{"id":6668,"date":"2021-07-22T11:30:27","date_gmt":"2021-07-22T18:30:27","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6668"},"modified":"2024-04-26T13:20:30","modified_gmt":"2024-04-26T20:20:30","slug":"cyber-threat-advisory-chinese-pipeline","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/","title":{"rendered":"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion"},"content":{"rendered":"<h3>TLP: White<\/h3>\n<h3>1. Executive Summary<\/h3>\n<p>On 20 July, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) published a joint advisory AA21-201A on a Chinese state\u2013sponsored spear-phishing and intrusion campaign that targeted U.S. oil and natural gas (ONG) pipeline companies from 2011 to 2013.<sup>1<\/sup> The advisory identified 23 U.S. natural gas pipeline operators that were targeted during that time; out of those, 13 were confirmed compromised, 3 were not impacted, and 8 experienced an intrusion of unknown depth.<\/p>\n<p>Based on the data that the actors stole and the tactics, techniques, and procedures (TTPs) used in the campaign, CISA and the FBI assessed that the purpose of the intrusions was to gain strategic access to the industrial control system (ICS) networks to prepare for future operations, rather than to merely steal intellectual property. The advisory provides information on the TTPs and lists the indicators of compromise (IOCs) related to the campaign.<\/p>\n<p>The advisory from CISA and the FBI was published a day after the White House\u2019s official statement accusing the People\u2019s Republic of China (PRC) of hiring malicious actors to conduct, in early March 2021, cyber espionage operations that exploit zero-day vulnerabilities in Microsoft Exchange Servers.<sup>2<\/sup> On 19 July, the FBI and CISA published a joint advisory on the Chinese Advanced Persistent Threat APT40, as well as an advisory on trends in cyber espionage activities they observed across various Chinese state\u2013sponsored cyber actors.<sup>3<\/sup><sup>,<\/sup><sup>4<\/sup><\/p>\n<h3>2. Analysis<\/h3>\n<h4 style=\"padding-left: 40px;\">2.1. Campaign<\/h4>\n<p style=\"padding-left: 40px;\">From 9 December 2011 through at least 29 February 2012, the actors delivered spear-phishing emails with malicious attachments to ONG organizations\u2019 employees. The actors also called employees of the network engineering departments and attempted to collect information about their organizations\u2019 network security practices. In one incident, the employees received phone calls immediately after they identified and mitigated malicious activity in their network. The malicious phone caller used an unidentifiable caller ID and posed as a cybersecurity firm employee conducting a survey about security practices. The caller inquired about the organization\u2019s firewall practices and settings, software for network security, and intrusion detection and prevention systems.<\/p>\n<p style=\"padding-left: 40px;\">CISA and the FBI provided incident response and remediation support to the victims. In addition, CISA and the FBI discovered that the actors specifically collected and exfiltrated ICS information and scanned document repositories for the following data types:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Supervisory control and data acquisition (SCADA)-related documents<\/li>\n<li>Lists of personnel<\/li>\n<li>Usernames and passwords<\/li>\n<li>Information about dial-up access<\/li>\n<li>System manuals<\/li>\n<li>Remote terminal unit (RTU) sites<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\">The actors obtained information about ICS permission groups, and they compromised remote access systems designed to transfer data and allow access between corporate and ICS networks. Although these systems are legitimate business tools, it is possible the actors repurposed them to conduct malicious activities that could have physical repercussions. According to CISA and the FBI, there is no evidence that the actors attempted to modify the gas pipeline operations after accessing its systems. Due to a lack of log data, CISA and the FBI are unsure about the depth of intrusion for at least 8 (35 percent) of the 23 cases identified in the campaign.<\/p>\n<p style=\"padding-left: 40px;\">Across multiple U.S. natural gas pipeline companies, the actors gained access to SCADA systems, which many industrial organizations use to collect, analyze, and visualize equipment data.<\/p>\n<p style=\"padding-left: 40px;\">The actors also exfiltrated information specific to dial-up access (such as phone numbers, usernames, and passwords) and used this data to access the organizations\u2019 operational technology (OT) systems. Some ONG organizations still use dial-up modems to access ICS networks; because these modems lack security and monitoring features, they can be attractive attack vectors for cyber criminals.<\/p>\n<p style=\"padding-left: 40px;\">One targeted organization constructed a honeypot that contained two types of decoy documents: those appearing to have SCADA-related and sensitive organizational content, and those with fake financial and business information. Minutes after the honeypot went online, the actors exfiltrated only the files with SCADA-related and sensitive organizational content. Based on this experiment and the campaign TTPs, CISA and the FBI believe that the objective of the campaign was to help China develop cyberattack capabilities against U.S. pipeline companies so they could later use these capabilities to physically damage gas pipelines or disrupt pipeline operations, rather than to merely steal intellectual property.<\/p>\n<h4 style=\"padding-left: 40px;\">2.2. TTPs<\/h4>\n<p style=\"padding-left: 40px;\">The actors that conducted the spear-phishing and intrusion campaign used multiple TTPs to infiltrate the companies\u2019 networks and then use the stolen credentials to obtain sensitive information. CISA and the FBI are sharing the following TTPs (based on the MITRE ATT&amp;CK framework) that were used in the campaign:<\/p>\n<table width=\"672\">\n<tbody>\n<tr>\n<td width=\"336\">\n<p style=\"text-align: center;\"><strong>Tactic<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"336\"><strong>Technique<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"336\">\n<p style=\"text-align: center;\">Reconnaissance [TA0043]<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"336\">Phishing for Information [T1598]<\/td>\n<\/tr>\n<tr>\n<td width=\"336\">\n<p style=\"text-align: center;\">Initial Access [TA0001]<\/p>\n<\/td>\n<td width=\"336\">\n<p style=\"text-align: center;\">Phishing: Spearphishing Link [T1566.002]<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"336\">\n<p style=\"text-align: center;\">Execution [TA0002]<\/p>\n<\/td>\n<td width=\"336\">\n<p style=\"text-align: center;\">User Execution: Malicious File [T1204.002]<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"336\">\n<p style=\"text-align: center;\">Discovery [TA0007]<\/p>\n<\/td>\n<td width=\"336\">\n<p style=\"text-align: center;\">Peripheral Device Discovery [T1120]<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"336\">Collection [TA0009]<\/td>\n<td width=\"336\">\n<p style=\"text-align: center;\">Information from Document Repositories [T1213]<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"336\">Exfiltration\u00a0 [TA0010]<\/td>\n<td width=\"336\">\n<p style=\"text-align: center;\">\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4 style=\"padding-left: 40px;\">\u00a02.3. Mitigations<\/h4>\n<p style=\"padding-left: 40px;\">CISA and the FBI strongly recommend that operators of ONG organizations\u2019 networks and of other critical infrastructure networks implement network segmentation between IT and ICS\/OT systems. CISA and the FBI also recommend that organizations (1) practice measures that would strengthen their security posture and (2) commit to a layered approach that would reduce the risk of compromise and severe degradation of operations. We are providing all of these recommendations below:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Harden the IT\/corporate network to reduce the risk of initial compromise.\n<ul>\n<li>Update all software, including operating systems, applications, and firmware, in a timely manner. Consider using a centralized patch management system.<\/li>\n<li>Replace all end-of-life software and hardware devices.<\/li>\n<li>Restrict and manage remote access software. Remote access tools are a common method for threat actors to gain initial access and persistence on target networks.\n<ul>\n<li>Manage and restrict users and groups who are permitted to access remote capabilities. Permissions should be limited to users that require the capability to complete their duties.<\/li>\n<li>Require multi-factor authentication (MFA) for remote access.<\/li>\n<li>Limit access to resources over networks, especially by restricting Remote Desktop Protocol (RDP). If RDP is operationally necessary, restrict the originating sources and require MFA.<\/li>\n<\/ul>\n<\/li>\n<li>\u00a0 Enable strong spam filters to prevent phishing emails from reaching end users.<\/li>\n<li>Implement unauthorized execution prevention by:\n<ul>\n<li>Disabling macro scripts from Microsoft Office files transmitted via email. Consider using Office Viewer software to open Microsoft Office files transmitted via email instead of full Microsoft Office suite applications.<\/li>\n<li>Implementing application allowlisting, which only allows systems to execute programs known and permitted by security policy. Implement software restriction policies (SRPs) or other controls to prevent programs from executing from common malware locations, such as temporary folders supporting popular internet browsers.<\/li>\n<\/ul>\n<\/li>\n<li>Filter network traffic to prohibit ingress and egress communications with known malicious IP addresses. Prevent users from accessing malicious websites by implementing URL blocklists and\/or allow lists.<\/li>\n<li>Set antivirus\/antimalware programs to regularly scan IT network assets using up-to-date signatures.<\/li>\n<\/ul>\n<\/li>\n<li>Implement and ensure robust network segmentation between IT and ICS networks to limit the ability of cyber threat actors to move laterally to ICS networks if the IT network is compromised.\n<ul>\n<li>Implement a network topology for ICS that has multiple layers, with the most critical communications occurring in the most secure and reliable layer. For more information refer to National Institute of Standard and Technology (NIST) Special Publication 800-82: Guide to ICS Security.<\/li>\n<li>Use one-way communication diodes to prevent external access, whenever possible.<\/li>\n<li>Set up demilitarized zones (DMZs) to create a physical and logical subnetwork that acts as an intermediary for connected security devices to avoid exposure.<\/li>\n<li>Employ reliable network security protocols and services where feasible.<\/li>\n<li>Consider using virtual local area networks (VLANs) for additional network segmentation, for example, by placing all printers in separate, dedicated VLANs and restricting users\u2019 direct printer access.<\/li>\n<\/ul>\n<\/li>\n<li>Implement perimeter security between network segments to limit the ability of cyber threat actors to move laterally.\n<ul>\n<li>Control traffic between network segments by using firewalls, intrusion detection systems (IDSs), and filter routers and switches.<\/li>\n<li>Implement network monitoring at key chokepoints\u2014including egress points to the internet, between network segments, core switch locations\u2014and at key assets or services (e.g., remote access services).<\/li>\n<li>Configure an IDS to create alarms for any ICS traffic outside normal operations (after establishing a baseline of normal operations and network traffic).<\/li>\n<li>Configure security incident and event monitoring (SIEM) to monitor, analyze, and correlate event logs from across the ICS network to identify intrusion attempts.<\/li>\n<\/ul>\n<\/li>\n<li>Implement the following additional ICS environment best practices:\n<ul>\n<li>Update all software. Use a risk-based assessment strategy to determine which ICS network and assets and zones should participate in the patch management program.\n<ul>\n<li>Test all patches in off-line text environments before implementation.<\/li>\n<\/ul>\n<\/li>\n<li>Implement application allowlisting on human machine interfaces.<\/li>\n<li>Harden field devices, including tablets and smartphones.<\/li>\n<li>Replace all end-of-life software and hardware devices.<\/li>\n<li>Disable unused ports and services on ICS devices (after testing to ensure this will not affect ICS operation).<\/li>\n<li>Restrict and manage remote access software. Require MFA for remote access to ICS networks.<\/li>\n<li>Configure encryption and security for ICS protocols.<\/li>\n<li>Use a risk-based asset inventory strategy to determine how OT network assets are identified and evaluated for the presence of malware.<\/li>\n<li>Do not allow vendors to connect their devices to the ICS network. Use of a compromised device could introduce malware.<\/li>\n<li>Maintain an ICS asset inventory of all hardware, software, and supporting infrastructure technologies.<\/li>\n<li>Ensure robust physical security is in place to prevent unauthorized personnel from accessing controlled spaces that house ICS equipment.<\/li>\n<li>Regularly test manual controls so that critical functions can be kept running if ICS\/OT networks need to be taken offline.<\/li>\n<li>Manage the supply chain by adjusting the ICS procurement process to weigh cybersecurity heavily as part of the scoring and evaluation methodology. Additionally, establish contractual agreements for all outsourced services that ensure proper incident handling and reporting, security of interconnections, and remote access specifications and processes.<\/li>\n<\/ul>\n<\/li>\n<li>Implement the following additional best practices:\n<ul>\n<li>Implement IP geo-blocking, as appropriate.<\/li>\n<li>Implement regular, frequent data backup procedures on both the IT and ICS networks. Data backup procedures should address the following best practices:\n<ul>\n<li>Ensure backups are regularly tested.<\/li>\n<li>Store backups separately, i.e., backups should be isolated from network connections that could enable spread of malware or lateral movement.<\/li>\n<li>Maintain regularly updated \u201cgold images\u201d of critical systems in the event they need to be rebuilt.<\/li>\n<li>Retain backup hardware to rebuild systems in the event that rebuilding the primary system is not preferred.<\/li>\n<\/ul>\n<\/li>\n<li>Implement a user training program to train employees to recognize spear-phishing attempts, discourage users from visiting malicious websites or opening malicious attachments, and reinforce appropriate user response to spear-phishing emails.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>3. Indicators of Compromise<\/h3>\n<p>The table below contains a list of IOCs related to the spear-phishing and intrusion campaign described in this report. The advisory released by the FBI and CISA contains the full list of IOCs and additional information about emails.<\/p>\n<table width=\"672\">\n<tbody>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\"><strong>Indicator<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"147\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\">05476307f4beb3c0d9099270c504f055<\/p>\n<p style=\"text-align: center;\">124ad1778c65a83208dbefcec7706dc6<\/p>\n<p style=\"text-align: center;\">17199ddac616938f383a0339f416c890<\/p>\n<p style=\"text-align: center;\">3d28651bb2d16eeaa6a35099c886fbaa<\/p>\n<p style=\"text-align: center;\">4a8854363044e4d66bf34a0cd331d93d<\/p>\n<p style=\"text-align: center;\">52294de74a80beb1e579e5bca7c7248a<\/p>\n<p style=\"text-align: center;\">54db65a27472c9f3126df5bf91a773ea<\/p>\n<p style=\"text-align: center;\">5e6a033fa01739d9b517a468bd812162<\/p>\n<p style=\"text-align: center;\">60456fe206a87f5422b214369af4260e<\/p>\n<p style=\"text-align: center;\">6818a9aef22c0c2084293c82935e84fe<\/p>\n<p style=\"text-align: center;\">7361a1f33d48802d061605f34bf08fb0<\/p>\n<p style=\"text-align: center;\">7caf4dbf53ff1dcd5bd5be92462b2995<\/p>\n<p style=\"text-align: center;\">84873fae9cdecb84452fff9cca171004<\/p>\n<p style=\"text-align: center;\">99b58e416c5e8e0bcdcd39ba417a08ed<\/p>\n<p style=\"text-align: center;\">a46a7045c0a3350c5a4c919fff2831a0<\/p>\n<p style=\"text-align: center;\">d6eaadcbcf9ea9192db1bd5bb7462bf8<\/p>\n<p style=\"text-align: center;\">e12ce62cf7de42581c2fe1d7f36d521c<\/p>\n<p style=\"text-align: center;\">e62afe2273986240746203f9d55496db<\/p>\n<p style=\"text-align: center;\">ea1b46fab56e7f12c4c2e36cce63d593<\/p>\n<p style=\"text-align: center;\">ed92d1242c0017668b93a72865b0876b<\/p>\n<p style=\"text-align: center;\">f0a00cfd891059b70af96b807e9f9ab8<\/p>\n<p style=\"text-align: center;\">fcbbfadc992e265c351e54598a6f6dfb<\/p>\n<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\">MD5 hashes related to malicious files<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\">AcroRD32.exe<\/p>\n<p style=\"text-align: center;\">AdobeUpdater.exe<\/p>\n<p style=\"text-align: center;\">Solarworldsummary.exe<\/p>\n<p style=\"text-align: center;\">ccApp1.exe<\/p>\n<p style=\"text-align: center;\">fslist.exe<\/p>\n<p style=\"text-align: center;\">gh.exe<\/p>\n<p style=\"text-align: center;\">iTunesHelper.exe<\/p>\n<p style=\"text-align: center;\">iass.dll<\/p>\n<p style=\"text-align: center;\">inn.exe<\/p>\n<p style=\"text-align: center;\">ins.exe<\/p>\n<p style=\"text-align: center;\">kkk.exe<\/p>\n<p style=\"text-align: center;\">moonclient2.exe<\/p>\n<p style=\"text-align: center;\">niu.exe<\/p>\n<p style=\"text-align: center;\">ntshrui.dll<\/p>\n<p style=\"text-align: center;\">px.exe<\/p>\n<p style=\"text-align: center;\">slm.exe<\/p>\n<p style=\"text-align: center;\">smss.exe<\/p>\n<p style=\"text-align: center;\">spoolsvd.exe<\/p>\n<p style=\"text-align: center;\">u.exe<\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"147\">Names of malicious files<\/td>\n<\/tr>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\">(Company Name)_Summary.zip<\/p>\n<p style=\"text-align: center;\">(Company Name)_to_Sell_RNGMS_to_(Company Name).zip<\/p>\n<p style=\"text-align: center;\">01-12-RATEALERT.zip<\/p>\n<p style=\"text-align: center;\">Debt_Crisis_Hits_US.zip<\/p>\n<p style=\"text-align: center;\">Election_2012_Analysis.pdf<\/p>\n<p style=\"text-align: center;\">Gift-Winter.zip<\/p>\n<p style=\"text-align: center;\">Happy_New_Year.zip<\/p>\n<p style=\"text-align: center;\">How_Can_Steelmakers_Compete_for_Growth_in_the_Steel_Sector_in_2012.zip<\/p>\n<p style=\"text-align: center;\">Solarworldsummary.zip<\/p>\n<\/td>\n<td width=\"147\">Names of email attachments<\/td>\n<\/tr>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\">fni[.]itgamezone[.]net<\/p>\n<p style=\"text-align: center;\">fpso[.]bigish[.]net<\/p>\n<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\">Domains found in email bodies<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\">&lt;victim_company_name&gt;@yahoo.com<\/p>\n<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\">Email sender address<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"525\">\n<p style=\"text-align: center;\">18center[.]com<\/p>\n<p style=\"text-align: center;\">&lt;victim_company_name&gt;[.]arrowservice[.]net<\/p>\n<p style=\"text-align: center;\">&lt;victim_company_name&gt;[.]arrowservice[.]net<\/p>\n<p style=\"text-align: center;\">&lt;victim_company_name&gt;[.]businessconsults[.]net<\/p>\n<p style=\"text-align: center;\">&lt;victim_company_name&gt;[.]federalres[.]org<\/p>\n<p style=\"text-align: center;\">balancefitstudio[.]com<\/p>\n<p style=\"text-align: center;\">bargainblog[[.]com[.]au<\/p>\n<p style=\"text-align: center;\">blackcake[.]net<\/p>\n<p style=\"text-align: center;\">energyreview[.]strangled[.]net<\/p>\n<p style=\"text-align: center;\">etrace-it[.]com<\/p>\n<p style=\"text-align: center;\">idahoanad[dot]org<\/p>\n<p style=\"text-align: center;\">infosupports[.]com<\/p>\n<p style=\"text-align: center;\">milk[.]crabdance[.]com<\/p>\n<p style=\"text-align: center;\">mitchellsrus[.]com<\/p>\n<p style=\"text-align: center;\">picture[.]wintersline[.]com<\/p>\n<p style=\"text-align: center;\">res[.]federalres[.]org<\/p>\n<p style=\"text-align: center;\">un[.]linuxd[.]org<\/p>\n<p style=\"text-align: center;\">wish[.]happyforever[.]com<\/p>\n<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\">Possible C2 domains<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"525\">Mozilla\/4.0 (compatible; MSIE 6.0; Windows NT 5.2; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727)<\/p>\n<p>Mozilla\/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident\/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)<\/td>\n<td width=\"147\">\n<p style=\"text-align: center;\">Browser user agents<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h1><\/h1>\n<h3>Endnotes<\/h3>\n<ol>\n<li>CISA AA21-201A: <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-201a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-201a<\/a><\/li>\n<li>The White House Statement on PRC Malicious Cyber Activities: <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/07\/19\/the-united-states-joined-by-allies-and-partners-attributes-malicious-cyber-activity-and-irresponsible-state-behavior-to-the-peoples-republic-of-china\/\">https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/07\/19\/the-united-states-joined-by-allies-and-partners-attributes-malicious-cyber-activity-and-irresponsible-state-behavior-to-the-peoples-republic-of-china\/<\/a><\/li>\n<li>CISA AA21-200A: <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-200a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-200a<\/a><\/li>\n<li>CISA AA21-200B: <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-200b\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-200b<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>TLP: White 1. Executive Summary On 20 July, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) published a joint advisory AA21-201A on a Chinese state\u2013sponsored spear-phishing and intrusion campaign that targeted U.S. oil and natural gas (ONG) pipeline companies from 2011 to 2013.1 The advisory identified 23 U.S. natural [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":3148,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[332,333,307],"class_list":{"0":"post-6668","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-china","9":"tag-cyberattack","10":"tag-phishing","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Advisory: U.S. Oil Pipeline Intrusion<\/title>\n<meta name=\"description\" content=\"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion. On 20 July, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) published a joint advisory AA21-201A on a Chinese state\u2013sponsored spear-phishing and intrusion campaign that targeted U.S. oil and natural gas (ONG) pipeline companies from 2011 to 2013.1 The advisory identified 23 U.S. natural gas pipeline operators that were targeted during that time; out of those, 13 were confirmed compromised, 3 were not impacted, and 8 experienced an intrusion of unknown depth.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion\" \/>\n<meta property=\"og:description\" content=\"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion. On 20 July, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) published a joint advisory AA21-201A on a Chinese state\u2013sponsored spear-phishing and intrusion campaign that targeted U.S. oil and natural gas (ONG) pipeline companies from 2011 to 2013.1 The advisory identified 23 U.S. natural gas pipeline operators that were targeted during that time; out of those, 13 were confirmed compromised, 3 were not impacted, and 8 experienced an intrusion of unknown depth.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-22T18:30:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:20:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-threat-index.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-chinese-pipeline\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-chinese-pipeline\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion\",\"datePublished\":\"2021-07-22T18:30:27+00:00\",\"dateModified\":\"2024-04-26T20:20:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-chinese-pipeline\\\/\"},\"wordCount\":2187,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-chinese-pipeline\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-threat-index.jpg\",\"keywords\":[\"china\",\"Cyberattack\",\"Phishing\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-chinese-pipeline\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-chinese-pipeline\\\/\",\"name\":\"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-chinese-pipeline\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-chinese-pipeline\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-threat-index.jpg\",\"datePublished\":\"2021-07-22T18:30:27+00:00\",\"dateModified\":\"2024-04-26T20:20:30+00:00\",\"description\":\"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion. On 20 July, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) published a joint advisory AA21-201A on a Chinese state\u2013sponsored spear-phishing and intrusion campaign that targeted U.S. oil and natural gas (ONG) pipeline companies from 2011 to 2013.1 The advisory identified 23 U.S. natural gas pipeline operators that were targeted during that time; out of those, 13 were confirmed compromised, 3 were not impacted, and 8 experienced an intrusion of unknown depth.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-chinese-pipeline\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-chinese-pipeline\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-chinese-pipeline\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-threat-index.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-threat-index.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory-chinese-pipeline\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion","description":"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion. On 20 July, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) published a joint advisory AA21-201A on a Chinese state\u2013sponsored spear-phishing and intrusion campaign that targeted U.S. oil and natural gas (ONG) pipeline companies from 2011 to 2013.1 The advisory identified 23 U.S. natural gas pipeline operators that were targeted during that time; out of those, 13 were confirmed compromised, 3 were not impacted, and 8 experienced an intrusion of unknown depth.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion","og_description":"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion. On 20 July, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) published a joint advisory AA21-201A on a Chinese state\u2013sponsored spear-phishing and intrusion campaign that targeted U.S. oil and natural gas (ONG) pipeline companies from 2011 to 2013.1 The advisory identified 23 U.S. natural gas pipeline operators that were targeted during that time; out of those, 13 were confirmed compromised, 3 were not impacted, and 8 experienced an intrusion of unknown depth.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/","og_site_name":"Infoblox Blog","article_published_time":"2021-07-22T18:30:27+00:00","article_modified_time":"2024-04-26T20:20:30+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-threat-index.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion","datePublished":"2021-07-22T18:30:27+00:00","dateModified":"2024-04-26T20:20:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/"},"wordCount":2187,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-threat-index.jpg","keywords":["china","Cyberattack","Phishing"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/","name":"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-threat-index.jpg","datePublished":"2021-07-22T18:30:27+00:00","dateModified":"2024-04-26T20:20:30+00:00","description":"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion. On 20 July, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) published a joint advisory AA21-201A on a Chinese state\u2013sponsored spear-phishing and intrusion campaign that targeted U.S. oil and natural gas (ONG) pipeline companies from 2011 to 2013.1 The advisory identified 23 U.S. natural gas pipeline operators that were targeted during that time; out of those, 13 were confirmed compromised, 3 were not impacted, and 8 experienced an intrusion of unknown depth.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-threat-index.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-threat-index.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory-chinese-pipeline\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Advisory: U.S. Oil Pipeline Intrusion"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6668"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6668\/revisions"}],"predecessor-version":[{"id":6673,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6668\/revisions\/6673"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3148"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}