{"id":723,"date":"2025-05-15T10:00:00","date_gmt":"2025-05-15T09:00:00","guid":{"rendered":"https:\/\/3bdatasecurity.com\/3bds-blog\/?p=723"},"modified":"2025-05-01T10:50:02","modified_gmt":"2025-05-01T09:50:02","slug":"how-to-respond-to-a-ransomware-incident","status":"publish","type":"post","link":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/","title":{"rendered":"How to Respond to a Ransomware Incident"},"content":{"rendered":"\n<p>Ransomware has become one of the most disruptive cyber threats facing UK organisations today, and it\u2019s not just an IT problem anymore. From financial penalties and regulatory reporting requirements to operational downtime and reputational damage, the impact of an attack goes well beyond encrypted files and ransom notes.<\/p>\n\n\n\n<p>Yet, many organisations still don\u2019t know what to do in those crucial first moments after discovering an incident. This blog breaks down the real-world steps your business should take if you are hit with ransomware, plus how to avoid common mistakes, and where to get expert support when it matters most.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What Is Ransomware and How Does It Work?<\/strong><\/h3>\n\n\n\n<p>Ransomware is a type of malicious software that blocks access to systems or data &#8211; typically by encrypting files &#8211; until a ransom is paid. In many modern attacks, threat actors go further by stealing data before encryption, threatening to leak it online if payment isn\u2019t made. This tactic, known as double extortion, creates both operational disruption and a serious legal risk.<\/p>\n\n\n\n<p>These attacks are increasingly launched via pre-packaged Ransomware-as-a-Service (RaaS) kits sold on the dark web, making it easier than ever for cybercriminals to target businesses of all sizes.<\/p>\n\n\n\n<p>The moment ransomware is detected, every decision counts. Take calm, deliberate action. The wrong move (like wiping infected systems) can make recovery much harder and compromise forensic investigations.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What to Do Immediately After a Ransomware Attack<\/strong><\/h3>\n\n\n\n<p><strong>1. Isolate Affected Systems<\/strong><\/p>\n\n\n\n<p>Act fast to contain the threat. Disconnect infected devices from the network, physically if necessary. Disable compromised accounts and remote access. Don\u2019t power down machines unless advised to do so; you could lose valuable forensic data. Your goal is to stop the spread, not fix things yet.<\/p>\n\n\n\n<p><strong>2. Preserve Evidence<\/strong><\/p>\n\n\n\n<p>Don\u2019t rush into cleanup. Take screenshots of ransom notes and unusual activity. Save logs from firewalls, endpoints, and authentication systems. Avoid deleting or restoring anything until a forensic specialist has reviewed it. Preserving evidence is critical for understanding what happened.<\/p>\n\n\n\n<p><strong>3. Avoid Direct Contact with the Attacker<\/strong><\/p>\n\n\n\n<p>Never respond to ransom messages without expert advice. Threat actors can manipulate you or collect more information. Keep internal communications secure, and don\u2019t use potentially compromised systems. Wait for specialist support before taking any further action.<\/p>\n\n\n\n<p><strong>4. Engage Your Cyber Incident Response Partner<\/strong><\/p>\n\n\n\n<p>If you have a partner like <a href=\"https:\/\/3bdatasecurity.com\/\">3B Data Security<\/a>, this is when they step in. We help contain the attack, preserve evidence, manage reporting, and coordinate recovery. If you don\u2019t have expert support, get it immediately, ransomware is not a DIY situation.<\/p>\n\n\n\n<div style=\"height:19px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Key Pillars of a Ransomware Incident Response Plan<\/strong><\/h3>\n\n\n\n<p><strong>Contain<\/strong><\/p>\n\n\n\n<p>Stop the spread. Isolate systems, lock down admin tools, and disconnect risky integrations. Use security tools to block lateral movement and scan for related threats.<\/p>\n\n\n\n<p><strong>Communicate<\/strong><\/p>\n\n\n\n<p>Inform internal teams early, IT, execs, legal, and comms. Plan how you\u2019ll talk to clients, regulators, and the public. Keep messages simple, factual, and coordinated.<\/p>\n\n\n\n<p><strong>Comply<\/strong><\/p>\n\n\n\n<p>Start assessing whether data was accessed. If personal data is involved, <a href=\"https:\/\/ico.org.uk\/for-organisations\/report-a-breach\/\">notify the ICO<\/a> within 72 hours. If there is a potential loss of payment card data, contact your merchant bank (acquirer). Don\u2019t wait for full confirmation, act on what you know.<\/p>\n\n\n\n<p><strong>Collaborate<\/strong><\/p>\n\n\n\n<p>Bring in experts &#8211; forensics, threat intelligence, legal, and insurance. Early involvement improves decision-making and protects your legal and financial position.<\/p>\n\n\n\n<p><strong>Clean Up<\/strong><\/p>\n\n\n\n<p>Only restore from clean, verified backups. Rebuild systems securely and update credentials. Monitor closely for lingering threats and patch exploited weaknesses. Recovery is your chance to improve.<\/p>\n\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Mistakes That Can Make Things Worse<\/strong><\/h3>\n\n\n\n<p>Even with the best intentions, some actions can cause lasting problems. Avoid these common errors:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paying the ransom without expert advice: Not only is payment legally risky, but many attackers don\u2019t provide a working decryption key or delete stolen data.<\/li>\n\n\n\n<li>Restoring too quickly: Rebooting systems before identifying the threat source can reintroduce the same problem.<\/li>\n\n\n\n<li>Failing to notify regulators or insurers on time: Breach notification deadlines are tight. Missing them can lead to regulatory penalties or rejected claims.<\/li>\n\n\n\n<li>Assuming the impact is isolated: Many ransomware campaigns include backdoors or dormant malware elsewhere in your network.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:51px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Who Should Be Involved in the Response<\/strong><\/h3>\n\n\n\n<p>Responding effectively requires input from across your organisation, and beyond. Your core ransomware response team should include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IT\/security leads or your managed service provider, for technical response and recovery.<\/li>\n\n\n\n<li>Legal and compliance advisors, particularly for GDPR, PCI DSS, and insurance.<\/li>\n\n\n\n<li>Executive sponsor, usually from your leadership team, to approve key decisions and represent the business.<\/li>\n\n\n\n<li>Comms\/PR lead, especially if external messaging or press management is needed.<\/li>\n\n\n\n<li>External cyber experts, like 3B Data Security, to lead forensics, strategy, and regulatory support.<\/li>\n<\/ul>\n\n\n\n<p>Having clearly defined roles and knowing who to call before the crisis makes your response faster, smoother, and far more effective.<\/p>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Be Ready Before It Happens<\/strong><\/h3>\n\n\n\n<p>Ransomware moves fast. Don\u2019t wait until you\u2019re under pressure to build your plan. Our <a href=\"https:\/\/3bdatasecurity.com\/Cyber-Security-Retainer.php\">Incident Response Retainer Service<\/a> ensures you have experts on hand the moment something goes wrong, with tools, templates, and threat detection included.<\/p>\n\n\n\n<p>And if you think you\u2019ve already fallen victim to ransomware, get in touch immediately. We offer a dedicated <a href=\"https:\/\/3bdatasecurity.com\/3B-Data-Security-Incident-Response.php\">Emergency Incident Response service<\/a>, available 24x7x365, to help you contain the threat, assess the impact, and take back control as quickly and safely as possible.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/3bdatasecurity.com\/Cyber-Incident-Response.php\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"284\" src=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9-1024x284.png\" alt=\"Find Out More\" class=\"wp-image-257\" style=\"width:207px;height:auto\" srcset=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9-1024x284.png 1024w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9-300x83.png 300w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9-768x213.png 768w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2023\/12\/Blog-CTAs-9.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware has become one of the most disruptive cyber threats facing UK organisations today, and it\u2019s not just an IT problem anymore. From financial penalties and regulatory reporting requirements to operational downtime and reputational damage, the impact of an attack goes well beyond encrypted files and ransom notes. Yet, many organisations still don\u2019t know what [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":728,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,8,9],"tags":[20,14,28],"class_list":["post-723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-security","category-ransomware","tag-cyber-attack","tag-cyber-security","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Respond to a Ransomware Incident How to Respond to a Ransomware Attack | Step-by-Step Incident Response Plan<\/title>\n<meta name=\"description\" content=\"Learn what to do after a ransomware attack with this incident response checklist. Includes containment, legal steps, and expert recovery tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Respond to a Ransomware Incident How to Respond to a Ransomware Attack | Step-by-Step Incident Response Plan\" \/>\n<meta property=\"og:description\" content=\"Learn what to do after a ransomware attack with this incident response checklist. Includes containment, legal steps, and expert recovery tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/\" \/>\n<meta property=\"og:site_name\" content=\"3B Data Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/3BDSLtd\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-15T09:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/04\/Untitled-design-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Elspeth Kennedy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@3bData\" \/>\n<meta name=\"twitter:site\" content=\"@3bData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elspeth Kennedy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/\",\"name\":\"How to Respond to a Ransomware Incident How to Respond to a Ransomware Attack | Step-by-Step Incident Response Plan\",\"isPartOf\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/04\/Untitled-design-scaled.jpg\",\"datePublished\":\"2025-05-15T09:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/83eff25734e3f61f565ef27106d2b652\"},\"description\":\"Learn what to do after a ransomware attack with this incident response checklist. Includes containment, legal steps, and expert recovery tips.\",\"breadcrumb\":{\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/#primaryimage\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/04\/Untitled-design-scaled.jpg\",\"contentUrl\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/04\/Untitled-design-scaled.jpg\",\"width\":2560,\"height\":1280,\"caption\":\"Malware warning image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Respond to a Ransomware Incident\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#website\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/\",\"name\":\"3B Data Security Blog\",\"description\":\"News and Updates from 3B Data Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/83eff25734e3f61f565ef27106d2b652\",\"name\":\"Elspeth Kennedy\",\"url\":\"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/ekennedy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Respond to a Ransomware Incident How to Respond to a Ransomware Attack | Step-by-Step Incident Response Plan","description":"Learn what to do after a ransomware attack with this incident response checklist. Includes containment, legal steps, and expert recovery tips.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/","og_locale":"en_GB","og_type":"article","og_title":"How to Respond to a Ransomware Incident How to Respond to a Ransomware Attack | Step-by-Step Incident Response Plan","og_description":"Learn what to do after a ransomware attack with this incident response checklist. Includes containment, legal steps, and expert recovery tips.","og_url":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/","og_site_name":"3B Data Security Blog","article_publisher":"https:\/\/www.facebook.com\/3BDSLtd\/","article_published_time":"2025-05-15T09:00:00+00:00","og_image":[{"width":2560,"height":1280,"url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/04\/Untitled-design-scaled.jpg","type":"image\/jpeg"}],"author":"Elspeth Kennedy","twitter_card":"summary_large_image","twitter_creator":"@3bData","twitter_site":"@3bData","twitter_misc":{"Written by":"Elspeth Kennedy","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/","name":"How to Respond to a Ransomware Incident How to Respond to a Ransomware Attack | Step-by-Step Incident Response Plan","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/#primaryimage"},"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/04\/Untitled-design-scaled.jpg","datePublished":"2025-05-15T09:00:00+00:00","author":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/83eff25734e3f61f565ef27106d2b652"},"description":"Learn what to do after a ransomware attack with this incident response checklist. Includes containment, legal steps, and expert recovery tips.","breadcrumb":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/#primaryimage","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/04\/Untitled-design-scaled.jpg","contentUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2025\/04\/Untitled-design-scaled.jpg","width":2560,"height":1280,"caption":"Malware warning image"},{"@type":"BreadcrumbList","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-respond-to-a-ransomware-incident\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/3bdatasecurity.com\/3bds-blog\/"},{"@type":"ListItem","position":2,"name":"How to Respond to a Ransomware Incident"}]},{"@type":"WebSite","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/","name":"3B Data Security Blog","description":"News and Updates from 3B Data Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/83eff25734e3f61f565ef27106d2b652","name":"Elspeth Kennedy","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/ekennedy\/"}]}},"_links":{"self":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/comments?post=723"}],"version-history":[{"count":5,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/723\/revisions"}],"predecessor-version":[{"id":736,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/723\/revisions\/736"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media\/728"}],"wp:attachment":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media?parent=723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/categories?post=723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/tags?post=723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}