{"id":1066,"date":"2025-08-01T11:34:38","date_gmt":"2025-08-01T11:34:38","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=1066"},"modified":"2025-08-21T09:25:54","modified_gmt":"2025-08-21T09:25:54","slug":"ransomware-as-a-service","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/","title":{"rendered":"What is Ransomware-as-a-Service (RaaS)?"},"content":{"rendered":"<p><b>Ransomware-as-a-Service<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Ransomware attacks have evolved from one-off, opportunistic hacks into a mature criminal industry \u2014 and at the heart of this transformation is Ransomware-as-a-Service (RaaS). This underground business model has lowered the barrier to entry for cybercrime, enabling even non-technical criminals to launch sophisticated ransomware campaigns.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">RaaS kits allow affiliates lacking the skill or time to develop their own ransomware variant to be up and running quickly and affordably. They are easy to find on the dark web, where they are advertised in the same way that goods are advertised on the legitimate web.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A RaaS kit may include 24\/7 support, bundled offers, user reviews, forums and other features identical to those offered by legitimate SaaS providers. The price of RaaS kits ranges from $40 per month to several thousand dollars \u2013 trivial amounts, considering that the average ransom demand in 2024 was $2.73 million, according to Sophos. A threat actor doesn\u2019t need every attack to be successful in order to become rich.<\/span><\/p>\n<ol>\n<li><b> Subscription Model<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Affiliates pay a monthly or annual fee for access to the ransomware kit, infrastructure, and updates. Pricing can range from a few hundred to several thousand dollars per month, depending on features like stealth, speed, and encryption strength.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Example: A $500\/month subscription granting access to the latest ransomware build plus 24\/7 \u201csupport.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Advantage for criminals: Predictable, recurring income stream for the RaaS developers.<\/span><\/p>\n<ol start=\"2\">\n<li><b> Affiliate\/Profit-Sharing Model<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The most common RaaS structure. Affiliates use the ransomware for free or a small setup fee, then share a percentage of each ransom with the developers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Typical splits: 70\/30 or 80\/20 (affiliate gets the larger share).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Example: A $1 million ransom payment might yield $800k to the affiliate and $200k to the developer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Advantage: Low barrier to entry for affiliates, high earning potential for developers if affiliates succeed.<\/span><\/p>\n<ol start=\"3\">\n<li><b> One-Time License Fee<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Affiliates purchase the ransomware kit outright for a single payment. After that, they own and operate it without further revenue sharing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Example: A one-time $5,000 payment for a fully functional ransomware package.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Advantage: Instant, lump-sum income for developers \u2014 but no ongoing revenue unless they sell new versions later.<\/span><\/p>\n<ol start=\"4\">\n<li><b> Hybrid Model<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Combines aspects of the above models. Affiliates might pay a smaller monthly subscription plus a reduced profit-sharing percentage, or a partial upfront license fee with ongoing royalties.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Example: $200\/month subscription plus 20% of each ransom collected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Advantage: Developers get both steady income and a cut of big payouts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some RaaS platforms also run \u201cbug bounty\u201d\u2013style incentives for affiliates, rewarding them for finding better infection vectors or bypassing new security measures \u2014 another sign of how professionalized this criminal market has become.<\/span><\/p>\n<p><b>Ransomware as a Service (RaaS) Examples<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There is an abundance of ransomware as a service in circulation, and while cyber professionals are aware of and tracking many different groups, it\u2019s important to be on guard and prepared for anything.\u00a0<\/span><\/p>\n<p><b>LockBit<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This ransomware emerged in June 2021 and exploits SMB and PowerShell to spread malware through a compromised network. It claims to have the fastest market encryption and has compromised over 50 organizations across different industries.<\/span><\/p>\n<p><b>BlackCat<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Also known as ALPHV, BlackCat is coded in the Rust programming language and is easy to compile against different operating architectures. This ransomware is dangerous as it\u2019s highly customizable and easy to individualize.<\/span><\/p>\n<p><b>Hive<\/b><\/p>\n<p><span style=\"font-weight: 400;\">First observed in June 2021, the Hive RaaS group pressures victims to pay by releasing details of the attack on different leak sites and even social media, including the date and time of attacks and a countdown to information leaks.<\/span><\/p>\n<p><b>Dharma<\/b><\/p>\n<p><span style=\"font-weight: 400;\">First identified in 2016, Dharma targets victims through malware attachments in phishing emails. Several other ransomware groups have used Dharma as source code.<\/span><\/p>\n<h2><b>Defending Against Ransomware-as-a-Service<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Ransomware is especially insidious because there is no singular root cause for the attack. Ransomware itself refers to the malware that is injected to encrypt and possibly exfiltrate data, not the method used to do that. While there are common TTPs in ransomware every organisation should be aware of and monitor for, a major way to prevent ransomware attacks is to monitor for precursors.<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"> Conduct Basic File Backups.\u00a0<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">This small act can make a major difference if a ransomware attack occurs, as it defends against double extortion. According to <\/span><a href=\"https:\/\/arcticwolf.com\/resources\/blog-uk\/breaking-down-ransomware-as-a-service-raas\/\"><span style=\"font-weight: 400;\">Arctic Wolf<\/span><\/a><span style=\"font-weight: 400;\"> , in 68% of ransomware incidents, reliable backups aided in the recovery process \u2014 in many cases removing the need for a payout by providing an alternate path to sufficient recovery.<\/span><\/p>\n<ol start=\"2\">\n<li><span style=\"font-weight: 400;\"> Secure the Cloud<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Not only can the cloud offer initial access to threat actors, but as data storage and operational applications expand to the cloud, it\u2019s likely threat actors will find their way there. Understanding your responsibility in cloud security, as well as staying on top of misconfigurations, can go a long way in hardening this part of the attack surface.<\/span><\/p>\n<ol start=\"3\">\n<li><span style=\"font-weight: 400;\"> Enforce Identity and Access Controls<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Identity is an emerging battleground, and not only are credentials a growing root cause of initial access, but Remote Desktop Protocol (RDP) and compromised VPN credentials are the leading root causes of ransomware and intrusions.\u00a0<\/span><\/p>\n<ol start=\"4\">\n<li><span style=\"font-weight: 400;\"> Conduct Risk-Based Vulnerability Management<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">It\u2019s often known, unpatched vulnerabilities that allow threat actors to gain access to a network or system, and with the number of critical vulnerabilities continuing to increase year over year, continuous vulnerability management is no longer optional for organisations.<\/span><\/p>\n<ol start=\"5\">\n<li><span style=\"font-weight: 400;\"> Invest in 24\u00d77 Monitoring<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">There are two key components to preventing and stopping a ransomware attack \u2013 visibility into your environment and the ability to swiftly detect anomalies.\u00a0<\/span><\/p>\n<ol start=\"6\">\n<li><span style=\"font-weight: 400;\"> User Awareness and Training<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">MDR services often include training employees about ransomware risks and best practices to avoid falling victim to phishing and other social engineering techniques commonly used in ransomware campaigns. Phishing simulation training is one example of what an MDR provider can offer to strengthen your weakest link in RaaS attacks: your end users.<\/span><\/p>\n<h2><b>Monitoring Remote Sessions<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Security monitoring is crucial for preventing ransomware attacks as it enables early detection, identification of vulnerabilities, monitoring for anomalies, data protection, and compliance with regulatory requirements.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/\"><span style=\"font-weight: 400;\">RecordTS<\/span><\/a><span style=\"font-weight: 400;\"> will record Windows remote sessions reliably and securely for RDS, Citrix and VMware systems. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware-as-a-Service Ransomware attacks have evolved from one-off, opportunistic hacks into a mature criminal industry \u2014 and at the heart of this transformation is Ransomware-as-a-Service (RaaS). This underground business model has lowered the barrier to entry for cybercrime, enabling even non-technical criminals to launch sophisticated ransomware campaigns. RaaS kits allow affiliates lacking the skill or time [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1069,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1066","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Ransomware-as-a-Service (RaaS)? - Blogs<\/title>\n<meta name=\"description\" content=\"Ransomware attacks have evolved from one-off, opportunistic hacks into a mature criminal industry \u2014 and at the heart of this transformation is Ransomware-as-a-Service (RaaS). This underground business model has lowered the barrier to entry for cybercrime, enabling even non-technical criminals to launch sophisticated ransomware campaigns.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Ransomware-as-a-Service (RaaS)? - Blogs\" \/>\n<meta property=\"og:description\" content=\"Ransomware attacks have evolved from one-off, opportunistic hacks into a mature criminal industry \u2014 and at the heart of this transformation is Ransomware-as-a-Service (RaaS). This underground business model has lowered the barrier to entry for cybercrime, enabling even non-technical criminals to launch sophisticated ransomware campaigns.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-01T11:34:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-21T09:25:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/08\/ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1279\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/\",\"name\":\"What is Ransomware-as-a-Service (RaaS)? - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/08\/ransomware.jpg\",\"datePublished\":\"2025-08-01T11:34:38+00:00\",\"dateModified\":\"2025-08-21T09:25:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"Ransomware attacks have evolved from one-off, opportunistic hacks into a mature criminal industry \u2014 and at the heart of this transformation is Ransomware-as-a-Service (RaaS). This underground business model has lowered the barrier to entry for cybercrime, enabling even non-technical criminals to launch sophisticated ransomware campaigns.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/08\/ransomware.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/08\/ransomware.jpg\",\"width\":1279,\"height\":853,\"caption\":\"ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Ransomware-as-a-Service (RaaS)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Ransomware-as-a-Service (RaaS)? - Blogs","description":"Ransomware attacks have evolved from one-off, opportunistic hacks into a mature criminal industry \u2014 and at the heart of this transformation is Ransomware-as-a-Service (RaaS). This underground business model has lowered the barrier to entry for cybercrime, enabling even non-technical criminals to launch sophisticated ransomware campaigns.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/","og_locale":"en_US","og_type":"article","og_title":"What is Ransomware-as-a-Service (RaaS)? - Blogs","og_description":"Ransomware attacks have evolved from one-off, opportunistic hacks into a mature criminal industry \u2014 and at the heart of this transformation is Ransomware-as-a-Service (RaaS). This underground business model has lowered the barrier to entry for cybercrime, enabling even non-technical criminals to launch sophisticated ransomware campaigns.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2025-08-01T11:34:38+00:00","article_modified_time":"2025-08-21T09:25:54+00:00","og_image":[{"width":1279,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/08\/ransomware.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/","name":"What is Ransomware-as-a-Service (RaaS)? - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/08\/ransomware.jpg","datePublished":"2025-08-01T11:34:38+00:00","dateModified":"2025-08-21T09:25:54+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"Ransomware attacks have evolved from one-off, opportunistic hacks into a mature criminal industry \u2014 and at the heart of this transformation is Ransomware-as-a-Service (RaaS). This underground business model has lowered the barrier to entry for cybercrime, enabling even non-technical criminals to launch sophisticated ransomware campaigns.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/08\/ransomware.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2025\/08\/ransomware.jpg","width":1279,"height":853,"caption":"ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/ransomware-as-a-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"What is Ransomware-as-a-Service (RaaS)?"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/1066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=1066"}],"version-history":[{"count":3,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/1066\/revisions"}],"predecessor-version":[{"id":1070,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/1066\/revisions\/1070"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/1069"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=1066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=1066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=1066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}