strong>how a hacker could steal a password<\/strong> by manipulating the overlays.<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/oGKYHavKZ24\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n<p>So which version of Android is susceptible to this particular vulnerability. Unfortunately, <strong>the vulnerability is applicable across all Android versions<\/strong>, including the current version of <a href=\"https:\/\/www.hongkiat.com\/blog\/android-beta-update\/\">Android 7.1.2 Nougat<\/a>.<\/p>\n<p>Not everything is doom and gloom however, as Google <strong>has since been notified of the vulnerability, so rest assured that the company will be looking for ways to fix it<\/strong>.<\/p>\n<p>In the meantime though, do keep an eye on the apps that you download off the Google Play Store.<\/p>\n<p class=\"recommended_top\">\n\t\t\t\t\t<strong>Read Also:<\/strong>\u00a0\n\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/www.hongkiat.com\/blog\/keeping-smartphone-safe\/\">How to Keep Your Smartphone Secure (6 Vital Tips)<\/a>\n\t\t\t\t<\/p>","protected":false},"excerpt":{"rendered":"<p>Android users may want to keep a close eye on the apps they download onto their devices as researchers have discovered a series of vulnerabilities in the operating system that relies on two particular Android permissions to work. Dubbed Cloak &#038; Dagger by the research team that discovered the vulnerability, the attack relies on abusing&hellip;<\/p>\n","protected":false},"author":157,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3399,3976],"tags":[115,554],"topic":[4523,4521],"class_list":["entry-content","is-maxi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Android Exploit &#039;Cloak &amp; Dagger&#039; Can Steal Your Passwords - Hongkiat<\/title>\n<meta name=\"description\" content=\"Android users may want to keep a close eye on the apps they download onto their devices as researchers have discovered a series of vulnerabilities in the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Exploit &#039;Cloak &amp; Dagger&#039; Can Steal Your Passwords\" \/>\n<meta property=\"og:description\" content=\"Android users may want to keep a close eye on the apps they download onto their devices as researchers have discovered a series of vulnerabilities in the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Hongkiat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hongkiatcom\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-29T10:01:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-06T11:14:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.hongkiat.com\/uploads\/android-cloak-and-dagger-vulnerability\/01-system-vulnerabilities.jpg\" \/>\n<meta name=\"author\" content=\"Sia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:site\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/\"},\"author\":{\"name\":\"Sia\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/25661c0ca5beef807a38c0d038894641\"},\"headline\":\"Android Exploit &#8216;Cloak &#038; Dagger&#8217; Can Steal Your Passwords\",\"datePublished\":\"2017-05-29T10:01:42+00:00\",\"dateModified\":\"2023-04-06T11:14:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/\"},\"wordCount\":309,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/android-cloak-and-dagger-vulnerability\\\/01-system-vulnerabilities.jpg\",\"keywords\":[\"Android\",\"Passwords\"],\"articleSection\":[\"Mobile\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/\",\"name\":\"Android Exploit 'Cloak & Dagger' Can Steal Your Passwords - Hongkiat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/android-cloak-and-dagger-vulnerability\\\/01-system-vulnerabilities.jpg\",\"datePublished\":\"2017-05-29T10:01:42+00:00\",\"dateModified\":\"2023-04-06T11:14:28+00:00\",\"description\":\"Android users may want to keep a close eye on the apps they download onto their devices as researchers have discovered a series of vulnerabilities in the\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/android-cloak-and-dagger-vulnerability\\\/01-system-vulnerabilities.jpg\",\"contentUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/android-cloak-and-dagger-vulnerability\\\/01-system-vulnerabilities.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/android-cloak-and-dagger-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Exploit &#8216;Cloak &#038; Dagger&#8217; Can Steal Your Passwords\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"name\":\"Hongkiat\",\"description\":\"Tech and Design Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\",\"name\":\"Hongkiat.com\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Hongkiat.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hongkiatcom\",\"https:\\\/\\\/x.com\\\/hongkiat\",\"https:\\\/\\\/www.pinterest.com\\\/hongkiat\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/25661c0ca5beef807a38c0d038894641\",\"name\":\"Sia\",\"description\":\"A tech journalist for Hongkiat.com, Sia writes reviews on new products and services in the tech industry.\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/author\\\/sia\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Android Exploit 'Cloak & Dagger' Can Steal Your Passwords - Hongkiat","description":"Android users may want to keep a close eye on the apps they download onto their devices as researchers have discovered a series of vulnerabilities in the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Android Exploit 'Cloak & Dagger' Can Steal Your Passwords","og_description":"Android users may want to keep a close eye on the apps they download onto their devices as researchers have discovered a series of vulnerabilities in the","og_url":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/","og_site_name":"Hongkiat","article_publisher":"https:\/\/www.facebook.com\/hongkiatcom","article_published_time":"2017-05-29T10:01:42+00:00","article_modified_time":"2023-04-06T11:14:28+00:00","og_image":[{"url":"https:\/\/assets.hongkiat.com\/uploads\/android-cloak-and-dagger-vulnerability\/01-system-vulnerabilities.jpg","type":"","width":"","height":""}],"author":"Sia","twitter_card":"summary_large_image","twitter_creator":"@hongkiat","twitter_site":"@hongkiat","twitter_misc":{"Written by":"Sia","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/"},"author":{"name":"Sia","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/25661c0ca5beef807a38c0d038894641"},"headline":"Android Exploit &#8216;Cloak &#038; Dagger&#8217; Can Steal Your Passwords","datePublished":"2017-05-29T10:01:42+00:00","dateModified":"2023-04-06T11:14:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/"},"wordCount":309,"commentCount":2,"publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/android-cloak-and-dagger-vulnerability\/01-system-vulnerabilities.jpg","keywords":["Android","Passwords"],"articleSection":["Mobile","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/","url":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/","name":"Android Exploit 'Cloak & Dagger' Can Steal Your Passwords - Hongkiat","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/android-cloak-and-dagger-vulnerability\/01-system-vulnerabilities.jpg","datePublished":"2017-05-29T10:01:42+00:00","dateModified":"2023-04-06T11:14:28+00:00","description":"Android users may want to keep a close eye on the apps they download onto their devices as researchers have discovered a series of vulnerabilities in the","breadcrumb":{"@id":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/#primaryimage","url":"https:\/\/assets.hongkiat.com\/uploads\/android-cloak-and-dagger-vulnerability\/01-system-vulnerabilities.jpg","contentUrl":"https:\/\/assets.hongkiat.com\/uploads\/android-cloak-and-dagger-vulnerability\/01-system-vulnerabilities.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hongkiat.com\/blog\/android-cloak-and-dagger-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hongkiat.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Android Exploit &#8216;Cloak &#038; Dagger&#8217; Can Steal Your Passwords"}]},{"@type":"WebSite","@id":"https:\/\/www.hongkiat.com\/blog\/#website","url":"https:\/\/www.hongkiat.com\/blog\/","name":"Hongkiat","description":"Tech and Design Tips","publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hongkiat.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hongkiat.com\/blog\/#organization","name":"Hongkiat.com","url":"https:\/\/www.hongkiat.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","contentUrl":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","width":1200,"height":799,"caption":"Hongkiat.com"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hongkiatcom","https:\/\/x.com\/hongkiat","https:\/\/www.pinterest.com\/hongkiat\/"]},{"@type":"Person","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/25661c0ca5beef807a38c0d038894641","name":"Sia","description":"A tech journalist for Hongkiat.com, Sia writes reviews on new products and services in the tech industry.","url":"https:\/\/www.hongkiat.com\/blog\/author\/sia\/"}]}},"jetpack_featured_media_url":"https:\/\/","jetpack_shortlink":"https:\/\/wp.me\/p4uxU-7P4","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/30074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/comments?post=30074"}],"version-history":[{"count":3,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/30074\/revisions"}],"predecessor-version":[{"id":65855,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/30074\/revisions\/65855"}],"wp:attachment":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/media?parent=30074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/categories?post=30074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/tags?post=30074"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/topic?post=30074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}