{"id":2623,"date":"2024-12-30T07:49:31","date_gmt":"2024-12-30T06:49:31","guid":{"rendered":"https:\/\/codeflarelimited.com\/blog\/?p=2623"},"modified":"2024-12-30T07:49:32","modified_gmt":"2024-12-30T06:49:32","slug":"hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack","status":"publish","type":"post","link":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/","title":{"rendered":"Hackers Inject Malicious Code into Chrome Extensions in Bold New Attack"},"content":{"rendered":"\n<p>This month, hackers successfully modified several Chrome extensions with malicious code after infiltrating admin accounts through a phishing campaign. According to a <a href=\"https:\/\/www.cyberhaven.com\/blog\/cyberhavens-chrome-extension-security-incident-and-what-were-doing-about-it\">blog post<\/a> by cybersecurity company Cyberhaven, their Chrome extension was compromised on December 24 in an attack aimed at logins for specific social media advertising and AI platforms. Reuters reported that other extensions, including ParrotTalks, Uvoice, and VPNCity, were also targeted in similar attacks starting in mid-December, according to Jaime Blasco of Nudge Security.<\/p>\n\n\n\n<p>Cyberhaven alerted its customers on December 26 via email, recommending immediate revocation and rotation of passwords and other credentials. The company&#8217;s investigation revealed that the compromised extension targeted Facebook Ads users, <a href=\"https:\/\/codeflarelimited.com\/blog\/phishers-use-fake-google-calendar-invites-to-target-victims\/\">aiming to steal sensitive data<\/a> like access tokens, user IDs, cookies, and other account information. The malicious code also added a mouse click listener, enabling attackers to handle two-factor authentication (2FA) challenges. \u201cAfter sending the data to the [Command &amp; Control] server, the Facebook user ID is stored in browser storage and used during mouse click events to assist attackers with 2FA if required,\u201d Cyberhaven explained in its analysis.<\/p>\n\n\n\n<p>The breach was detected by Cyberhaven on December 25, and the company swiftly removed the malicious extension version within an hour. A clean, secure version of the extension has since been deployed.<\/p>\n\n\n\n<p><a href=\"https:\/\/codefussion.tech\/videos\">Start Learning cybersecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month, hackers successfully modified several Chrome extensions with malicious code after infiltrating admin accounts through a phishing<\/p>\n","protected":false},"author":1,"featured_media":2625,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[98],"tags":[],"class_list":["post-2623","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-softare-development"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Inject Malicious Code into Chrome Extensions in Bold New Attack<\/title>\n<meta name=\"description\" content=\"This month, hackers successfully modified several Chrome extensions with malicious code after infiltrating admin accounts\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Inject Malicious Code into Chrome Extensions in Bold New Attack\" \/>\n<meta property=\"og:description\" content=\"This month, hackers successfully modified several Chrome extensions with malicious code after infiltrating admin accounts\" \/>\n<meta property=\"og:url\" content=\"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/codeflretech\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-30T06:49:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-30T06:49:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2024\/12\/chrome.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"codeflare\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@codeflaretech\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/\"},\"author\":{\"name\":\"codeflare\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#\\\/schema\\\/person\\\/7e65653d49add95629f8c1053c5cd76a\"},\"headline\":\"Hackers Inject Malicious Code into Chrome Extensions in Bold New Attack\",\"datePublished\":\"2024-12-30T06:49:31+00:00\",\"dateModified\":\"2024-12-30T06:49:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/\"},\"wordCount\":219,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/chrome.jpeg\",\"articleSection\":[\"softare development\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/\",\"url\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/\",\"name\":\"Hackers Inject Malicious Code into Chrome Extensions in Bold New Attack\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/chrome.jpeg\",\"datePublished\":\"2024-12-30T06:49:31+00:00\",\"dateModified\":\"2024-12-30T06:49:32+00:00\",\"description\":\"This month, hackers successfully modified several Chrome extensions with malicious code after infiltrating admin accounts\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/chrome.jpeg\",\"contentUrl\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/chrome.jpeg\",\"width\":1024,\"height\":1024,\"caption\":\"hackers inject malicious code to Google Chrome\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"softare development\",\"item\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/softare-development\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hackers Inject Malicious Code into Chrome Extensions in Bold New Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/\",\"name\":\"\",\"description\":\"Sustainable solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#organization\",\"name\":\"Codeflare Limited\",\"url\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/codeflare.png\",\"contentUrl\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/codeflare.png\",\"width\":1040,\"height\":263,\"caption\":\"Codeflare Limited\"},\"image\":{\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/#\\\/schema\\\/person\\\/7e65653d49add95629f8c1053c5cd76a\",\"name\":\"codeflare\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/59cef917c86d965eea581d2747f51bd6382003a68bfce7c8a4dfec98b4cd838d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/59cef917c86d965eea581d2747f51bd6382003a68bfce7c8a4dfec98b4cd838d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/59cef917c86d965eea581d2747f51bd6382003a68bfce7c8a4dfec98b4cd838d?s=96&d=mm&r=g\",\"caption\":\"codeflare\"},\"description\":\"Latest tech news and coding tips.\",\"sameAs\":[\"https:\\\/\\\/codeflarelimited.com\\\/blog\",\"https:\\\/\\\/facebook.com\\\/codeflretech\",\"https:\\\/\\\/instagram.com\\\/codeflaretech\",\"https:\\\/\\\/x.com\\\/codeflaretech\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCuBLtiYqsajHdqw0uyt7Ofw?sub_confirmation=1\"],\"url\":\"https:\\\/\\\/codeflarelimited.com\\\/blog\\\/author\\\/watcher\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Inject Malicious Code into Chrome Extensions in Bold New Attack","description":"This month, hackers successfully modified several Chrome extensions with malicious code after infiltrating admin accounts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Inject Malicious Code into Chrome Extensions in Bold New Attack","og_description":"This month, hackers successfully modified several Chrome extensions with malicious code after infiltrating admin accounts","og_url":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/","article_author":"https:\/\/facebook.com\/codeflretech","article_published_time":"2024-12-30T06:49:31+00:00","article_modified_time":"2024-12-30T06:49:32+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2024\/12\/chrome.jpeg","type":"image\/jpeg"}],"author":"codeflare","twitter_card":"summary_large_image","twitter_creator":"@codeflaretech","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/#article","isPartOf":{"@id":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/"},"author":{"name":"codeflare","@id":"https:\/\/codeflarelimited.com\/blog\/#\/schema\/person\/7e65653d49add95629f8c1053c5cd76a"},"headline":"Hackers Inject Malicious Code into Chrome Extensions in Bold New Attack","datePublished":"2024-12-30T06:49:31+00:00","dateModified":"2024-12-30T06:49:32+00:00","mainEntityOfPage":{"@id":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/"},"wordCount":219,"commentCount":0,"publisher":{"@id":"https:\/\/codeflarelimited.com\/blog\/#organization"},"image":{"@id":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2024\/12\/chrome.jpeg","articleSection":["softare development"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/","url":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/","name":"Hackers Inject Malicious Code into Chrome Extensions in Bold New Attack","isPartOf":{"@id":"https:\/\/codeflarelimited.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/#primaryimage"},"image":{"@id":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2024\/12\/chrome.jpeg","datePublished":"2024-12-30T06:49:31+00:00","dateModified":"2024-12-30T06:49:32+00:00","description":"This month, hackers successfully modified several Chrome extensions with malicious code after infiltrating admin accounts","breadcrumb":{"@id":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/#primaryimage","url":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2024\/12\/chrome.jpeg","contentUrl":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2024\/12\/chrome.jpeg","width":1024,"height":1024,"caption":"hackers inject malicious code to Google Chrome"},{"@type":"BreadcrumbList","@id":"https:\/\/codeflarelimited.com\/blog\/hackers-inject-malicious-code-into-chrome-extensions-in-bold-new-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/codeflarelimited.com\/blog\/"},{"@type":"ListItem","position":2,"name":"softare development","item":"https:\/\/codeflarelimited.com\/blog\/softare-development\/"},{"@type":"ListItem","position":3,"name":"Hackers Inject Malicious Code into Chrome Extensions in Bold New Attack"}]},{"@type":"WebSite","@id":"https:\/\/codeflarelimited.com\/blog\/#website","url":"https:\/\/codeflarelimited.com\/blog\/","name":"","description":"Sustainable solutions","publisher":{"@id":"https:\/\/codeflarelimited.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/codeflarelimited.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/codeflarelimited.com\/blog\/#organization","name":"Codeflare Limited","url":"https:\/\/codeflarelimited.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/codeflarelimited.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2020\/11\/codeflare.png","contentUrl":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2020\/11\/codeflare.png","width":1040,"height":263,"caption":"Codeflare Limited"},"image":{"@id":"https:\/\/codeflarelimited.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/codeflarelimited.com\/blog\/#\/schema\/person\/7e65653d49add95629f8c1053c5cd76a","name":"codeflare","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/59cef917c86d965eea581d2747f51bd6382003a68bfce7c8a4dfec98b4cd838d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/59cef917c86d965eea581d2747f51bd6382003a68bfce7c8a4dfec98b4cd838d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/59cef917c86d965eea581d2747f51bd6382003a68bfce7c8a4dfec98b4cd838d?s=96&d=mm&r=g","caption":"codeflare"},"description":"Latest tech news and coding tips.","sameAs":["https:\/\/codeflarelimited.com\/blog","https:\/\/facebook.com\/codeflretech","https:\/\/instagram.com\/codeflaretech","https:\/\/x.com\/codeflaretech","https:\/\/www.youtube.com\/channel\/UCuBLtiYqsajHdqw0uyt7Ofw?sub_confirmation=1"],"url":"https:\/\/codeflarelimited.com\/blog\/author\/watcher\/"}]}},"jetpack_featured_media_url":"https:\/\/codeflarelimited.com\/blog\/wp-content\/uploads\/2024\/12\/chrome.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/posts\/2623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/comments?post=2623"}],"version-history":[{"count":1,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/posts\/2623\/revisions"}],"predecessor-version":[{"id":2626,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/posts\/2623\/revisions\/2626"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/media\/2625"}],"wp:attachment":[{"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/media?parent=2623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/categories?post=2623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/codeflarelimited.com\/blog\/wp-json\/wp\/v2\/tags?post=2623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}