{"id":6308,"date":"2020-05-28T21:00:49","date_gmt":"2020-05-28T20:00:49","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6308"},"modified":"2021-04-09T21:09:33","modified_gmt":"2021-04-09T20:09:33","slug":"email-security-education-avoiding-ransomware","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware","title":{"rendered":"Email Security Education: Avoiding Ransomware"},"content":{"rendered":"<p><em>Please note: For privacy reasons, the identity of the hacked accounts in the examples used for this blog have been changed or hidden.<\/em><\/p>\n<p>In last month\u2019s email security education\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/email-security-education-cybercriminals-capitalizing-coronavirus-and-work-home-measures\" target=\"_blank\" rel=\"noopener\">blog<\/a>, we highlighted the impact of COVID-19 on the current threat landscape and how threat actors are taking advantage of users working from home who want to know more about the virus. Though this trend continues to rise, these are not the only campaigns you should be wary of. The SolarWinds<sup>\u00ae<\/sup>\u00a0Mail Assure threat intelligence team continues to observe the latest malicious campaigns threat actors use to exploit user vulnerability.<\/p>\n<p>These attacks include malware, ransomware, spoofing, and display name spoofing. Cybercriminals often use email as a delivery mechanism for malicious cyberattacks like these. All it takes is one click on a malicious link to download ransomware, illicit cryptomining software, or spyware onto an endpoint. An attack could then propagate out to other machines. From there, it could potentially take down the entire network and damage a company\u2019s reputation in the process.<\/p>\n<p>MSPs are key targets for ransomware attacks as they provide threat actors with a route to access all their clients. In fact, last year saw\u00a0<a class=\"ext\" href=\"https:\/\/www.msspalert.com\/cybersecurity-breaches-and-attacks\/ransomware\/msp-pays-150000-to-recover-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">an MSP pay $150,000<\/a>\u00a0in bitcoin for a\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/email-recovery-software\">ransomware recovery<\/a>. In today\u2019s blog, we will look at ransomware attacks on email.<\/p>\n<h3><b>So, what is ransomware and what does it look like today? \u00a0<\/b><\/h3>\n<p>Ransomware dates to the 1980s and, although it has evolved in sophistication, the main goal for cybercriminals is still the same: financial gain. Ransomware is a form of malware where threat actors lock a computer, system, or personal files, and then demand a ransom payment to allow the users to gain access to their files. Cybercriminals will often threaten to delete these files or, in the case of bigger companies, publish sensitive information.<\/p>\n<p>Cybercriminals launch ransomware in several ways, including:<\/p>\n<h4><strong>PHISHING LINKS<\/strong><\/h4>\n<p>It\u2019s easy enough for cybercriminals to create convincing-looking fake messages with phishing emails. A popular method to launch ransomware involves using malicious links in phishing emails to take the user to a malicious site.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%202.jpg\" alt=\"\" width=\"850\" height=\"355\" data-entity-type=\"\" data-entity-uuid=\"\" \/><\/p>\n<p>&nbsp;<\/p>\n<h4><strong>LINKS IN ATTACHMENTS<\/strong><\/h4>\n<p>A common phishing scam threat actors use involves including fake attachments in email. The phishing email directs the user to open an attachment to retrieve an invoice for example. The invoice itself includes a malicious link that leads to a phishing page that asks the user to enter the user\u2019s credentials.<\/p>\n<h4><strong>FAKE ATTACHMENTS<\/strong><\/h4>\n<p>These scams typically use PDF, Word, or Excel attachments that claim to be important. When the user clicks on the attachment it opens a phishing web page. In other cases, clicking on the attachment automatically starts a ransomware download or the victim enables macros in the document that triggers a download.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%203.jpg\" alt=\"\" width=\"850\" height=\"506\" data-entity-type=\"\" data-entity-uuid=\"\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>While some ransomware is easy for knowledgeable users to reverse, some forms of malware use advanced techniques such as cryptoviral extortion. This type of extortion encrypts a victim\u2019s files and demands a ransom payment to decrypt the files and make them accessible again. When properly implemented by threat actors, recovering files from a cryptoviral extortion attack without the decryption key is a major problem. Today, cybercriminals request payment through cryptocurrencies or credit card payments. This helps cybercriminals maintain a level of anonymity. The blockchain in cryptocurrency uses hashes of public keys instead of individuals\u2019 names to keep track of ownership. Blockchain is basically the name used for a cryptocurrency\u2019s public ledger. The example below shows how the threat actor claims to have hacked a victim\u2019s website. It\u2019s evident this is coming from cybercriminals, what\u2019s not evident is if their claims are true. Industry experts advise the public not to directly act on emails like this one.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%204.png\" alt=\"\" width=\"850\" height=\"520\" data-entity-type=\"\" data-entity-uuid=\"\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Bitcoin became popular when Cryptolocker appeared in 2013\u2014and has since become a preferred payment method for ransomware operators. The\u00a0<a class=\"ext\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-says-140-million-paid-to-ransomware-offers-defense-tips\/\" target=\"_blank\" rel=\"noopener noreferrer\">FBI states that over $140 million<\/a>\u00a0has been paid to ransomware over the past six years using bitcoin wallets. This shows these campaigns are effective for cybercriminals.<\/p>\n<p><b>Some of the top recent ransomware email subject lines include:<\/b><\/p>\n<ul>\n<li>Subject: H\u00a1gh level of r\u00a1sk. Your account has been hacked. Change y\u00f8ur passw\u00f8rd.<\/li>\n<li>Subject: ***SPAM*** I GOT EVERYTHING!<\/li>\n<li>Subject: RE: Take Notice Your Device Was Infected!!!<\/li>\n<li>Subject: At Your Notice\u00a0john.smith@example.com<\/li>\n<li>Subject: Mail delivery failed<\/li>\n<li>Subject: Delivery Status Notification (Failure)<\/li>\n<\/ul>\n<p>Email continues to be a vulnerability.\u00a0 The fear of losing sensitive information or of making personal photos or videos public makes users vulnerable. To prevent email attacks, it helps to add multiple layers of protection to your email infrastructure. An email gateway designed for security can help reduce spam levels, catch phishing, and prevent malware, ransomware, and other email-borne threats.<\/p>\n<p>While an\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/email-security\" target=\"_blank\" rel=\"noopener\">email security solution<\/a>\u00a0is essential, teaching users to be on guard against potential threats also makes a major difference. Make sure to hold regular security trainings with your customers to emphasize what to look for in a potentially malicious email.<\/p>\n<p>If you\u2019d like to learn more about how you can protect your email from ransomware and other email-borne threats, please\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/contact?promo=blog\" target=\"_blank\" rel=\"noopener\">contact us<\/a>.<\/p>\n<p><em>Mia Thompson is product marketing manager, Mail Assure, at SolarWinds MSP.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check the latest malicious campaigns threat actors are using to exploit user vulnerability in the form of malware, ransomware, and spoofing.<\/p>\n","protected":false},"author":47,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6308","post","type-post","status-publish","format-standard","hentry","topic-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Email Security Education: Avoiding Ransomware - N-able<\/title>\n<meta name=\"description\" content=\"Check the latest malicious campaigns threat actors are using to exploit user vulnerability in the form of malware, ransomware, and spoofing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email Security Education: Avoiding Ransomware - N-able\" \/>\n<meta property=\"og:description\" content=\"Check the latest malicious campaigns threat actors are using to exploit user vulnerability in the form of malware, ransomware, and spoofing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-28T20:00:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-09T20:09:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%202.jpg\" \/>\n<meta name=\"author\" content=\"Mia Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mia Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware\"},\"author\":{\"name\":\"Mia Thompson\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce\"},\"headline\":\"Email Security Education: Avoiding Ransomware\",\"datePublished\":\"2020-05-28T21:00:49+01:00\",\"dateModified\":\"2021-04-09T20:09:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware\"},\"wordCount\":864,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%202.jpg\",\"articleSection\":[\"Mail\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware\",\"name\":\"Email Security Education: Avoiding Ransomware - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%202.jpg\",\"datePublished\":\"2020-05-28T21:00:49+01:00\",\"dateModified\":\"2021-04-09T20:09:33+00:00\",\"description\":\"Check the latest malicious campaigns threat actors are using to exploit user vulnerability in the form of malware, ransomware, and spoofing.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%202.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%202.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mail\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/mail\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email Security Education: Avoiding Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce\",\"name\":\"Mia Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"caption\":\"Mia Thompson\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Email Security Education: Avoiding Ransomware - N-able","description":"Check the latest malicious campaigns threat actors are using to exploit user vulnerability in the form of malware, ransomware, and spoofing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware","og_locale":"fr_FR","og_type":"article","og_title":"Email Security Education: Avoiding Ransomware - N-able","og_description":"Check the latest malicious campaigns threat actors are using to exploit user vulnerability in the form of malware, ransomware, and spoofing.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-05-28T20:00:49+00:00","article_modified_time":"2021-04-09T20:09:33+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%202.jpg","type":"","width":"","height":""}],"author":"Mia Thompson","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Mia Thompson","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware"},"author":{"name":"Mia Thompson","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce"},"headline":"Email Security Education: Avoiding Ransomware","datePublished":"2020-05-28T21:00:49+01:00","dateModified":"2021-04-09T20:09:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware"},"wordCount":864,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"image":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%202.jpg","articleSection":["Mail"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware","url":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware","name":"Email Security Education: Avoiding Ransomware - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%202.jpg","datePublished":"2020-05-28T21:00:49+01:00","dateModified":"2021-04-09T20:09:33+00:00","description":"Check the latest malicious campaigns threat actors are using to exploit user vulnerability in the form of malware, ransomware, and spoofing.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%202.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2020\/05\/Screenshot%202.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/email-security-education-avoiding-ransomware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mail","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/mail"},{"@type":"ListItem","position":2,"name":"Email Security Education: Avoiding Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce","name":"Mia Thompson","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","caption":"Mia Thompson"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=6308"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6308\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=6308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}