{"id":41537,"date":"2019-12-30T15:00:27","date_gmt":"2019-12-30T15:00:27","guid":{"rendered":"https:\/\/www.n-able.com\/?p=41537"},"modified":"2023-03-22T08:55:17","modified_gmt":"2023-03-22T08:55:17","slug":"what-is-an-ato-attack","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack","title":{"rendered":"What is an ATO Attack?"},"content":{"rendered":"<p class=\"p4\"><span class=\"s1\">Account takeover (ATO) attacks are on the rise, leaving individuals and businesses at risk for financial loss and reputational damage. These attacks involve breaches of login credentials\u2014typically for online accounts or cloud platforms. For instance, at the individual level, ATO attacks on personal accounts may result in end users realizing a hacker has compromised their bank or Amazon account. However, ATO attacks in a business setting are potentially more devastating in scope.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Given the possibility of serious consequences following ATO attacks, managed services providers (MSPs) should understand how password security relates to ATO attacks in order to help their customers avoid falling victim to fraudulent activity.<\/span><\/p>\n<h2 class=\"p6\"><span class=\"s1\">What Is an Account Takeover Attack?<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">Account takeover attacks are essentially a form of identity theft. Identify theft involves stealing and utilizing personally identifiable identification (PII) like a driver\u2019s license number or Social Security number to pose as someone else. An ATO attack is a form of identity theft in which the hacker uses stolen PII to gain access to an online account, such as an e-commerce, bank, or email account.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">This type of account takeover is hard to detect and usually leads to fraudulent transactions on the stolen account. An ATO attack can result in expenses or other damages for the person whose sensitive information was stolen. Hackers may use compromised accounts to transfer money, make purchases, or lift data to use for other purposes. If this happens in a business context, it can impact productivity and company security. ATO attacks can easily damage company reputation\u2014especially if a breach is widespread.<\/span><\/p>\n<h2 class=\"p6\"><span class=\"s1\">What Are the Steps of an ATO Attack?<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">An ATO attack typically includes the following steps:<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li4\"><b><\/b><span class=\"s1\"><b>Data Breach:\u00a0<\/b>A data breach may occur due to vulnerabilities in a system, network, or website. During the breach, hackers may gain access to information like usernames, emails, passwords, or account security questions and answers.<\/span><\/li>\n<\/ul>\n<ul class=\"ul1\">\n<li class=\"li4\"><b><\/b><span class=\"s1\"><b>Credential Cracking:\u00a0<\/b>Credential cracking or stuffing is the process by which perpetrators attempt to discover and use complete login credentials, typically through automated bots. Hackers might guess passwords, use a word list method, or just utilize brute force through bots. These actions may result in a sudden uptick in invalid login attempts\u2014a potential sign that hackers are attempting to access an account.<\/span><\/li>\n<\/ul>\n<ul class=\"ul1\">\n<li class=\"li4\"><b><\/b><span class=\"s1\"><b>Financial Transaction:\u00a0<\/b>Hackers who steal usernames and passwords might not actually use them for an ATO attack\u2014they may instead sell this sensitive data on the dark web for more specialized ATO hackers to purchase and utilize.<\/span><\/li>\n<\/ul>\n<ul class=\"ul1\">\n<li class=\"li4\"><b><\/b><span class=\"s1\"><b>Fraudulent Account Usage:\u00a0<\/b>When a hacker does decide to perform fraudulent actions on an account, those actions may take several forms. For instance, the bad actor may steal further sensitive data, like addresses. They might steal funds outright. For e-commerce sites, they may take advantage of a user\u2019s credit or rewards. If they access your email, they may use your account to send out spam or phishing emails. In many of these cases, the damage goes undetected until well after the fact.<\/span><\/li>\n<\/ul>\n<h2 class=\"p6\"><span class=\"s1\">Is My Password Secure from ATO Attacks?<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">Many victims of identity theft may not even be aware their data has been stolen. Your username, email, or password may already have been part of a data breach. While there are\u00a0<a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">online tools<\/span><\/a>\u00a0available that help you check whether your information exists on the dark web, the best defense against ATO attacks is smart prevention.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">There are a few security and <a href=\"https:\/\/www.n-able.com\/blog\/password-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">password best practices<\/span><\/a> that end users and companies alike should consider for preventing an ATO attack. These precautions help ensure customer information is as protected as possible.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><i>Set Password Requirements:<\/i>\u00a0You don\u2019t necessarily need to use a strong password generator, but companies should require strong passwords, as outlined by the latest guidelines from the<\/span><span class=\"s3\"> <a href=\"https:\/\/www.n-able.com\/blog\/nist-password-standards2\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">National Institute of Standards and Technology (NIST)<\/span><\/a><\/span><span class=\"s1\">. These password requirements include:\u00a0\u00a0<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li4\"><span class=\"s1\">Require at least eight characters, but not necessarily any special characters.<\/span><\/li>\n<li class=\"li4\"><span class=\"s1\">Restrict sequences or repetitions.<\/span><\/li>\n<li class=\"li4\"><span class=\"s1\">Avoid context-specific words and common passwords.<\/span><\/li>\n<li class=\"li4\"><span class=\"s1\">Remember\u2014there isn\u2019t necessarily a need to utilize a mix of upper and lower case letters plus special characters.<\/span><\/li>\n<li class=\"li4\"><span class=\"s1\">Importantly, require screening of new passwords against lists of compromised passwords.<\/span><\/li>\n<\/ul>\n<p class=\"p4\"><span class=\"s1\"><i>Consider Strong Password Examples:<\/i>\u00a0For end users, it may help to see strong password ideas that illustrate some of the above principles. For instance, avoid using only English words or word patterns, like \u201cILoveCats.\u201d Bots can test \u201cdictionary\u201d words very quickly\u2014especially commonly used words, like \u201cpassword.\u201d However, it can be useful to include numbers or add additional words for a higher character count.<b>\u00a0<\/b><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><i>Apply Updates:\u00a0<\/i>A failure to update and patch software or websites can lead to vulnerabilities hackers are eager to exploit. Make sure to update antivirus software as well.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><i>Use Multi-Factor Solutions:\u00a0<\/i>A two-factor or multi-factor authentication solution\u2014which may require an email or text confirmation to confirm a user\u2019s identity\u2014is more secure than a traditional login.\u00a0\u00a0<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><i>Set Security Rules:\u00a0<\/i>Certain security rules and measures can help protect against hackers. Try only allowing a fixed number of login attempts, permanently blocking IP addresses that are known to be malicious, and ensuring sufficient firewall protection. A tool like CAPTCHA can help prevent against automatic bot logins.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><i>Implement a Password Management Tool:<\/i>\u00a0<a href=\"https:\/\/www.n-able.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">Using a password management tool<\/span><\/a>\u00a0is an excellent way to ensure a high level of security. A password tool can support authentication features, quick password reset capabilities, auditing, and credential injection (the process of applying credentials without revealing the plaintext).<\/span><\/p>\n<h2 class=\"p6\"><span class=\"s1\">Implementing Password Protection<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">If you\u2019re an MSP looking to offer password protection to your customers, start with N&#8209;able<\/span><span class=\"s5\"><sup>\u00ae<\/sup><\/span><span class=\"s1\">\u00a0Passportal.\u00a0Passportal is built for MSPs\u00a0who want to provide their customers with password management that adheres to best practices and compliance requirements.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">With Passportal, MSPs can easily set password requirements and ensure customers are able to change their passwords quickly in the event of an ATO attack. The tool also offers an automatic strong password generator to help protect against credential hacking and prevent ATO attacks. If you\u2019re looking for a way to protect clients against all too common account takeovers, start with a demo of\u00a0<a href=\"https:\/\/www.n-able.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">N&#8209;able Passportal<\/span><\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With ATO attacks on the rise, this blog will help MSPs understand how password security can help their customers avoid falling victim to them.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-41537","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is an ATO Attack? - N-able<\/title>\n<meta name=\"description\" content=\"With ATO attacks on the rise, this blog will help MSPs understand how password security can help their customers avoid falling victim to them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is an ATO Attack? - N-able\" \/>\n<meta property=\"og:description\" content=\"With ATO attacks on the rise, this blog will help MSPs understand how password security can help their customers avoid falling victim to them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-30T15:00:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T08:55:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/12\/Blog-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/12\/Blog-5.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"What is an ATO Attack?\",\"datePublished\":\"2019-12-30T15:00:27+00:00\",\"dateModified\":\"2023-03-22T08:55:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack\"},\"wordCount\":1011,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack\",\"name\":\"What is an ATO Attack? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2019-12-30T15:00:27+00:00\",\"dateModified\":\"2023-03-22T08:55:17+00:00\",\"description\":\"With ATO attacks on the rise, this blog will help MSPs understand how password security can help their customers avoid falling victim to them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is an ATO Attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is an ATO Attack? - N-able","description":"With ATO attacks on the rise, this blog will help MSPs understand how password security can help their customers avoid falling victim to them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack","og_locale":"es_ES","og_type":"article","og_title":"What is an ATO Attack? - N-able","og_description":"With ATO attacks on the rise, this blog will help MSPs understand how password security can help their customers avoid falling victim to them.","og_url":"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-12-30T15:00:27+00:00","article_modified_time":"2023-03-22T08:55:17+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/12\/Blog-5.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/12\/Blog-5.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"What is an ATO Attack?","datePublished":"2019-12-30T15:00:27+00:00","dateModified":"2023-03-22T08:55:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack"},"wordCount":1011,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack","url":"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack","name":"What is an ATO Attack? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2019-12-30T15:00:27+00:00","dateModified":"2023-03-22T08:55:17+00:00","description":"With ATO attacks on the rise, this blog will help MSPs understand how password security can help their customers avoid falling victim to them.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/what-is-an-ato-attack#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"What is an ATO Attack?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/41537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=41537"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/41537\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=41537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}