{"id":223,"date":"2019-02-25T10:08:45","date_gmt":"2019-02-25T10:08:45","guid":{"rendered":"https:\/\/bitdatasoft.com\/blog\/?p=223"},"modified":"2024-09-09T10:57:50","modified_gmt":"2024-09-09T10:57:50","slug":"decrypt-777-files-encrypted-by-777-ransomware","status":"publish","type":"post","link":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/","title":{"rendered":"How to Decrypt .777 Files Encrypted by 777 Ransomware \u2013 Free Tutorial"},"content":{"rendered":"<p>Are you searching for the solution to remove 777 Ransomware? If yes then, you are landed at the correct place as there is a solution to decrypt .777 files. Mr. Roy has shared a complete solution to decrypt 777 files encrypted by 777 Ransom in a precise manner.<\/p>\n<p>Mr. Roy said that a group of threat actors in custody of extortion campaigns via a file-encrypting malware twigs with lucky number 777. This cyber ring first came into a spotlight of data security labs last year and obsolete all attacks shortly afterwards, but an infection recurred in early May 2016 with new edition.<\/p>\n<p>It\u2019s got mainly the similar behavioural characteristics and doesn\u2019t look too complex. The ransomware encrypts data on its host system and adds filenames with timestamp, for an instance,\u00a018-05-2016-13-53-21, followed by one of the mentioned strings:<\/p>\n<ul>\n<li>$seven_legion@india.com$.777<\/li>\n<li>$ninja.gaiver@aol.com$.777<\/li>\n<li>$kaligula.caesar@aol.com$.777<\/li>\n<\/ul>\n<p>These common denominator in similar format is date and time along with an email address and also\u00a0.777 extension.<\/p>\n<h2><strong>The Attack and Its Forms<\/strong><\/h2>\n<p>In divergence to more sophisticated samples such as TeslaCrypt or Locky ransomware, this anxiety cannot boast as much automation of extortion routine. There is no any linked-to ransom payment dashboard, which would allow victims to submit money and use the decryptor.<\/p>\n<p>Instead, .777 file virus impulses an infected Windows user to send email to fraudsters and get the restoration steps in reply.<\/p>\n<p>This primitive mode of communication, though doesn\u2019t make a threat as per malicious code. It does execute rather than strong cryptography to avoid users from retrieving data. Another quality of this attack is document named\u00a0read_this_file.txt that seems on desktop in course of compromise.<\/p>\n<p>All it says is following: \u201c<strong>For decrypt files send one file in email<\/strong>\u201d with particular address: (seven_legion@india.com,\u00a0kaligula.caesar@aol.com\u00a0or\u00a0ninja.gaiver@aol.com) mentioned further.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-225 aligncenter\" src=\"https:\/\/bitdatasoft.com\/blog\/wp-content\/uploads\/2019\/02\/1-7.png\" alt=\"\" width=\"573\" height=\"290\" \/><\/p>\n<h2><strong>The Typical Crime<\/strong><\/h2>\n<p>The ransom size across such incidents is not constant and depends on how big potential data loss damage can be done. If it is a corporate IT environment that was hit then, the scammers may demand for as much as $1500.<\/p>\n<p>End users may be pleased to pay $500-800, and amount increases if victim delays with following scoundrels\u2019 instructions. The afflicted person must complete buyout using the Bitcoins, a crypto currency, which keeps bad guys on secure side when it comes to efforts of tracking them.<\/p>\n<p>The .777 ransomware depends on email both for communicating with victim or actually infecting computers or even networks. Typical malicious code injection scenario that takes place when any user opens an attachment, which goes with affected incoming message from an unaware sender. This ZIP or PDF file may be imitated as someone\u2019s curriculum vitae, an invite to some must-attend an event, package delivery notice or more. The takeaway from such tactic is that it is the worst idea to open an email attachments unless there is certainty they are secure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-227 aligncenter\" src=\"https:\/\/bitdatasoft.com\/blog\/wp-content\/uploads\/2019\/02\/2-7.png\" alt=\"\" width=\"217\" height=\"202\" \/><\/p>\n<h3><strong>What to do Next?<\/strong><\/h3>\n<p>If you are one of them who is affected with 777 Ransomware then, simply download the tool as it is the only way that can help you to decrypt .777 files and get back to you with a healthy data. Trend Micro Ransomware Decryptor\u00a0is programmed to decrypt files that are encrypted by 777 Ransom.<\/p>\n<p><a href=\"https:\/\/success.trendmicro.com\/solution\/1114221\" target=\"_blank\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-107 aligncenter\" src=\"https:\/\/bitdatasoft.com\/blog\/wp-content\/uploads\/2019\/02\/download-button.png\" alt=\"\" width=\"224\" height=\"74\" \/><\/a><\/p>\n<h3><strong>How to Protect Your PC from 777 Ransom?<\/strong><\/h3>\n<p>To avoid .777 files ransomware and any other file encrypting malware in the future, simply go through some simple recommendations:<\/p>\n<ul>\n<li><strong>Backup is the Main Key<\/strong>: Make sure to keep complete backup of your data on any external device and cloud that should be updated regularly. You can use <a href=\"https:\/\/bitdatasoft.com\/email-backup\/\" target=\"_blank\" rel=\"noopener\"><strong><em>BitData Email Backup Software<\/em><\/strong><\/a> to maintain your regular email backup<\/li>\n<li><strong>Authenticate Email Attachments:<\/strong> Phishing is very common nowadays. Thus, validate not only email but even its attachments too before using or even downloading them.<\/li>\n<li><strong>Validate Hyperlinks:<\/strong> Before clicking on any hyperlinks verify the authenticity by just placing a cursor on them and checking its URL related to it.<\/li>\n<li><strong>Permit Firewall Settings<\/strong>: Always keep Windows Firewall settings permitted to protect your machine from malware, spyware, and any other malicious elements.<\/li>\n<li><strong>Improve Browser Settings:<\/strong> See to it that your browser is proficient enough to notice and scan compacted and archived files before downloading.<\/li>\n<\/ul>\n<p>These methods are certainly not a cure, but they will enhance an extra layer of ransomware protection to your safety setup.<br \/>\nBy coming to end, I must say that post-factum valuation of correctness component in malware removal scenarios is a good habit, which prevents comeback of harmful code or even replication of its unattended segments. Make sure you are good enough to go by running some additional safety check-ups.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you searching for the solution to remove 777 Ransomware? If yes then, you are landed at the correct place as there is a solution to decrypt .777 files. Mr. <\/p>\n","protected":false},"author":2,"featured_media":223,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[39],"tags":[41,40],"class_list":["post-223","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-security","tag-decrypt-777-files","tag-decrypt-777-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Decrypt 777 Ransomware \u2013 Free Guide<\/title>\n<meta name=\"description\" content=\"Know how to decrypt .777 ransomware files with a trouble-free decryptor tool to remove 777 ransomware from your machine.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Decrypt 777 Ransomware \u2013 Free Guide\" \/>\n<meta property=\"og:description\" content=\"Know how to decrypt .777 ransomware files with a trouble-free decryptor tool to remove 777 ransomware from your machine.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"BitData Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-25T10:08:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-09T10:57:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bitdatasoft.com\/blog\/wp-content\/uploads\/2019\/02\/1-7.png\" \/>\n<meta name=\"author\" content=\"Jamie Kaler\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamie Kaler\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/decrypt-777-files-encrypted-by-777-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/decrypt-777-files-encrypted-by-777-ransomware\\\/\"},\"author\":{\"name\":\"Jamie Kaler\",\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/#\\\/schema\\\/person\\\/2ebabe9042e471724d5c75b386464bf3\"},\"headline\":\"How to Decrypt .777 Files Encrypted by 777 Ransomware \u2013 Free Tutorial\",\"datePublished\":\"2019-02-25T10:08:45+00:00\",\"dateModified\":\"2024-09-09T10:57:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/decrypt-777-files-encrypted-by-777-ransomware\\\/\"},\"wordCount\":780,\"image\":{\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/decrypt-777-files-encrypted-by-777-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdnxtra.com\\\/feature\\\/decrypt-777-files-encrypted-by-777-ransomware.jpg\",\"keywords\":[\"decrypt 777 files\",\"decrypt 777 ransomware\"],\"articleSection\":[\"Data Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/decrypt-777-files-encrypted-by-777-ransomware\\\/\",\"url\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/decrypt-777-files-encrypted-by-777-ransomware\\\/\",\"name\":\"How to Decrypt 777 Ransomware \u2013 Free Guide\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/decrypt-777-files-encrypted-by-777-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/decrypt-777-files-encrypted-by-777-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdnxtra.com\\\/feature\\\/decrypt-777-files-encrypted-by-777-ransomware.jpg\",\"datePublished\":\"2019-02-25T10:08:45+00:00\",\"dateModified\":\"2024-09-09T10:57:50+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/#\\\/schema\\\/person\\\/2ebabe9042e471724d5c75b386464bf3\"},\"description\":\"Know how to decrypt .777 ransomware files with a trouble-free decryptor tool to remove 777 ransomware from your machine.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/decrypt-777-files-encrypted-by-777-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/decrypt-777-files-encrypted-by-777-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/decrypt-777-files-encrypted-by-777-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdnxtra.com\\\/feature\\\/decrypt-777-files-encrypted-by-777-ransomware.jpg\",\"contentUrl\":\"https:\\\/\\\/cdnxtra.com\\\/feature\\\/decrypt-777-files-encrypted-by-777-ransomware.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/decrypt-777-files-encrypted-by-777-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Decrypt .777 Files Encrypted by 777 Ransomware \u2013 Free Tutorial\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/\",\"name\":\"BitData Blog\",\"description\":\"Discuss About Data Recovery &amp; Data Conversion for Business Continuity\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/#\\\/schema\\\/person\\\/2ebabe9042e471724d5c75b386464bf3\",\"name\":\"Jamie Kaler\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/465cf10887e9bd6cb99f3388f2de8634d1aa1118462ba55cb19cfec936762678?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/465cf10887e9bd6cb99f3388f2de8634d1aa1118462ba55cb19cfec936762678?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/465cf10887e9bd6cb99f3388f2de8634d1aa1118462ba55cb19cfec936762678?s=96&d=mm&r=g\",\"caption\":\"Jamie Kaler\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jamiekaler\\\/\",\"https:\\\/\\\/bitdatasoft.com\\\/assets\\\/img\\\/jamie.png\"],\"url\":\"https:\\\/\\\/bitdatasoft.com\\\/blog\\\/author\\\/jamie-kaler\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Decrypt 777 Ransomware \u2013 Free Guide","description":"Know how to decrypt .777 ransomware files with a trouble-free decryptor tool to remove 777 ransomware from your machine.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"How to Decrypt 777 Ransomware \u2013 Free Guide","og_description":"Know how to decrypt .777 ransomware files with a trouble-free decryptor tool to remove 777 ransomware from your machine.","og_url":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/","og_site_name":"BitData Blog","article_published_time":"2019-02-25T10:08:45+00:00","article_modified_time":"2024-09-09T10:57:50+00:00","og_image":[{"url":"https:\/\/bitdatasoft.com\/blog\/wp-content\/uploads\/2019\/02\/1-7.png","type":"","width":"","height":""}],"author":"Jamie Kaler","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jamie Kaler","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/#article","isPartOf":{"@id":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/"},"author":{"name":"Jamie Kaler","@id":"https:\/\/bitdatasoft.com\/blog\/#\/schema\/person\/2ebabe9042e471724d5c75b386464bf3"},"headline":"How to Decrypt .777 Files Encrypted by 777 Ransomware \u2013 Free Tutorial","datePublished":"2019-02-25T10:08:45+00:00","dateModified":"2024-09-09T10:57:50+00:00","mainEntityOfPage":{"@id":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/"},"wordCount":780,"image":{"@id":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/cdnxtra.com\/feature\/decrypt-777-files-encrypted-by-777-ransomware.jpg","keywords":["decrypt 777 files","decrypt 777 ransomware"],"articleSection":["Data Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/","url":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/","name":"How to Decrypt 777 Ransomware \u2013 Free Guide","isPartOf":{"@id":"https:\/\/bitdatasoft.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/cdnxtra.com\/feature\/decrypt-777-files-encrypted-by-777-ransomware.jpg","datePublished":"2019-02-25T10:08:45+00:00","dateModified":"2024-09-09T10:57:50+00:00","author":{"@id":"https:\/\/bitdatasoft.com\/blog\/#\/schema\/person\/2ebabe9042e471724d5c75b386464bf3"},"description":"Know how to decrypt .777 ransomware files with a trouble-free decryptor tool to remove 777 ransomware from your machine.","breadcrumb":{"@id":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/#primaryimage","url":"https:\/\/cdnxtra.com\/feature\/decrypt-777-files-encrypted-by-777-ransomware.jpg","contentUrl":"https:\/\/cdnxtra.com\/feature\/decrypt-777-files-encrypted-by-777-ransomware.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/bitdatasoft.com\/blog\/decrypt-777-files-encrypted-by-777-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bitdatasoft.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Decrypt .777 Files Encrypted by 777 Ransomware \u2013 Free Tutorial"}]},{"@type":"WebSite","@id":"https:\/\/bitdatasoft.com\/blog\/#website","url":"https:\/\/bitdatasoft.com\/blog\/","name":"BitData Blog","description":"Discuss About Data Recovery &amp; Data Conversion for Business Continuity","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bitdatasoft.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/bitdatasoft.com\/blog\/#\/schema\/person\/2ebabe9042e471724d5c75b386464bf3","name":"Jamie Kaler","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/465cf10887e9bd6cb99f3388f2de8634d1aa1118462ba55cb19cfec936762678?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/465cf10887e9bd6cb99f3388f2de8634d1aa1118462ba55cb19cfec936762678?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/465cf10887e9bd6cb99f3388f2de8634d1aa1118462ba55cb19cfec936762678?s=96&d=mm&r=g","caption":"Jamie Kaler"},"sameAs":["https:\/\/www.linkedin.com\/in\/jamiekaler\/","https:\/\/bitdatasoft.com\/assets\/img\/jamie.png"],"url":"https:\/\/bitdatasoft.com\/blog\/author\/jamie-kaler\/"}]}},"_links":{"self":[{"href":"https:\/\/bitdatasoft.com\/blog\/wp-json\/wp\/v2\/posts\/223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitdatasoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitdatasoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitdatasoft.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/bitdatasoft.com\/blog\/wp-json\/wp\/v2\/comments?post=223"}],"version-history":[{"count":7,"href":"https:\/\/bitdatasoft.com\/blog\/wp-json\/wp\/v2\/posts\/223\/revisions"}],"predecessor-version":[{"id":232,"href":"https:\/\/bitdatasoft.com\/blog\/wp-json\/wp\/v2\/posts\/223\/revisions\/232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitdatasoft.com\/blog\/wp-json\/wp\/v2\/posts\/223"}],"wp:attachment":[{"href":"https:\/\/bitdatasoft.com\/blog\/wp-json\/wp\/v2\/media?parent=223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitdatasoft.com\/blog\/wp-json\/wp\/v2\/categories?post=223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitdatasoft.com\/blog\/wp-json\/wp\/v2\/tags?post=223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}