{"id":4025,"date":"2017-03-28T00:00:00","date_gmt":"2017-03-28T00:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/how-azure-security-center-helps-reveal-a-cyberattack"},"modified":"2025-06-17T08:13:52","modified_gmt":"2025-06-17T15:13:52","slug":"how-azure-security-center-helps-reveal-a-cyberattack","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/","title":{"rendered":"How Azure Security Center helps reveal a Cyberattack"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">The Azure Security Center (ASC) analysts team reviews and investigates ASC alerts to gain insight into security incidents affecting Microsoft Azure customers, helping improve Azure Security alerts and detections. ASC helps customers keep pace with rapidly evolving threats by using advanced analytics and global threat intelligence.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Although we have come a long way as far as cloud security is concerned, even today security factors are heavily discussed as companies consider moving their assets to the cloud. The Azure Security Center team understands how critical it is for our customers to be assured that their Azure deployments are secure, not only from advanced attacks but even from the ones that are not necessarily new or novel. The beauty of ASC lies in its simplicity. Although ASC uses machine learning, anomaly detection, and behavioral analysis to determine suspicious events, it still addresses simple things like SQL brute force attacks that Bad Guys\/Script Kiddies are using to break into Microsoft SQL servers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this blog, we\u2019ll map out the stages of one real-world attack campaign that began with a SQL Brute Force attack, which was detected by the Security Center, and the steps taken to investigate and remediate the attack. This case study provides insights into the dynamics of the attack and recommendations on how to prevent similar attacks in your environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"initial-asc-alert-and-details\">Initial ASC alert and details<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Hackers are always trying to target internet connected databases. There are tons of bad guys trying to discover IP addresses that have SQL Server running so that they can crack their password through a brute force attack. The SQL database can contain a wealth of valuable information for the attackers, including personally identifiable information, credit card numbers, intellectual property, etc. Even if the database doesn\u2019t have much information, a successful attack on an insecurely configured SQL installation can be leveraged to get full system admin privileges.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our case started with an ASC Alert notification to the customer detailing malicious SQL activity. A command line \u201cftp -s:C:zyserver.txt\u201d launched by the SQL service account was unusual and flagged as by ASC Alerts.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The alert provided details such as date and time of the detected activity, affected resources, subscription information, and included a link to a detailed report of the detected threat and recommended actions.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/fb5a5593-973a-4f66-90a1-c72d1dcff72a.webp\" alt=\"graphical user interface, application\" class=\"wp-image-10456 webp-format\" style=\"width:474px;height:auto\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/fb5a5593-973a-4f66-90a1-c72d1dcff72a.webp\"><\/figure>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/327e0acc-c7d4-4382-8119-69473123cf1b.webp\" alt=\"Graphical User Interface\" class=\"wp-image-10458 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/327e0acc-c7d4-4382-8119-69473123cf1b.webp\"><\/figure>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Through our monitoring, the ASC analysts team was also alerted to this activity and looked further into the details of the alert. What we discovered was the SQL service account (SQLSERVERAGENT) was creating FTP scripts (i.e.: C:zyserver.txt), which was used to download and launch malicious binaries from an FTP site.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/9cf677bc-19c0-40df-8712-4d397ff65910.webp\" alt=\"table\" class=\"wp-image-10460 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/9cf677bc-19c0-40df-8712-4d397ff65910.webp\"><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-initial-compromise\">The initial compromise<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">A deeper investigation into the affected Azure subscription began with inspection of the SQL error and trace logs where we found indications of SQL Brute Force attempts. In the SQL error logs, we encountered hundreds of \u201cAudit Login Failed\u201d logon attempts for the SQL Admin \u2018sa\u2019 account (built-in SQL Server Administration) which eventually led up to a successful login.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/56d2dfe0-0466-4181-83c9-d1443a567404.webp\" alt=\"Table\" class=\"wp-image-10462 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/56d2dfe0-0466-4181-83c9-d1443a567404.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">These brute force attempts occurred over TCP port 1433, which was exposed on a public facing interface. TCP port 1433 is the default port for SQL Server.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Note:<\/strong>&nbsp;It is a very common recommendation to change the SQL default port 1433, this may impart a \u201cfalse sensation of security\u201d, because many port scanning tools can scan a \u201crange\u201d of network ports and eventually find SQL listening on ports other than 1433.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Once the SQL Admin \u2018sa\u2019 account was compromised by brute force, the account was then used to enable the \u2018xp_cmdshell\u2019 extended stored procedure as we\u2019ve highlighted below in a SQL log excerpt.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/8e1a6ed8-877b-432b-85ed-79fcbc2caf74.webp\" alt=\"text\" class=\"wp-image-10464 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/8e1a6ed8-877b-432b-85ed-79fcbc2caf74.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The \u2018xp_cmdshell\u2019 stored procedure is disabled by default and is of particular interest to attackers because of its ability to invoke a Windows command shell from within Microsoft SQL Server. With \u2018xp_cmdshell enabled, the attacker created SQL Agent jobs which invoked \u2018xp_cmdshell\u2019 and launched arbitrary commands, including the creation and launch of FTP scripts which, in turn, downloaded and ran malware.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"details-of-malicious-activity\">Details of malicious activity<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Once we determined how the initial compromise occurred, our team began analyzing Process Creation events to determine other malicious activity. The Process Creation events revealed the execution of a variety of commands, including downloading and installing backdoors and arbitrary code, as well as permission changes made on the system.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Below we have detailed a chronological layout of process command lines that we determined to be malicious:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A day after the initial compromise we began to see the modification of ACLS on files\/folders and registry keys with use of Cacls.exe (which appears to have been renamed to osk.exe and vds.exe).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Note:<\/strong>&nbsp;Osk.exe is the executable for the Accessibility On-Screen Keyboard and Vds.exe is the Virtual Disk Service executable, both typically found on a Windows installation. The command lines and command switches detailed below, however, are not used for Osk.exe or VDS.exe and are associated with Cacls.exe.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The Cacls.exe command switches \/e \/g is used to grant the System account full(:f) access rights to \u2018cmd.exe\u2019 and \u2018net.exe\u2019.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/44b0a86c-cede-4d60-986c-71eccbbfabb0.webp\" alt=\"text, letter\" class=\"wp-image-10466 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/44b0a86c-cede-4d60-986c-71eccbbfabb0.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">A few seconds later, we see the termination of known Antivirus Software using the Windows native \u201ctaskkill.exe\u201d.<br><\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/2c725574-8747-417f-8cbe-099e776cf761.webp\" alt=\"text\" class=\"wp-image-10468 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/2c725574-8747-417f-8cbe-099e776cf761.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">This was followed by the creation of an FTP script (c:zyserver.txt ) which was flagged in the original ASC Alert. This FTP script appears to download malware (c:stserver.exe) from a malicious FTP site and subsequently launch the malware.<br><\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/693db3f0-4824-4646-966b-15fab2a3ce59.webp\" alt=\"numbers, text\" class=\"wp-image-10470 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/693db3f0-4824-4646-966b-15fab2a3ce59.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">A few minutes later, we see the \u201cnet user\u201d and \u201cnet localgroup\u201d commands used to accomplish the following:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">a.&nbsp;&nbsp;&nbsp; Activate the built-in guest account and add it to the Administrators group<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">b.&nbsp;&nbsp;&nbsp;Create a new user account and add the newly created user to the Administrators group<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/aca84092-33b9-474a-abaa-7bf94600e88b.webp\" alt=\"text\" class=\"wp-image-10472 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/aca84092-33b9-474a-abaa-7bf94600e88b.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">A little over 2 hours later, we see the regini.exe command which appears to be used to create, modify, or delete registry keys. Regini can also set permissions on the registry keys as defined in the noted .ini file. We then see, regsvr32.exe silently (\/s switch) registering dlls related to the Windows shell (urlmon.dll, shdocvw.dll) and Windows scripting (jscript.dll, vbscript.dll, wshom.ocx).<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/f7a9a88b-e3c5-45bc-a24f-4513bfa3c5a8.webp\" alt=\"text\" class=\"wp-image-10474 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/f7a9a88b-e3c5-45bc-a24f-4513bfa3c5a8.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">This is immediately followed by additional modification of permissions on various Windows executables. Essentially resetting each to default with the \u201cicacls.exe\u201d command.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Note:<\/strong>&nbsp;The \/reset switch replaces ACLs with default inherited ACLs for all matching files.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/adaecb3d-df04-4714-8654-6733e457779f.webp\" alt=\"text\" class=\"wp-image-10476 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/adaecb3d-df04-4714-8654-6733e457779f.webp\"><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Lastly, we observed the deletion of \u201cTerminal Server\u201d fDenyTSConnections registry key. This is a registry key that contains the configuration of Terminal Server connection restrictions. This led us to believe that malicious RDP connections may be the next step for the attacker to access the server. Inspection of logon events did not reveal to us any malicious RDP attempts or connections, however:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Disabling of Terminal Server connection restrictions by overwriting values in the \u201cTerminal Server\u201d registry key<br>reg.exe ADD \u201cHKLMSYSTEMCurrentControlSetControlTerminal Server\u201d \/v fDenyTSConnections \/t REG_DWORD \/d 00000000 \/f\u201d&nbsp;<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">We also noticed a Scheduled task created. This task referenced a binary named \u201csvchost.exe\u201d to be launched out of the C:RECYCLER folder, which is suspicious.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Note that the legitimate \u201csvchost.exe\u201d files are located in the \u201cWindowsSystem32\u201d and \u201cWindowssysWOW64\u201d. Svchost.exe running from any other directory should be considered suspicious.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Persistence mechanism \u2013 Task Scheduler utility (schtasks.exe) used to set a recurring task<br>C:WindowsSystem32schtasks.exe \/create \/tn \u201c45645\u201d \/tr \u201cC:RECYCLERsvchost.exe\u201d \/sc minute \/mo 1 \/ru \u201csystem&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"recommended-remediation-and-mitigation-steps\">Recommended remediation and mitigation steps<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Once we understood the extent and the details of the attack, we recommended the following remediation and mitigation steps to be taken.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">First, if possible, we first recommended the backup and rebuild the SQL Server and reset all user accounts. We then implement the following mitigation steps to help prevent further attacks.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">1. Disable \u2018sa\u2019 account and&nbsp;<a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/ms189828.aspx\">use the more secure Windows Authentication<\/a><br>To disable \u2018sa\u2019 login via SQL, run the following commands as a sys admin<br>ALTER LOGIN sa DISABLE GO<\/li>\n\n\n\n<li class=\"wp-block-list-item\">To help prevent attackers from guessing the \u2018sa\u2019 account, rename the \u2018sa\u2019 account<br>To rename the \u2018sa\u2019 account via SQL, run the following as a sys admin:<br>ALTER LOGIN sa WITH NAME = [new_name]; GO<\/li>\n\n\n\n<li class=\"wp-block-list-item\">To prevent future brute force attempts,\u00a0<a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/ms365941.aspx\">change and harden the \u2018sa\u2019 password<\/a>\u00a0and set the sa Login to \u2018Disabled\u2019.Learn how to\u00a0<a href=\"https:\/\/support.microsoft.com\/en-us\/kb\/322336\">verify and change the system administrator password<\/a>\u00a0in MSDE or SQL Server 2005 Express Edition.<br><img loading=\"lazy\" decoding=\"async\" width=\"561\" height=\"190\" class=\"wp-image-10478\" style=\"width: 561px\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/3dfa9cce-2e61-4748-9a20-70de07f2464f.png\" alt=\"graphical user interface, application\"><\/li>\n\n\n\n<li class=\"wp-block-list-item\">It\u2019s also a good idea to\u00a0<a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/ms190693.aspx\">ensure that \u2018xp_cmdshell\u2019 is disabled<\/a>. Again, note that this should be disabled by default.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">If TCP port 1433 if it is not required to be opened to the internet, ensure that there are no rules in Network Security Group that allows 1433. From your Azure Portal, take the following steps to configure a Rule to block 1433 in Network Security Group.<br>a.\u00a0Open the\u00a0<a href=\"https:\/\/portal.azure.com\/\">Azure portal<\/a> <br>b.\u00a0Navigate to &gt; (More Services) -&gt; Network security groups<br><img loading=\"lazy\" decoding=\"async\" width=\"466\" height=\"180\" class=\"wp-image-10480\" style=\"width: 466px\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/9d526346-b846-4459-ac77-cedbab6c4a93.png\" alt=\"graphical user interface, text, application, email\"><br>c.\u00a0If you have opted into the Network Security option, you will see an entry for &lt;<strong>ComputerName-nsg<\/strong>&gt; \u2014 click it to view your Security Rules<br>d.\u00a0Under Settings click \u201cInbound security rules\u201d and then check for the existence of a rule that allows 1433 on the next pane (example detailed below):<br><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"174\" class=\"wp-image-10482\" style=\"width: 624px\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/b14ab477-f170-45ee-a916-3311ec0db89b.png\" alt=\"graphical user interface, application\"><br>e.\u00a0If a rule allowing access to the SQL port 1433 is present, you\u2019ll want to edit the rule to change the Action from \u201cAllow\u201d to \u201cDeny\u201d. Then click \u201cSave\u201d.<br><img loading=\"lazy\" decoding=\"async\" width=\"527\" height=\"460\" class=\"wp-image-10484\" style=\"width: 527px\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/a5a7f0c2-8185-4291-b4d8-f4b0da759d15.png\" alt=\"graphical user interface, text, application, email\"><br>f.\u00a0Then apply the newly created rule to the subscription<br><img loading=\"lazy\" decoding=\"async\" width=\"597\" height=\"140\" class=\"wp-image-10486\" style=\"width: 597px\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/6a5105da-7f12-4259-9a33-97e357447d80.png\" alt=\"graphical user interface, application\"><br><\/li>\n\n\n\n<li class=\"wp-block-list-item\">Inspect all stored procedures that may have been enabled in SQL and look for stored procedures that may be implementing \u2018xp_cmdshell\u2019 and running unusual command. For example, in our case, we identified the following commands:<br><img loading=\"lazy\" decoding=\"async\" width=\"384\" height=\"70\" class=\"wp-image-10488\" style=\"width: 600px\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/02ceb4e0-ebe5-4770-9b1e-641268f0bdb5.png\" alt=\"text\"><\/li>\n\n\n\n<li class=\"wp-block-list-item\">\u00a0Lastly, we highly recommend configuring Azure subscription(s) to receive future alerts and email notifications from Microsoft Azure Security Center. To receive alerts and email notifications of security issues like this in the future, we recommended upgrading from ASC \u201cFree\u201d (basic detection) tier to ASC \u201cStandard\u201d (advanced detection) tier. <br>Below is an example of the email alert received from ASC when this SQL incident was detected:<br><img loading=\"lazy\" decoding=\"async\" width=\"509\" height=\"741\" class=\"wp-image-10490\" style=\"width: 509px\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/62b2d45e-883e-45d3-9cd8-b32e30a099ae.png\" alt=\"graphical user interface, application\"><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more-about-sql-detection\">Learn more about\u00a0SQL detection<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/blogs.msdn.microsoft.com\/azuresecurity\/2016\/09\/08\/azure-sql-database-threat-detection-advanced-db-security-in-the-cloud\/\">Azure SQL Database Threat Detection\u2013Advanced DB Security in the Cloud<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/blogs.msdn.microsoft.com\/azuresecurity\/2016\/10\/26\/protect-azure-sql-databases-with-azure-security-center\/\">Protect Azure SQL Databases with Azure Security Center<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/blogs.msdn.microsoft.com\/sqlsecurity\/2016\/08\/08\/sql-threat-detection-your-built-in-security-expert\/\">SQL Threat Detection \u2013 Your built-in security expert<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The Azure Security Center (ASC) analysts team reviews and investigates ASC alerts to gain insight into security incidents affecting Microsoft Azure customers, helping improve Azure Security alerts\u2026.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1473,1466,1459],"tags":[],"audience":[3057,3055,3053,3056],"content-type":[1511],"product":[1539,1515],"tech-community":[],"topic":[],"coauthors":[1006],"class_list":["post-4025","post","type-post","status-publish","format-standard","hentry","category-databases","category-hybrid-multicloud","category-security","audience-data-professionals","audience-developers","audience-it-decision-makers","audience-it-implementors","content-type-best-practices","product-azure-sql-database","product-microsoft-defender-for-cloud","review-flag-1680286581-295","review-flag-1-1680286581-825","review-flag-2-1680286581-601","review-flag-alway-1680286580-106","review-flag-disable","review-flag-disabled","review-flag-free-1680286579-836","review-flag-machi-1680286585-314","review-flag-new-1680286579-546"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Azure Security Center helps reveal a Cyberattack | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"The Azure Security Center (ASC) analysts team reviews and investigates ASC alerts to gain insight into security incidents affecting Microsoft Azure customers, helping improve Azure Security alerts\u2026\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Azure Security Center helps reveal a Cyberattack | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"The Azure Security Center (ASC) analysts team reviews and investigates ASC alerts to gain insight into security incidents affecting Microsoft Azure customers, helping improve Azure Security alerts\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-28T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-17T15:13:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/fb5a5593-973a-4f66-90a1-c72d1dcff72a.jpg\" \/>\n<meta name=\"author\" content=\"Greg Cottingham\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Greg Cottingham\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/greg-cottingham\/\",\"@type\":\"Person\",\"@name\":\"Greg Cottingham\"}],\"headline\":\"How Azure Security Center helps reveal a Cyberattack\",\"datePublished\":\"2017-03-28T00:00:00+00:00\",\"dateModified\":\"2025-06-17T15:13:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/\"},\"wordCount\":1701,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/fb5a5593-973a-4f66-90a1-c72d1dcff72a.jpg\",\"articleSection\":[\"Databases\",\"Hybrid + multicloud\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/\",\"name\":\"How Azure Security Center helps reveal a Cyberattack | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/fb5a5593-973a-4f66-90a1-c72d1dcff72a.jpg\",\"datePublished\":\"2017-03-28T00:00:00+00:00\",\"dateModified\":\"2025-06-17T15:13:52+00:00\",\"description\":\"The Azure Security Center (ASC) analysts team reviews and investigates ASC alerts to gain insight into security incidents affecting Microsoft Azure customers, helping improve Azure Security alerts\u2026\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/fb5a5593-973a-4f66-90a1-c72d1dcff72a.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/fb5a5593-973a-4f66-90a1-c72d1dcff72a.webp\",\"width\":463,\"height\":564,\"caption\":\"graphical user interface, application\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Databases\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/databases\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Azure Security Center helps reveal a Cyberattack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Azure Security Center helps reveal a Cyberattack | Microsoft Azure Blog","description":"The Azure Security Center (ASC) analysts team reviews and investigates ASC alerts to gain insight into security incidents affecting Microsoft Azure customers, helping improve Azure Security alerts\u2026","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/","og_locale":"en_US","og_type":"article","og_title":"How Azure Security Center helps reveal a Cyberattack | Microsoft Azure Blog","og_description":"The Azure Security Center (ASC) analysts team reviews and investigates ASC alerts to gain insight into security incidents affecting Microsoft Azure customers, helping improve Azure Security alerts\u2026","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2017-03-28T00:00:00+00:00","article_modified_time":"2025-06-17T15:13:52+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/fb5a5593-973a-4f66-90a1-c72d1dcff72a.jpg","type":"","width":"","height":""}],"author":"Greg Cottingham","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Greg Cottingham","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/greg-cottingham\/","@type":"Person","@name":"Greg Cottingham"}],"headline":"How Azure Security Center helps reveal a Cyberattack","datePublished":"2017-03-28T00:00:00+00:00","dateModified":"2025-06-17T15:13:52+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/"},"wordCount":1701,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/fb5a5593-973a-4f66-90a1-c72d1dcff72a.jpg","articleSection":["Databases","Hybrid + multicloud","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/","name":"How Azure Security Center helps reveal a Cyberattack | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/fb5a5593-973a-4f66-90a1-c72d1dcff72a.jpg","datePublished":"2017-03-28T00:00:00+00:00","dateModified":"2025-06-17T15:13:52+00:00","description":"The Azure Security Center (ASC) analysts team reviews and investigates ASC alerts to gain insight into security incidents affecting Microsoft Azure customers, helping improve Azure Security alerts\u2026","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/fb5a5593-973a-4f66-90a1-c72d1dcff72a.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2017\/03\/fb5a5593-973a-4f66-90a1-c72d1dcff72a.webp","width":463,"height":564,"caption":"graphical user interface, application"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/how-azure-security-center-helps-reveal-a-cyberattack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Databases","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/databases\/"},{"@type":"ListItem","position":3,"name":"How Azure Security Center helps reveal a Cyberattack"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/4025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=4025"}],"version-history":[{"count":2,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/4025\/revisions"}],"predecessor-version":[{"id":42074,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/4025\/revisions\/42074"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=4025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=4025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=4025"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=4025"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=4025"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=4025"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=4025"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=4025"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=4025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}