{"id":5020,"date":"2020-05-19T16:39:41","date_gmt":"2020-05-19T15:39:41","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5020"},"modified":"2021-04-16T13:29:48","modified_gmt":"2021-04-16T12:29:48","slug":"email-attachment-threats-to-secure-your-systems-from","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from","title":{"rendered":"4 Email Attachment Threats to Secure Systems From"},"content":{"rendered":"<p>Malicious emails remain some of the most common and destructive computer security threats faced by businesses today. According to\u00a0<a class=\"ext\" href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/email-threat-hope\/\" target=\"_blank\" rel=\"noopener noreferrer\">research by Verizon<\/a>, email as a threat vector represents 96% of cyberattacks carried out across various industries. Cybercriminals use email-based attacks to steal login credentials, lure individuals into clicking malicious links, and deliver malware. Managed services providers (MSPs) have the dual role of protecting both their own employees and their customers from such attacks. To do so effectively, it is crucial that MSPs and their customers know the most common email attachment threats and employ robust\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/email-threat-protection\">email threat protection tools<\/a>\u00a0to help secure their customers\u2019 systems.<\/p>\n<h3><b>Email attachment risks for MSPs<\/b><\/h3>\n<p>As an MSP, you\u2019ve worked hard in the past to prevent or mitigate the consequences of malware\u2014but it\u2019s likely that many of your customers don\u2019t understand what malware entails. Explaining malware in layman&#8217;s terms to your customers can go a long way in helping illustrate the threat it poses.<\/p>\n<p><a href=\"https:\/\/www.n-able.com\/blog\/evasive-malware-enemy-you-cant-see\" target=\"_blank\" rel=\"noopener\">Malware<\/a>\u00a0is a generic term that refers to malicious software. This encompasses worms, spyware, computer viruses, or trojan horses. Malware is often delivered via email attachment as an executable file (with a .exe file extension) or even as what \u201cappears\u201d to be a harmless text file (with a .txt extension). Many malicious email attachments have hidden extensions designed to fool the recipient into downloading the file without thinking twice. Some malware can even be embedded in images, including PDF and JPEG files. These activate when they are opened and are likely to appear to be the same as any other harmless image or PDF document.<\/p>\n<p>What damage can malware actually do? As mentioned, malware is especially dangerous to MSPs. By deleting files from your hard drive, corrupting data, or even disabling your mobile devices or computer, malware has the ability to compromise your data as well as your customers\u2019. For example, certain malware will have specific functions, which might include writing code on your hard drive. This code could then be used to turn your machine into a zombie (which can be controlled by a hacker remotely), spy on your activities, or send confidential data to an external location.<\/p>\n<p>Imagine that malware successfully shares your customers\u2019 sensitive data with another party. If this happens, you and your customers could be made vulnerable to fraud, with banking information stolen and cash extracted from your account. There is also the risk of identity theft and credit card fraud. This is just one simple example of why failing to employ the appropriate email threat protection practices can leave you liable for some serious damages.<\/p>\n<h3><b>Email-based strategies used by cybercriminals<\/b><\/h3>\n<p>It\u2019s important to remember that email authors with malicious intentions are often clever. They continuously evolve their strategies to develop new ways of deceiving and attacking individuals and businesses alike. Although their strategies will vary, there are three basic approaches employed by most cybercriminals:<\/p>\n<h4>1. LINKS TO MALICIOUS WEBSITE PAGES:<\/h4>\n<p>These dangerous links are often featured directly in the body of the email. This type of threat accounts for a high number of data breaches, with\u00a0<a class=\"ext\" href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dark Reading<\/a>\u00a0summarizing the findings of a FireEye report that malicious URLs were even more common than email attachments in attacks, often using HTTPS links.<\/p>\n<h4>2. TRANSACTION ENTICEMENTS:<\/h4>\n<p>This approach involves cybercriminals using social engineering to convince their victims to transmit sensitive information or perform a financial transaction. This approach does not require links or attachments.<\/p>\n<h4>3. MALICIOUS ATTACHMENTS:<\/h4>\n<p>Cybercriminals will often send emails with malicious attachments. These attachments can install ransomware, keyloggers, and other malware on the victim\u2019s device when opened.<\/p>\n<p>These three strategies account for almost all forms of malicious emails employed by cybercriminals.<\/p>\n<h3><b>Top 4 email attachment threats<\/b><\/h3>\n<p>With malicious email attachments representing a lion\u2019s share of successful malware deliveries, it\u2019s important to examine the most common types of email attachment threats to understand how bad actors operate. Here are the top four email attachment threats that MSPs are likely to encounter.<\/p>\n<h4>1. RANSOMWARE<\/h4>\n<p>Ransomware encrypts a victim\u2019s data and demands or blackmails them into paying a fee to restore said data. Ransomware is delivered via email attachment and executed when the victim opens the attachment.<\/p>\n<h4>2. PHISHING<\/h4>\n<p>This tactic uses psychological and social manipulation to lure victims into divulging sensitive information that cybercriminals can then sell for malicious purposes. The message is designed to trick the recipient and the sender is designed to look authentic, making the victim believe that the email was sent by a trusted individual, or business. This baits them into opening infected attachments without thinking critically about what these attachments might include.<\/p>\n<h4>3. KEYLOGGERS<\/h4>\n<p>In severe data breaches, user credentials are almost always stolen. To pull this off, cybercriminals often use keyloggers to steal IDs and passwords. The keylogger can be stored in an email attachment and executed when opened, or when the victim clicks a malicious link. From there, the keylogger can record keys pressed on the user\u2019s keyboard to capture passwords and other relevant account details.<\/p>\n<h4>4. ZERO-DAY EXPLOITS<\/h4>\n<p>This type of attack targets zero-day vulnerabilities, which are security weaknesses unknown to the software developer. These are usually security vulnerabilities that are exploited before the vendor can fix them. Zero-day attacks are often delivered by email and are sometimes stored in attachments, giving hackers unauthorized access to sensitive information.<\/p>\n<h3><b>Choosing your MSP\u2019s email security tools<\/b><\/h3>\n<p>It is key that you take email threat protection,\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/email-business-continuity\">email continuity<\/a>, spam filtering, and practices for archiving into consideration when developing your\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/email-security?promo=blog\" target=\"_blank\" rel=\"noopener\">email services for customers<\/a>.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/?promo=blog\" target=\"_blank\" rel=\"noopener\">SolarWinds<sup>\u00ae<\/sup>\u00a0Mail Assure<\/a>\u00a0can help you address each of these email components while still helping ensure you\u2019re enabling continued productivity and minimal downtime for your customers. To combat modern threats with ease, many MSPs depend on Mail Assure to protect both their customers and businesses from email-based attacks.<\/p>\n<p>This tool delivers\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/spam-filtering\">advanced spam protection<\/a>\u00a0with proprietary inbound filtering technology that incorporates data from more than 23 million mailboxes to safeguard against new threats. With a filtering accuracy rate of 99.999%, you can rest assured that your customers are able to conduct normal business via email without fear of malicious attachments.<\/p>\n<p>Mail Assure also includes an\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/microsoft-365\" target=\"_blank\" rel=\"noopener\">easy-to-install Microsoft 365 add-in<\/a>, which gives you seamless integration as well as offering users greater transparency and control over their email. Additionally, a new Sync for Microsoft 365 simplifies onboarding of your Microsoft 365 customers. If you are looking for protection against viruses, malware, spam, ransomware, phishing attacks, and other email-based threats, Mail Assure comes highly recommended. A\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/\">30-day free trial<\/a>\u00a0is available if you\u2019re interested in learning more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read about the risks associated with mailbox email attachments and how the right email threat protection tool can help keep your MSP customers\u2019 data safe.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5020","post","type-post","status-publish","format-standard","hentry","topic-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>4 Email Attachment Threats to Secure Systems From - N-able<\/title>\n<meta name=\"description\" content=\"Read about the risks associated with mailbox email attachments and how the right email threat protection tool can help keep your MSP customers\u2019 data safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Email Attachment Threats to Secure Systems From - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about the risks associated with mailbox email attachments and how the right email threat protection tool can help keep your MSP customers\u2019 data safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-19T15:39:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-16T12:29:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"4 Email Attachment Threats to Secure Systems From\",\"datePublished\":\"2020-05-19T16:39:41+01:00\",\"dateModified\":\"2021-04-16T12:29:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from\"},\"wordCount\":1093,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Mail\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from\",\"name\":\"4 Email Attachment Threats to Secure Systems From - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2020-05-19T16:39:41+01:00\",\"dateModified\":\"2021-04-16T12:29:48+00:00\",\"description\":\"Read about the risks associated with mailbox email attachments and how the right email threat protection tool can help keep your MSP customers\u2019 data safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mail\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/mail\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Email Attachment Threats to Secure Systems From\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"4 Email Attachment Threats to Secure Systems From - N-able","description":"Read about the risks associated with mailbox email attachments and how the right email threat protection tool can help keep your MSP customers\u2019 data safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from","og_locale":"pt_BR","og_type":"article","og_title":"4 Email Attachment Threats to Secure Systems From - N-able","og_description":"Read about the risks associated with mailbox email attachments and how the right email threat protection tool can help keep your MSP customers\u2019 data safe.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-05-19T15:39:41+00:00","article_modified_time":"2021-04-16T12:29:48+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"4 Email Attachment Threats to Secure Systems From","datePublished":"2020-05-19T16:39:41+01:00","dateModified":"2021-04-16T12:29:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from"},"wordCount":1093,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Mail"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from","url":"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from","name":"4 Email Attachment Threats to Secure Systems From - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2020-05-19T16:39:41+01:00","dateModified":"2021-04-16T12:29:48+00:00","description":"Read about the risks associated with mailbox email attachments and how the right email threat protection tool can help keep your MSP customers\u2019 data safe.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/email-attachment-threats-to-secure-your-systems-from#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mail","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/mail"},{"@type":"ListItem","position":2,"name":"4 Email Attachment Threats to Secure Systems From"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/5020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=5020"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/5020\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=5020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}