{"id":18888,"date":"2020-04-07T11:55:56","date_gmt":"2020-04-07T11:55:56","guid":{"rendered":"https:\/\/saga.rs\/cybercrime-and-covid-19\/"},"modified":"2025-09-25T08:13:51","modified_gmt":"2025-09-25T08:13:51","slug":"cybercrime-and-covid-19","status":"publish","type":"post","link":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/","title":{"rendered":"Cybercrime and Covid-19"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_single_image image=&#8221;9180&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_column_text]With the appearance of the SARS-COV2 virus, which causes Covid-19 disease, many work activities have been forced to transfer online. We spend significantly more time on computers, mobile devices using the Internet first for business purposes, but also communication, shopping, and to inform on all relevant topics. Given all these activities, we also need to take certain actions to best protect our computers, especially when we are connected to a company network.<\/p>\n<p>As Covid-19 is currently the number one topic in the world, hackers are making extensive use of the situation, leading to a significant increase in cybercrime. Many hackers use the Covid-19 situation to get users to install a variety of malicious software, all to retrieve sensitive user data, passwords, monitoring user activity on the system and the like.<\/p>\n<p>We have gathered information from several sources, how hackers are most likely to act and what are the cybercrime activities that we need to pay attention to.<\/p>\n<p>The name Covid-19 is especially used for Spam, Malware files and Malicious domains.<\/p>\n<p><em><a href=\"https:\/\/www.riskiq.com\/blog\/analyst\/covid19-cybercrime-update\/\">RiskIQ<\/a>\u00a0analyzed the spam box feed for the period March 30<sup>th<\/sup>\u2013 March 31<sup>st<\/sup>\u00a02020. During this period, 217.169 spam emails containing either \u201ccorona\u201d or \u201ccovid\u201d in the subject line were analyzed.\u00a0<\/em>[\/vc_column_text][vc_single_image image=&#8221;9182&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/coronavirus-used-in-spam-malware-file-names-and-malicious-domains\">Map of threaths using COVID-19<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]There are different ways that hackers use to put their actions into action, just some of them are:<\/p>\n<p><strong>Phishing campaigns<\/strong>\u00a0and malware distribution by seemingly genuine websites or documents that provide information or advice on COVID-19 are used to infect computers and download user credentials. (<a href=\"https:\/\/www.coe.int\/en\/web\/cybercrime\/-\/cybercrime-and-covid-19\">SOURCE<\/a>)<\/p>\n<p><strong>Spam\u00a0\u2013\u00a0<\/strong>Special attention should be paid to the emails we receive from a variety of sources, as hackers most commonly use this type of attack on a user\u2019s computer, using the name Covid-19 to induce the user to open mail or download a brochure from the mail.[\/vc_column_text][vc_single_image image=&#8221;9183&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/coronavirus-used-in-spam-malware-file-names-and-malicious-domains\">Early COVID-19 related malicious email<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p><strong>Malicious websites<\/strong>\u00a0\u2013 Also, hackers use and market a variety of malicious websites that users will recklessly click and compromise their computer to inform. Through botnet, threat actors can launch DDoS attacks, download files from your computer, execute scripts, capture screenshots, steal bitcoin wallets, and collect browser cookies and passwords.<\/p>\n<p>Examples of such sites are the antivirus-covid19 [.]site and corona-antivirus [.]com, which promote an application that supposedly protects the user from the Covid-19 virus, whereby when a user installs the application, his system attacks BlackNET Rat malware. (<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/coronavirus-used-in-spam-malware-file-names-and-malicious-domains\">SOURCE<\/a>)<\/p>\n<p><strong>Ransomware\u00a0<\/strong>\u2013 The attack that was alleged to have caused the ransomware has hit the University Hospital Brno in the Czech Republic, a test center for COVID-19. The hospital\u2019s computer systems were shut down due to an attack, delaying the release of COVID-19 test results. (<a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/how-criminals-profit-covid-19-pandemic\">SOURCE<\/a>)<\/p>\n<p><strong>Fraud\u00a0<\/strong>\u2013 placement of the products that are necessary for the event of a pandemic, such as masks, disinfectants or other medical preparations, without ever physically getting the products ordered, all to raise money for customers. (<a href=\"https:\/\/www.coe.int\/en\/web\/cybercrime\/-\/cybercrime-and-covid-19\">SOURCE<\/a>)<\/p>\n<p><strong>Placing false information<\/strong>\u00a0is also a form of cybercrime aimed at creating panic in people. (<a href=\"https:\/\/www.coe.int\/en\/web\/cybercrime\/-\/cybercrime-and-covid-19\">SOURCE<\/a>)<\/p>\n<\/div>\n<p><\/div>\n<p>[\/vc_column_text][vc_single_image image=&#8221;9184&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/coronavirus-used-in-spam-malware-file-names-and-malicious-domains\">Types of malicious URLs<\/a><\/p>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>Some of\u00a0<a href=\"https:\/\/www.nokia.com\/blog\/cyber-criminals-are-exploiting-peoples-fears-covid-19-we-analyze-threats\/\">examples of malware<\/a>\u00a0are:<\/p>\n<ul>\n<li><strong>\u201cCorona Virus\u201d Trojan<\/strong>\u00a0\u2013 targeting Windows, this Trojan mimics a real map of the global locations of COVID-19 infections to trick users into downloading the malware which then steals user credentials and other personal data<\/li>\n<li><strong>CovidLock Android Ransomware\u00a0<\/strong>\u2013 an Android app that pretends to give users a way to find nearby COVID-19 patients and track the virus\u2019s spread across the world. Installing the app locks the device and asks the user to pay $250 in ransom in bitcoins<\/li>\n<li><strong>Corona Safety Mask SMS Scam<\/strong>\u00a0\u2013 pretending to be an app that help users find safety masks, this info-stealer obtains contacts and SMS messages then sends fraudulent messages to the victim\u2019s contacts.<\/li>\n<\/ul>\n<p><strong>Cybercrime protection measures:<\/strong><\/p>\n<p>(Adapted from\u00a0<a href=\"https:\/\/www.telenor.com\/cybercriminals-love-covid-19-heres-how-to-stay-cyber-secure\/\">source<\/a>)<\/p>\n<ol>\n<li>Be careful with the emails and files you receive from unknown senders, especially if they offer you special offers or discounts<\/li>\n<li>Be careful with links in emails as well as files that come to you from unknown sources<\/li>\n<li>Order products online from proven sources<\/li>\n<li>You should only search for information on Covid-19 on verified and official sites intended for this purpose<\/li>\n<li>Do not divulge your data such as your username, password, or your credit card information, as official institutions will never ask you to do so, especially not by e-mail.<\/li>\n<li>Provide adequate tools to protect against various cyber attacks (<strong><a href=\"http:\/\/nixa3.na.rs\/cybersecurity\/?lang=en\">http:\/\/nixa3.na.rs\/cybersecurity\/?lang=en<\/a><\/strong>)<\/li>\n<\/ol>\n<\/div>\n<p><\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>With the appearance of the SARS-COV2 virus, which causes Covid-19 disease, many work activities have been forced to transfer online. <\/p>\n","protected":false},"author":3,"featured_media":18890,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[107],"tags":[],"class_list":{"0":"post-18888","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog-en"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybercrime and Covid-19 - Saga<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime and Covid-19 - Saga\" \/>\n<meta property=\"og:description\" content=\"With the appearance of the SARS-COV2 virus, which causes Covid-19 disease, many work activities have been forced to transfer online.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/\" \/>\n<meta property=\"og:site_name\" content=\"Saga\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-07T11:55:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-25T08:13:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/corona_hacker1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1314\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/person\/507df87840a659428c02cace53b5101d\"},\"headline\":\"Cybercrime and Covid-19\",\"datePublished\":\"2020-04-07T11:55:56+00:00\",\"dateModified\":\"2025-09-25T08:13:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/\"},\"wordCount\":815,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/saga.rs\/#organization\"},\"image\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/corona_hacker1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/\",\"url\":\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/\",\"name\":\"Cybercrime and Covid-19 - Saga\",\"isPartOf\":{\"@id\":\"https:\/\/saga.rs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/corona_hacker1.jpg\",\"datePublished\":\"2020-04-07T11:55:56+00:00\",\"dateModified\":\"2025-09-25T08:13:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#primaryimage\",\"url\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/corona_hacker1.jpg\",\"contentUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/corona_hacker1.jpg\",\"width\":1920,\"height\":1314},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/saga.rs\/en\/sample-page-2\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime and Covid-19\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/saga.rs\/#website\",\"url\":\"https:\/\/saga.rs\/\",\"name\":\"Saga\",\"description\":\"A Noventiq Company\",\"publisher\":{\"@id\":\"https:\/\/saga.rs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/saga.rs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/saga.rs\/#organization\",\"name\":\"Saga A Noventiq Company\",\"url\":\"https:\/\/saga.rs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png\",\"contentUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png\",\"width\":1596,\"height\":450,\"caption\":\"Saga A Noventiq Company\"},\"image\":{\"@id\":\"https:\/\/saga.rs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS\",\"https:\/\/www.linkedin.com\/company\/saga-bg\/?originalSubdomain=rs\",\"https:\/\/www.instagram.com\/saga_beograd\/\",\"https:\/\/www.youtube.com\/@SagaBeograd\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/person\/507df87840a659428c02cace53b5101d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1388227c1ea26b656181327f2d9dabd6c4a87e2600d3de1944201aef29a8ed9c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1388227c1ea26b656181327f2d9dabd6c4a87e2600d3de1944201aef29a8ed9c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/saga.rs\/en\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime and Covid-19 - Saga","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrime and Covid-19 - Saga","og_description":"With the appearance of the SARS-COV2 virus, which causes Covid-19 disease, many work activities have been forced to transfer online.","og_url":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/","og_site_name":"Saga","article_publisher":"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS","article_published_time":"2020-04-07T11:55:56+00:00","article_modified_time":"2025-09-25T08:13:51+00:00","og_image":[{"width":1920,"height":1314,"url":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/corona_hacker1.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#article","isPartOf":{"@id":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/"},"author":{"name":"admin","@id":"https:\/\/saga.rs\/#\/schema\/person\/507df87840a659428c02cace53b5101d"},"headline":"Cybercrime and Covid-19","datePublished":"2020-04-07T11:55:56+00:00","dateModified":"2025-09-25T08:13:51+00:00","mainEntityOfPage":{"@id":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/"},"wordCount":815,"commentCount":0,"publisher":{"@id":"https:\/\/saga.rs\/#organization"},"image":{"@id":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#primaryimage"},"thumbnailUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/corona_hacker1.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/","url":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/","name":"Cybercrime and Covid-19 - Saga","isPartOf":{"@id":"https:\/\/saga.rs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#primaryimage"},"image":{"@id":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#primaryimage"},"thumbnailUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/corona_hacker1.jpg","datePublished":"2020-04-07T11:55:56+00:00","dateModified":"2025-09-25T08:13:51+00:00","breadcrumb":{"@id":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#primaryimage","url":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/corona_hacker1.jpg","contentUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/corona_hacker1.jpg","width":1920,"height":1314},{"@type":"BreadcrumbList","@id":"https:\/\/saga.rs\/en\/blog-en\/cybercrime-and-covid-19\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/saga.rs\/en\/sample-page-2\/"},{"@type":"ListItem","position":2,"name":"Cybercrime and Covid-19"}]},{"@type":"WebSite","@id":"https:\/\/saga.rs\/#website","url":"https:\/\/saga.rs\/","name":"Saga","description":"A Noventiq Company","publisher":{"@id":"https:\/\/saga.rs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/saga.rs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/saga.rs\/#organization","name":"Saga A Noventiq Company","url":"https:\/\/saga.rs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saga.rs\/#\/schema\/logo\/image\/","url":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png","contentUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png","width":1596,"height":450,"caption":"Saga A Noventiq Company"},"image":{"@id":"https:\/\/saga.rs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS","https:\/\/www.linkedin.com\/company\/saga-bg\/?originalSubdomain=rs","https:\/\/www.instagram.com\/saga_beograd\/","https:\/\/www.youtube.com\/@SagaBeograd"]},{"@type":"Person","@id":"https:\/\/saga.rs\/#\/schema\/person\/507df87840a659428c02cace53b5101d","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saga.rs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1388227c1ea26b656181327f2d9dabd6c4a87e2600d3de1944201aef29a8ed9c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1388227c1ea26b656181327f2d9dabd6c4a87e2600d3de1944201aef29a8ed9c?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/saga.rs\/en\/author\/admin\/"}]}},"menu_order":0,"_links":{"self":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/posts\/18888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/comments?post=18888"}],"version-history":[{"count":2,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/posts\/18888\/revisions"}],"predecessor-version":[{"id":18892,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/posts\/18888\/revisions\/18892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/media\/18890"}],"wp:attachment":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/media?parent=18888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/categories?post=18888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/tags?post=18888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}