{"id":188,"date":"2021-01-16T16:02:36","date_gmt":"2021-01-16T15:02:36","guid":{"rendered":"https:\/\/it-complex.pl\/?p=188"},"modified":"2021-01-29T14:14:40","modified_gmt":"2021-01-29T13:14:40","slug":"potezny-atak","status":"publish","type":"post","link":"https:\/\/it-complex.pl\/?p=188","title":{"rendered":"Tak pot\u0119\u017cnej metody ataku nie widzieli\u015bmy. Odkryli go eksperci z ESET"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft\"><img decoding=\"async\" src=\"https:\/\/it-complex.pl\/wp-content\/uploads\/2018\/10\/ransomware-2320941_1280-300x200.jpg\" alt=\"\" class=\"wp-image-418\"\/><\/figure><\/div>\n\n\n\n<p>Fancy Bear &#8211; grupa cyberprzest\u0119pc\u00f3w z Rosji dysponuje przer\u00f3\u017cnymi narz\u0119dziami pozwalaj\u0105cymi im na atakowanie ca\u0142ych infrastruktur oraz komputer\u00f3w. Natomiast eksperci z ESET przy\u0142apali ich na korzystaniu z niezwykle niebezpiecznego rootkita UEFI, kt\u00f3rego trudno jest si\u0119 pozby\u0107 z zara\u017conych maszyn.<\/p>\n\n\n\n<p>Je\u017celi nie m\u00f3wi Wam zupe\u0142nie nic \u201erootkit UEFI\u201d, musicie wiedzie\u0107 o tym, \u017ce po zara\u017ceniu nim nie pomo\u017ce Wam wymiana dysku twardego, reinstalacja systemu \u2013 standardowe techniki b\u0142yskawicznego i totalnego radzenia sobie z zaka\u017ceniami. UEFI to oprogramowanie steruj\u0105ce komputerem \u2013 i to w\u0142a\u015bnie tam rezyduje wykorzystywane przez Fancy Bear narz\u0119dzie \u2013 nie jest to ogromna nowo\u015b\u0107, ale przera\u017ca rozmiar dzia\u0142a\u0144 grupy. Sednit-toolkit zidentyfikowany przez ESET mocno bazuje na LoJax, wcze\u015bniej znanym malware.<\/p>\n\n\n\n<p>LoJack jest natomiast blisko zwi\u0105zany z Computrace \u2013 oprogramowaniem, kt\u00f3re pozwala na \u015bledzenie laptopa po kradzie\u017cy. I oczywi\u015bcie wykorzystuje si\u0119 tutaj UEFI \u2013 nic nie da reinstalacja systemu, wymiana dysku twardego na nic si\u0119 nie zda. Jedyna szansa rozprawienia si\u0119 z nim to przeflashowanie UEFI, a to przekracza mo\u017cliwo\u015bci wi\u0119kszo\u015bci u\u017cytkownik\u00f3w. Takie mo\u017cliwo\u015bci jednak wzbudzaj\u0105 zainteresowanie tak\u017ce cyberprzest\u0119pc\u00f3w, kt\u00f3rzy mog\u0105 wykorzysta\u0107 dok\u0142adnie taki sam mechanizm. Natomiast dost\u0119p do UEFI jest niezwykle atrakcyjny \u2013 z poziomu oprogramowania steruj\u0105cego mo\u017cna (i udowodniono to) zara\u017ca\u0107 komputery innym z\u0142o\u015bliwym oprogramowaniem oraz wci\u0105ga\u0107 maszyny do botnet\u00f3w.<\/p>\n\n\n\n<p>Nawet je\u015bli uda nam si\u0119 pozby\u0107 plik\u00f3w LoJax z systemu operacyjnego \u2013 po ponownym uruchomieniu ponownie znajdzie si\u0119 on na dysku z Windows na pok\u0142adzie \u2013 ale nie tylko. Potencjalnie, mo\u017cliwe jest przej\u0119cie w ten spos\u00f3b maszyn z dystrybucjami Linuksa oraz macOS. Zatem, nikt nie jest w stu procentach bezpieczny \u2013 LoJax i bazuj\u0105ce na nim zagro\u017cenia dzia\u0142aj\u0105 w\u0142a\u015bciwie niezale\u017cnie od bazowej platformy i dodatkowo s\u0105 niezwykle odporne na wszelkie totalne metody rozprawiania si\u0119 z nimi.<\/p>\n\n\n\n<p>R\u00f3wnie\u017c \u015bwiadomo\u015b\u0107 takiej infekcji mo\u017ce by\u0107 bardzo s\u0142aba \u2013 w\u0142a\u015bciwie wi\u0119kszo\u015b\u0107 dost\u0119pnych pakiet\u00f3w bezpiecze\u0144stwa nie jest w stanie ewaluowa\u0107 UEFI pod k\u0105tem obecno\u015bci z\u0142o\u015bliwego oprogramowania. Ma\u0142o tego \u2013 wykrycie infekcji jest niezwykle trudne; niemniej wystarcz\u0105 czasami drobne \u015blady, by domniemywa\u0107, \u017ce co\u015b jest bardzo nie tak.<\/p>\n\n\n\n<p>Rodzina szkodliwego oprogramowania o nazwie Zebrocy aktywuje si\u0119 w momencie otworzenia za\u0142\u0105cznika z wiadomo\u015bci e-mail \u2013 dokumentu Microsoft Office lub pliku spakowanego do archiwum. Zebrocy sk\u0142ada si\u0119 z trzech komponent\u00f3w. Pierwszy z modu\u0142\u00f3w, zaraz po uruchomieniu, odpowiada za zebranie informacji o systemie operacyjnym ofiary. Nast\u0119pnie przesy\u0142a je do serwera cyberprzest\u0119pc\u00f3w, kt\u00f3ry op\u00f3\u017ania swoj\u0105 odpowied\u017a do kilku godzin, zanim wirus dopu\u015bci do kolejnej fazy infekcji. Drugi modu\u0142 sprawdza mi\u0119dzy innymi, czy zosta\u0142 uruchomiony w \u015brodowisku wirtualnym. Je\u015bli tak, ko\u0144czy swoje dzia\u0142anie. Je\u015bli nie, sprawdza list\u0119 uruchomionych program\u00f3w, wersj\u0119 systemu operacyjnego, robi zrzuty ekranu oraz pobiera z sieci kolejny z\u0142o\u015bliwy kod. Ten ostatni komponent jest odpowiedzialny za wykonanie rozkaz\u00f3w cyberprzest\u0119pc\u00f3w oraz za przeprowadzenie finalnej infekcji gromadz\u0105cej maksymaln\u0105 ilo\u015b\u0107 informacji o ofiarach ataku.<br>Kamil Sadkowski, analityk zagro\u017ce\u0144 ESET<\/p>\n\n\n\n<p>Takich atak\u00f3w b\u0119dzie wi\u0119cej<br>Do dotychczas najwi\u0119ksze odkrycie zwi\u0105zane z cyberbezpiecze\u0144stwem. Eksperci z ESET uwa\u017caj\u0105, \u017ce b\u0119dzie ich znacznie wi\u0119cej \u2013 UEFI stanowi\u0105ce standard we wsp\u00f3\u0142czesnych maszynach mia\u0142o by\u0107 najpierw gwarantem bezpiecze\u0144stwa, obecnie uznaje si\u0119, \u017ce jest to bardzo atrakcyjna i jednocze\u015bnie niebezpieczna dla u\u017cytkownika furtka, za pomoc\u0105 kt\u00f3rej mo\u017cna w przera\u017caj\u0105cy spos\u00f3b prowadzi\u0107 przest\u0119pcze dzia\u0142ania.<\/p>\n\n\n\n<p>Artyku\u0142 pochodzi z:<a href=\"https:\/\/antyweb.pl\/lojax-sednit-rootkit-uefi\/\">&nbsp;https:\/\/antyweb.pl\/lojax-sednit-rootkit-uefi\/<\/a><\/p>\n\n\n\n<p>Jakub Szcz\u0119sny<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fancy Bear &#8211; grupa cyberprzest\u0119pc\u00f3w z Rosji dysponuje przer\u00f3\u017cnymi narz\u0119dziami pozwalaj\u0105cymi im na atakowanie ca\u0142ych infrastruktur oraz komputer\u00f3w. Natomiast eksperci z ESET przy\u0142apali ich na korzystaniu z niezwykle niebezpiecznego rootkita UEFI, kt\u00f3rego trudno jest si\u0119 pozby\u0107 z zara\u017conych maszyn. Je\u017celi nie m\u00f3wi Wam zupe\u0142nie nic \u201erootkit UEFI\u201d, musicie wiedzie\u0107 o tym, \u017ce po zara\u017ceniu nim [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":711,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-188","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bez-kategorii"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tak pot\u0119\u017cnej metody ataku nie widzieli\u015bmy. Odkryli go eksperci z ESET - it-complex.pl<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/it-complex.pl\/?p=188\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tak pot\u0119\u017cnej metody ataku nie widzieli\u015bmy. Odkryli go eksperci z ESET - it-complex.pl\" \/>\n<meta property=\"og:description\" content=\"Fancy Bear &#8211; grupa cyberprzest\u0119pc\u00f3w z Rosji dysponuje przer\u00f3\u017cnymi narz\u0119dziami pozwalaj\u0105cymi im na atakowanie ca\u0142ych infrastruktur oraz komputer\u00f3w. Natomiast eksperci z ESET przy\u0142apali ich na korzystaniu z niezwykle niebezpiecznego rootkita UEFI, kt\u00f3rego trudno jest si\u0119 pozby\u0107 z zara\u017conych maszyn. Je\u017celi nie m\u00f3wi Wam zupe\u0142nie nic \u201erootkit UEFI\u201d, musicie wiedzie\u0107 o tym, \u017ce po zara\u017ceniu nim [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/it-complex.pl\/?p=188\" \/>\n<meta property=\"og:site_name\" content=\"it-complex.pl\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ITComplex.Kielce\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-16T15:02:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-29T13:14:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/it-complex.pl\/wp-content\/uploads\/2021\/01\/ransomware-2320941_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/it-complex.pl\/?p=188#article\",\"isPartOf\":{\"@id\":\"https:\/\/it-complex.pl\/?p=188\"},\"author\":{\"name\":\"Erni\",\"@id\":\"https:\/\/it-complex.pl\/#\/schema\/person\/527e8072081a15e7728d593e0c98f9b5\"},\"headline\":\"Tak pot\u0119\u017cnej metody ataku nie widzieli\u015bmy. Odkryli go eksperci z ESET\",\"datePublished\":\"2021-01-16T15:02:36+00:00\",\"dateModified\":\"2021-01-29T13:14:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/it-complex.pl\/?p=188\"},\"wordCount\":637,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/it-complex.pl\/#organization\"},\"image\":{\"@id\":\"https:\/\/it-complex.pl\/?p=188#primaryimage\"},\"thumbnailUrl\":\"https:\/\/it-complex.pl\/wp-content\/uploads\/2021\/01\/ransomware-2320941_1280.jpg\",\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/it-complex.pl\/?p=188#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/it-complex.pl\/?p=188\",\"url\":\"https:\/\/it-complex.pl\/?p=188\",\"name\":\"Tak pot\u0119\u017cnej metody ataku nie widzieli\u015bmy. Odkryli go eksperci z ESET - it-complex.pl\",\"isPartOf\":{\"@id\":\"https:\/\/it-complex.pl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/it-complex.pl\/?p=188#primaryimage\"},\"image\":{\"@id\":\"https:\/\/it-complex.pl\/?p=188#primaryimage\"},\"thumbnailUrl\":\"https:\/\/it-complex.pl\/wp-content\/uploads\/2021\/01\/ransomware-2320941_1280.jpg\",\"datePublished\":\"2021-01-16T15:02:36+00:00\",\"dateModified\":\"2021-01-29T13:14:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/it-complex.pl\/?p=188#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/it-complex.pl\/?p=188\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/it-complex.pl\/?p=188#primaryimage\",\"url\":\"https:\/\/it-complex.pl\/wp-content\/uploads\/2021\/01\/ransomware-2320941_1280.jpg\",\"contentUrl\":\"https:\/\/it-complex.pl\/wp-content\/uploads\/2021\/01\/ransomware-2320941_1280.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/it-complex.pl\/?p=188#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/it-complex.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tak pot\u0119\u017cnej metody ataku nie widzieli\u015bmy. Odkryli go eksperci z ESET\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/it-complex.pl\/#website\",\"url\":\"https:\/\/it-complex.pl\/\",\"name\":\"IT-Complex.pl\",\"description\":\"Aby komputer s\u0142u\u017cy\u0142 cz\u0142owiekowi\",\"publisher\":{\"@id\":\"https:\/\/it-complex.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/it-complex.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/it-complex.pl\/#organization\",\"name\":\"IT-Complex.pl sp. z o.o.\",\"url\":\"https:\/\/it-complex.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/it-complex.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/it-complex.pl\/wp-content\/uploads\/2020\/05\/it-complex-logo_kolor_niebieski-v2-1-kopia.png\",\"contentUrl\":\"https:\/\/it-complex.pl\/wp-content\/uploads\/2020\/05\/it-complex-logo_kolor_niebieski-v2-1-kopia.png\",\"width\":3061,\"height\":978,\"caption\":\"IT-Complex.pl sp. z o.o.\"},\"image\":{\"@id\":\"https:\/\/it-complex.pl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ITComplex.Kielce\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/it-complex.pl\/#\/schema\/person\/527e8072081a15e7728d593e0c98f9b5\",\"name\":\"Erni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/it-complex.pl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd4f3e8946e46100b07bba97a3499d80b3c5fe51404930b969b3045e2df503f0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd4f3e8946e46100b07bba97a3499d80b3c5fe51404930b969b3045e2df503f0?s=96&d=mm&r=g\",\"caption\":\"Erni\"},\"sameAs\":[\"https:\/\/it-complex.pl\"],\"url\":\"https:\/\/it-complex.pl\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tak pot\u0119\u017cnej metody ataku nie widzieli\u015bmy. Odkryli go eksperci z ESET - it-complex.pl","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/it-complex.pl\/?p=188","og_locale":"pl_PL","og_type":"article","og_title":"Tak pot\u0119\u017cnej metody ataku nie widzieli\u015bmy. Odkryli go eksperci z ESET - it-complex.pl","og_description":"Fancy Bear &#8211; grupa cyberprzest\u0119pc\u00f3w z Rosji dysponuje przer\u00f3\u017cnymi narz\u0119dziami pozwalaj\u0105cymi im na atakowanie ca\u0142ych infrastruktur oraz komputer\u00f3w. Natomiast eksperci z ESET przy\u0142apali ich na korzystaniu z niezwykle niebezpiecznego rootkita UEFI, kt\u00f3rego trudno jest si\u0119 pozby\u0107 z zara\u017conych maszyn. Je\u017celi nie m\u00f3wi Wam zupe\u0142nie nic \u201erootkit UEFI\u201d, musicie wiedzie\u0107 o tym, \u017ce po zara\u017ceniu nim [&hellip;]","og_url":"https:\/\/it-complex.pl\/?p=188","og_site_name":"it-complex.pl","article_publisher":"https:\/\/www.facebook.com\/ITComplex.Kielce","article_published_time":"2021-01-16T15:02:36+00:00","article_modified_time":"2021-01-29T13:14:40+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/it-complex.pl\/wp-content\/uploads\/2021\/01\/ransomware-2320941_1280.jpg","type":"image\/jpeg"}],"author":"Erni","twitter_card":"summary_large_image","twitter_misc":{"Napisane przez":"Erni","Szacowany czas czytania":"3 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/it-complex.pl\/?p=188#article","isPartOf":{"@id":"https:\/\/it-complex.pl\/?p=188"},"author":{"name":"Erni","@id":"https:\/\/it-complex.pl\/#\/schema\/person\/527e8072081a15e7728d593e0c98f9b5"},"headline":"Tak pot\u0119\u017cnej metody ataku nie widzieli\u015bmy. Odkryli go eksperci z ESET","datePublished":"2021-01-16T15:02:36+00:00","dateModified":"2021-01-29T13:14:40+00:00","mainEntityOfPage":{"@id":"https:\/\/it-complex.pl\/?p=188"},"wordCount":637,"commentCount":0,"publisher":{"@id":"https:\/\/it-complex.pl\/#organization"},"image":{"@id":"https:\/\/it-complex.pl\/?p=188#primaryimage"},"thumbnailUrl":"https:\/\/it-complex.pl\/wp-content\/uploads\/2021\/01\/ransomware-2320941_1280.jpg","inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/it-complex.pl\/?p=188#respond"]}]},{"@type":"WebPage","@id":"https:\/\/it-complex.pl\/?p=188","url":"https:\/\/it-complex.pl\/?p=188","name":"Tak pot\u0119\u017cnej metody ataku nie widzieli\u015bmy. Odkryli go eksperci z ESET - it-complex.pl","isPartOf":{"@id":"https:\/\/it-complex.pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/it-complex.pl\/?p=188#primaryimage"},"image":{"@id":"https:\/\/it-complex.pl\/?p=188#primaryimage"},"thumbnailUrl":"https:\/\/it-complex.pl\/wp-content\/uploads\/2021\/01\/ransomware-2320941_1280.jpg","datePublished":"2021-01-16T15:02:36+00:00","dateModified":"2021-01-29T13:14:40+00:00","breadcrumb":{"@id":"https:\/\/it-complex.pl\/?p=188#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/it-complex.pl\/?p=188"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/it-complex.pl\/?p=188#primaryimage","url":"https:\/\/it-complex.pl\/wp-content\/uploads\/2021\/01\/ransomware-2320941_1280.jpg","contentUrl":"https:\/\/it-complex.pl\/wp-content\/uploads\/2021\/01\/ransomware-2320941_1280.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/it-complex.pl\/?p=188#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/it-complex.pl\/"},{"@type":"ListItem","position":2,"name":"Tak pot\u0119\u017cnej metody ataku nie widzieli\u015bmy. Odkryli go eksperci z ESET"}]},{"@type":"WebSite","@id":"https:\/\/it-complex.pl\/#website","url":"https:\/\/it-complex.pl\/","name":"IT-Complex.pl","description":"Aby komputer s\u0142u\u017cy\u0142 cz\u0142owiekowi","publisher":{"@id":"https:\/\/it-complex.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/it-complex.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/it-complex.pl\/#organization","name":"IT-Complex.pl sp. z o.o.","url":"https:\/\/it-complex.pl\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/it-complex.pl\/#\/schema\/logo\/image\/","url":"https:\/\/it-complex.pl\/wp-content\/uploads\/2020\/05\/it-complex-logo_kolor_niebieski-v2-1-kopia.png","contentUrl":"https:\/\/it-complex.pl\/wp-content\/uploads\/2020\/05\/it-complex-logo_kolor_niebieski-v2-1-kopia.png","width":3061,"height":978,"caption":"IT-Complex.pl sp. z o.o."},"image":{"@id":"https:\/\/it-complex.pl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ITComplex.Kielce"]},{"@type":"Person","@id":"https:\/\/it-complex.pl\/#\/schema\/person\/527e8072081a15e7728d593e0c98f9b5","name":"Erni","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/it-complex.pl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd4f3e8946e46100b07bba97a3499d80b3c5fe51404930b969b3045e2df503f0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd4f3e8946e46100b07bba97a3499d80b3c5fe51404930b969b3045e2df503f0?s=96&d=mm&r=g","caption":"Erni"},"sameAs":["https:\/\/it-complex.pl"],"url":"https:\/\/it-complex.pl\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/it-complex.pl\/index.php?rest_route=\/wp\/v2\/posts\/188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it-complex.pl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it-complex.pl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it-complex.pl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it-complex.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=188"}],"version-history":[{"count":2,"href":"https:\/\/it-complex.pl\/index.php?rest_route=\/wp\/v2\/posts\/188\/revisions"}],"predecessor-version":[{"id":712,"href":"https:\/\/it-complex.pl\/index.php?rest_route=\/wp\/v2\/posts\/188\/revisions\/712"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it-complex.pl\/index.php?rest_route=\/wp\/v2\/media\/711"}],"wp:attachment":[{"href":"https:\/\/it-complex.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it-complex.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it-complex.pl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}