{"id":2788,"date":"2021-05-21T22:40:52","date_gmt":"2021-05-22T03:40:52","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=2788"},"modified":"2021-05-21T22:40:53","modified_gmt":"2021-05-22T03:40:53","slug":"apt-a-potentially-harmful-cyberattack-method","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/","title":{"rendered":"APT &#8211; A potentially harmful cyberattack method"},"content":{"rendered":"\n<p>Cybercriminals are putting more and more effort and creativity into carrying out attacks. Therefore, they prefer much more attractive targets such as organizations. Advanced Persistent Threats (APT) are proof of this. As the name \u201cadvanced\u201d suggests, an advanced persistent threat (APT) uses continuous, clandestine and advanced hacking techniques to gain access to a system and stay there for a long time, with potentially destructive consequences.<\/p>\n\n\n\n<p>Its particularity is that it runs for an extended period of time, mainly because the cybercriminals responsible are very dedicated. They are responsible for investigating the target and defining the reason for attacking. In addition, they invest a lot in economic resources to prepare their infrastructure and thus ensure that the attack is carried out successfully. Furthermore, the attacks that are carried out through APTs include completely customized malware according to the chosen objective.<\/p>\n\n\n\n<p>Due to the level of effort required to carry out such an attack, APTs often partner with high-value targets, such as countries and large corporations, with the aim of stealing information over a long period of time, rather than simply \u201c get in &#8220;and get out fast, as many black hat hackers do during low-level cyberattacks.<\/p>\n\n\n\n<p>What is most striking and should not be surprising, for obvious reasons, is how quickly they become more and more sophisticated. Consequently, globally, there are full-time, high-cost IT security experts who are in charge of designing, creating and implementing APTs. These people are backed by important organizations and personalities with specific interests, which is why attacks are almost always executed more than successfully. Some of the tasks they do are accessing confidential information, creating and inserting malicious code.<\/p>\n\n\n\n<p>The overall purpose of an APT attack is to gain continuous access to the system. Hackers accomplish this in a series of stages.<\/p>\n\n\n\n<p><strong><em>\u25b8Get access<\/em><\/strong><\/p>\n\n\n\n<p>Just like a thief forces a door with a crowbar, to insert malware into a target network, cybercriminals often gain access via a network, an infected file, spam, or an application vulnerability.<\/p>\n\n\n\n<p><strong><em>\u25b8Infiltrate<\/em><\/strong><\/p>\n\n\n\n<p>Cybercriminals implant malware that creates a network of back doors and tunnels used to navigate systems unnoticed.<\/p>\n\n\n\n<p><strong><em>\u25b8Intensify access<\/em><\/strong><\/p>\n\n\n\n<p>Once inside, hackers use techniques such as password cracking to access administrator rights, increase control over the system, and gain higher levels of access.<\/p>\n\n\n\n<p><strong><em>\u25b8Horizontal displacement<\/em><\/strong><\/p>\n\n\n\n<p>With a higher level of foray into the system thanks to administrator rights, hackers can move around it at will.<\/p>\n\n\n\n<p><strong><em>\u25b8Look, learn and stay<\/em><\/strong><\/p>\n\n\n\n<p>From inside the system, hackers gain a complete understanding of how it works and its vulnerabilities, allowing them to make use of the information they want.<\/p>\n\n\n\n<p>Without a doubt, a very dangerous threat, but everything can be avoided. Having a contingency plan is always essential to face these threats, prepare, educate, etc., the employees, hire experts in the security area, and many other ways.<\/p>\n\n\n\n<p>See also:<br><a href=\"https:\/\/truxgoservers.com\/blog\/moriya-is-a-new-rootkit-that-uses-back-doors\/\">Moriya is a new rootkit that uses back doors<\/a><br><a href=\"https:\/\/truxgoservers.com\/blog\/why-cybercriminals-made-attacks-on-these-sectors\/\">Why cybercriminals made attacks on these sectors?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are putting more and more effort and creativity into carrying out attacks. Therefore, they prefer much more attractive targets such as organizations. Advanced Persistent Threats (APT) are proof of this. As the name \u201cadvanced\u201d suggests, an advanced persistent threat (APT) uses continuous, clandestine and advanced hacking techniques to gain access to a system and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2789,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[36],"class_list":["post-2788","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APT - A potentially harmful cyberattack method - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"Companies are always in danger as they handle large sums of money or information and one of the most worrying threats for them is APT....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT - A potentially harmful cyberattack method - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"Companies are always in danger as they handle large sums of money or information and one of the most worrying threats for them is APT....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-22T03:40:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-22T03:40:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/05\/APT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1868\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"APT &#8211; A potentially harmful cyberattack method\",\"datePublished\":\"2021-05-22T03:40:52+00:00\",\"dateModified\":\"2021-05-22T03:40:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/\"},\"wordCount\":488,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/APT.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/\",\"name\":\"APT - A potentially harmful cyberattack method - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/APT.jpg\",\"datePublished\":\"2021-05-22T03:40:52+00:00\",\"dateModified\":\"2021-05-22T03:40:53+00:00\",\"description\":\"Companies are always in danger as they handle large sums of money or information and one of the most worrying threats for them is APT....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/APT.jpg\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/APT.jpg\",\"width\":1868,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/apt-a-potentially-harmful-cyberattack-method\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT &#8211; A potentially harmful cyberattack method\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"APT - A potentially harmful cyberattack method - Truxgo Server Blog","description":"Companies are always in danger as they handle large sums of money or information and one of the most worrying threats for them is APT....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/","og_locale":"es_MX","og_type":"article","og_title":"APT - A potentially harmful cyberattack method - Truxgo Server Blog","og_description":"Companies are always in danger as they handle large sums of money or information and one of the most worrying threats for them is APT....","og_url":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/","og_site_name":"Truxgo Server Blog","article_published_time":"2021-05-22T03:40:52+00:00","article_modified_time":"2021-05-22T03:40:53+00:00","og_image":[{"width":1868,"height":1080,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/05\/APT.jpg","type":"image\/jpeg"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"APT &#8211; A potentially harmful cyberattack method","datePublished":"2021-05-22T03:40:52+00:00","dateModified":"2021-05-22T03:40:53+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/"},"wordCount":488,"commentCount":0,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/05\/APT.jpg","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/","url":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/","name":"APT - A potentially harmful cyberattack method - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/05\/APT.jpg","datePublished":"2021-05-22T03:40:52+00:00","dateModified":"2021-05-22T03:40:53+00:00","description":"Companies are always in danger as they handle large sums of money or information and one of the most worrying threats for them is APT....","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/05\/APT.jpg","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/05\/APT.jpg","width":1868,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/apt-a-potentially-harmful-cyberattack-method\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"APT &#8211; A potentially harmful cyberattack method"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=2788"}],"version-history":[{"count":2,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2788\/revisions"}],"predecessor-version":[{"id":2818,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/2788\/revisions\/2818"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/2789"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=2788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=2788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=2788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}