All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "60740",
"signature": "Article:60740",
"url": "https://staging.dailymaverick.co.za/article/2017-05-22-iss-today-be-ready-for-the-next-global-cyberattack/",
"shorturl": "https://staging.dailymaverick.co.za/article/60740",
"slug": "iss-today-be-ready-for-the-next-global-cyberattack",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "ISS Today: Be ready for the next global cyberattack",
"firstPublished": "2017-05-22 10:39:57",
"lastUpdate": "2017-05-22 10:40:09",
"categories": [
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "38",
"name": "World",
"signature": "Category:38",
"slug": "world",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/world/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 5213,
"contents": "<p><span class=\"s1\">First published by </span><a href=\"file:///Users/jilliangreen/Dropbox/DM%20production%202016/2017/C:/Users/Diane/Desktop/Daily%20Maverick%20subbing/ISS%20Today:%20Be%20ready%20for%20the%20next%20global%20cyberattackGovernments%20and%20technology%20companies%20must%20collaborate%20to%20prevent%20attacks%20and%20prosecute%20alleged%20hackers.%20By%20Albertus%20Schoeman%20for%20ISS%20TODAY.First%20published%20on%20ISS%20Today.On%2012%20May,%20more%20than%20150%20countries%20were%20attacked%20by%20ransomware%20with%20over%20200%20000%20computers%20infected.%20Ransomware%20is%20a%20type%20of%20malicious%20software%20(malware)%20that%20encrypts%20a%20computer’s%20data%20until%20a%20ransom%20is%20paid.%20In%20this%20case,%20$300%20worth%20of%20the%20cryptocurrency%20bitcoin%20was%20demanded%20for%20infected%20computers.%20While%20the%20scale%20of%20the%20attack%20makes%20it%20seem%20spectacular,%20flaws%20found%20in%20the%20ransomware%20showed%20that%20the%20attacker%20was%20relatively%20amateur%20–%20cybersecurity%20specialists%20temporarily%20stopped%20the%20spread%20of%20the%20ransomware%20using%20a%20‘kill-switch’%20that%20stops%20the%20software%20from%20running.%20But%20new%20adaptations%20of%20the%20code%20are%20already%20being%20found,%20and%20if%20the%20world%20was%20this%20vulnerable%20to%20a%20relatively%20unsophisticated%20attack,%20what%20kind%20of%20damage%20could%20an%20experienced%20group%20of%20hackers%20cause%3F%20And%20what%20can%20be%20done%20to%20prevent%20future%20attacks%3F%20Malware%20can%20only%20infect%20a%20computer%20if%20there%20is%20a%20vulnerability%20in%20the%20system%20such%20as%20a%20design%20flaw%20in%20the%20programming%20code.%20This%20particular%20type%20of%20ransomware%20was%20a%20worm,%20which%20is%20a%20form%20of%20malware%20that%20spreads%20by%20searching%20a%20network%20for%20other%20vulnerable%20computers%20to%20infect%20them%20as%20well.%20The%20specific%20vulnerability%20that%20this%20worm%20searched%20for%20is%20one%20of%20the%20‘exploits’%20for%20old%20Windows%20operating%20systems%20identified%20by%20the%20US%20National%20Security%20Agency.%20An%20exploit%20is%20a%20recognised%20vulnerability%20in%20a%20system%20that%20can%20be%20used%20to%20bypass%20its%20security.%20Security%20agencies%20gather%20these%20to%20use%20for%20hacking%20and%20spying%20on%20criminals%20or%20other%20governments.%20This%20particular%20exploit%20was%20leaked%20in%20mid-April%20by%20the%20hacking%20group%20Shadow%20Brokers.%20The%20reason%20why%20the%20ransomware%20spread%20so%20quickly%20is%20a%20consequence%20of%20a%20widespread%20lack%20of%20basic%20cybersecurity.%20Four%20weeks%20before%20the%20leak,%20Microsoft%20released%20an%20update%20to%20fix%20it.%20This%20means%20that%20most%20of%20the%20infected%20computers%20had%20not%20implemented%20security%20updates%20for%20more%20than%20two%20months.%20The%20rest%20of%20the%20infected%20computers%20were%20still%20running%20the%20outdated%20Windows%20XP%20operating%20system,%20which%20Microsoft%20stopped%20providing%20security%20updates%20for%20in%20April%202014.%20The%2012%20May%20attack%20could%20have%20been%20avoided%20by%20following%20a%20few%20basic%20cybersecurity%20principles%20like%20regularly%20running%20software%20updates.Good%20cybersecurity%20requires%20contingency%20planning.%20Just%20like%20any%20organisation%20must%20have%20emergency%20evacuation%20plans%20and%20fire%20drills,%20organisations%20and%20individuals%20should%20be%20prepared%20for%20cyberattacks.%20This%20entails%20regularly%20testing%20cybersecurity%20measures%20and,%20for%20organisations,%20can%20include%20having%20experts%20try%20to%20hack%20into%20their%20systems.%20In%20the%20case%20of%20ransomware,%20data%20should%20be%20backed%20up%20and%20stored%20separately%20from%20the%20main%20network%20where%20it%20can’t%20be%20reached%20by%20malware.%20Organisations%20should%20have%20plans%20in%20place%20for%20how%20to%20maintain%20functionality%20without%20connectivity,%20such%20as%20having%20printed%20records.%20Cybersecurity%20also%20depends%20on%20individuals%20using%20computers%20in%20a%20responsible%20way,%20in%20what%20is%20termed%20‘cyber%20hygiene’.%20Organisations%20should%20teach%20staff%20basic%20cybersecurity%20principles%20like%20choosing%20complex%20passwords,%20not%20having%20the%20same%20passwords%20for%20different%20logins%20and%20using%20two-factor%20authentication%20to%20verify%20when%20a%20user%20has%20logged%20in.%20Individuals%20should%20also%20learn%20to%20recognise%20suspicious%20documents%20or%20links%20where%20the%20source%20has%20not%20been%20verified%20and%20could%20contain%20malware.%20Governments%20have%20a%20critical%20role%20to%20play%20in%20maintaining%20cybersecurity%20as%20well.%20In%20Africa,%20many%20countries%20still%20lack%20appropriate%20legislation%20to%20prosecute%20cybercrimes.%20While%20tracking%20down%20cybercriminals%20can%20be%20difficult,%20many%20perpetrators%20who%20have%20been%20traced%20haven’t%20been%20prosecuted%20because%20of%20a%20lack%20of%20legislation%20to%20prosecute%20cybercrimes.%20Establishing%20the%20necessary%20legislation%20and%20international%20cooperation%20agreements%20is%20an%20important%20step%20towards%20addressing%20cybercrime.%20This%20needs%20to%20be%20supported%20by%20practical%20co-ordination%20mechanisms%20such%20as%20joint%20working%20groups,%20and%20the%20sharing%20of%20intelligence%20and%20techniques%20on%20combating%20cybercrime.%20Companies%20should%20be%20encouraged%20or%20compelled%20to%20disclose%20details%20of%20cyberattacks%20to%20help%20others%20prevent%20and%20combat%20future%20attacks.There%20are%20also%20serious%20deficits%20in%20the%20skills%20for%20cyber%20defence%20and%20the%20tracing%20of%20perpetrators.%20The%20Center%20for%20Strategic%20and%20International%20Studies%20estimates%20that%20by%202019,%201%20to%202%20million%20cybersecurity%20positions%20will%20remain%20unfilled.%20Governments%20should%20work%20in%20collaboration%20with%20technology%20companies%20to%20fill%20this%20gap%20and%20develop%20a%20new%20generation%20of%20cybersecurity%20professionals.In%202016,%20an%20estimated%20$1%20billion%20was%20paid%20to%20unblock%20ransomware%3B%20and%20in%202015,%20ransomware%20called%20CryptoLocker%20extorted%20more%20than%20$325%20million.Based%20on%20the%20tracking%20of%20bitcoin%20addresses%20associated%20with%20the%2012%20May%20attack,%20the%20cybercriminals%20have%20only%20managed%20to%20extort%20about%20$100%20000%20to%20date.%20The%20effects%20were%20relatively%20small,%20besides%20the%20disruption%20it%20caused.%20But%20if%20lessons%20aren’t%20learnt%20from%20this%20attack,%20the%20next%20one%20could%20be%20much%20worse.%20DMAlbertus%20Schoeman,%20Consultant,%20Transnational%20Threats%20and%20International%20Crime%20Programme,%20ISS\">ISS Today</a></p>\r\n\r\n<p><span class=\"s1\">On 12 May, more than 150 countries were attacked by ransomware with over 200,000 computers infected. Ransomware is a type of malicious software (malware) that encrypts a computer’s data until a ransom is paid. In this case, $300 worth of the cryptocurrency <a href=\"https://issafrica.org/iss-today/rethinking-money-how-can-africa-benefit-from-bitcoin\"><span class=\"s2\">bitcoin</span></a></span> was demanded for infected computers.</p>\r\n<p><span class=\"s1\">While the scale of the attack makes it seem spectacular, flaws found in the ransomware <a href=\"https://www.wired.com/2017/05/wannacry-ransomware-hackers-made-real-amateur-mistakes/\"><span class=\"s2\">showed</span></a></span> that the attacker was relatively amateur – cybersecurity specialists temporarily stopped the spread of the ransomware using a “kill-switch” that stops the software from running.</p>\r\n<p><span class=\"s1\">But new adaptations of the code are already being found, and if the world was this vulnerable to a relatively unsophisticated attack, what kind of damage could an experienced group of hackers cause? And what can be done to prevent future attacks? </span></p>\r\n<p><span class=\"s1\">Malware can only infect a computer if there is a vulnerability in the system such as a design flaw in the programming code. This particular type of ransomware was a worm, which is a form of malware that spreads by searching a network for other vulnerable computers to infect them as well. </span></p>\r\n<p><span class=\"s1\">The specific vulnerability that this worm searched for is one of the “exploits” for old Windows operating systems <a href=\"https://arstechnica.com/security/2017/05/an-nsa-derived-ransomware-worm-is-shutting-down-computers-worldwide/\"><span class=\"s2\">identified</span></a></span> by the US National Security Agency. An exploit is a recognised vulnerability in a system that can be used to bypass its security. Security agencies gather these to use for hacking and spying on criminals or other governments. This particular exploit was leaked in mid-April by the hacking group Shadow Brokers.</p>\r\n<p><span class=\"s1\">The reason why the ransomware spread so quickly is a consequence of a widespread lack of basic cybersecurity. Four weeks before the leak, Microsoft released an update to fix it. This means that most of the infected computers had not implemented security updates for more than two months. The rest of the infected computers were still running the outdated Windows XP operating system, which Microsoft stopped providing security updates for in April 2014. </span></p>\r\n<p><span class=\"s1\">The 12 May attack could have been avoided by following a few basic cybersecurity principles like regularly running software updates.</span></p>\r\n<p><span class=\"s1\">Good cybersecurity requires contingency planning. Just like any organisation must have emergency evacuation plans and fire drills, organisations and individuals should be prepared for cyberattacks. This entails regularly testing cybersecurity measures and, for organisations, can include having experts try to hack into their systems. </span></p>\r\n<p><span class=\"s1\">In the case of ransomware, data should be backed up and stored separately from the main network where it can’t be reached by malware. Organisations should have plans in place for how to maintain functionality without connectivity, such as having printed records. </span></p>\r\n<p><span class=\"s1\">Cybersecurity also depends on individuals using computers in a responsible way, in what is termed “cyber hygiene”. Organisations should teach staff basic cybersecurity principles like choosing complex passwords, not having the same passwords for different logins and using two-factor authentication to verify when a user has logged in. Individuals should also learn to recognise suspicious documents or links where the source has not been verified and could contain malware. </span></p>\r\n<p><span class=\"s1\">Governments have a critical role to play in maintaining cybersecurity as well. In Africa, many countries still lack appropriate legislation to prosecute cybercrimes. While tracking down cybercriminals can be difficult, many perpetrators who have been traced haven’t been prosecuted because of a lack of legislation to prosecute cybercrimes. </span></p>\r\n<p><span class=\"s1\">Establishing the necessary legislation and international cooperation agreements is an important step towards addressing cybercrime. This needs to be supported by practical co-ordination mechanisms such as joint working groups, and the sharing of intelligence and techniques on combating cybercrime. Companies should be encouraged or compelled to disclose details of cyberattacks to help others prevent and combat future attacks.</span></p>\r\n<p><span class=\"s1\">There are also serious deficits in the skills for cyber defence and the tracing of perpetrators. The Centre for Strategic and International Studies <a href=\"https://www.csis.org/programs/technology-policy-program/cybersecurity/other-projects-cybersecurity/cybersecurity\"><span class=\"s2\">estimates</span></a></span> that by 2019, 1 to 2-million cybersecurity positions will remain unfilled. Governments should work in collaboration with technology companies to fill this gap and develop a new generation of cybersecurity professionals.</p>\r\n<p><span class=\"s1\">In 2016, an estimated $1-billion was paid to unblock ransomware; and in 2015, ransomware called</span><span class=\"s3\"> <a href=\"http://thehackernews.com/2015/10/cryptowall-ransomware.html\"><span class=\"s2\">CryptoLocker</span></a></span> <span class=\"s1\">extorted more than $325-million</span><span class=\"s3\">.</span></p>\r\n<p><span class=\"s1\">Based on the tracking of bitcoin addresses associated with the 12 May attack, the cybercriminals have only managed to extort about <a href=\"https://www.elliptic.co/wannacry/\"><span class=\"s2\">$100,000</span></a></span> to date. The effects were relatively small, besides the disruption it caused. But if lessons aren’t learnt from this attack, the next one could be much worse. <span style=\"text-decoration: underline;\"><span class=\"s4\"><b>DM</b></span></span></p>\r\n<p><span class=\"s1\"><i>Albertus Schoeman is a Consultant, Transnational Threats and International Crime Programme, ISS.</i></span></p>\r\n<p><i>Photo: People use computers at a cyber cafe in Taipei, Taiwan, 13 May 2017. According to news reports, a 'Ransomware' cyber attack has hit computers in 99 countries with the attacker demanding 300 US dollars in Bitcoin to decrypt the files. Photo: EPA/DAVID CHANG</i></p>",
"teaser": "ISS Today: Be ready for the next global cyberattack",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "939",
"name": "ISS Today",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/isstoday/",
"editorialName": "isstoday",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "2071",
"name": "Prevention",
"url": "https://staging.dailymaverick.co.za/keyword/prevention/",
"slug": "prevention",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Prevention",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "2073",
"name": "Safety",
"url": "https://staging.dailymaverick.co.za/keyword/safety/",
"slug": "safety",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Safety",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "5505",
"name": "Security",
"url": "https://staging.dailymaverick.co.za/keyword/security/",
"slug": "security",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Security",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "9081",
"name": "Computer security",
"url": "https://staging.dailymaverick.co.za/keyword/computer-security/",
"slug": "computer-security",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Computer security",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10244",
"name": "Cybercrime",
"url": "https://staging.dailymaverick.co.za/keyword/cybercrime/",
"slug": "cybercrime",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybercrime",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12439",
"name": "Security breaches",
"url": "https://staging.dailymaverick.co.za/keyword/security-breaches/",
"slug": "security-breaches",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Security breaches",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12440",
"name": "Ransomware",
"url": "https://staging.dailymaverick.co.za/keyword/ransomware/",
"slug": "ransomware",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Ransomware",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12441",
"name": "WannaCry ransomware attack",
"url": "https://staging.dailymaverick.co.za/keyword/wannacry-ransomware-attack/",
"slug": "wannacry-ransomware-attack",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "WannaCry ransomware attack",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12443",
"name": "Malware",
"url": "https://staging.dailymaverick.co.za/keyword/malware/",
"slug": "malware",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Malware",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12444",
"name": "Patch",
"url": "https://staging.dailymaverick.co.za/keyword/patch/",
"slug": "patch",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Patch",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12446",
"name": "Cyberattacks on Ukraine",
"url": "https://staging.dailymaverick.co.za/keyword/cyberattacks-on-ukraine/",
"slug": "cyberattacks-on-ukraine",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cyberattacks on Ukraine",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "5158",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/Iss-Cyber.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/pfRGhJhMpH9HBiaNU6CghUmmfKg=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Iss-Cyber.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/Rb0QBrnrT1R-ZS4P2Wst7Z9_YQc=/450x0/smart/file/dailymaverick/wp-content/uploads/Iss-Cyber.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/GJsw3iRwDDBrt7oTjTVDhncfst4=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Iss-Cyber.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/C89YHZAbPoUXbFZsDVqi5C_devo=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Iss-Cyber.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/NQ9__PHz8Tv0oUh0ZsHuLhkPhAE=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Iss-Cyber.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/pfRGhJhMpH9HBiaNU6CghUmmfKg=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Iss-Cyber.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/Rb0QBrnrT1R-ZS4P2Wst7Z9_YQc=/450x0/smart/file/dailymaverick/wp-content/uploads/Iss-Cyber.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/GJsw3iRwDDBrt7oTjTVDhncfst4=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Iss-Cyber.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/C89YHZAbPoUXbFZsDVqi5C_devo=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Iss-Cyber.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/NQ9__PHz8Tv0oUh0ZsHuLhkPhAE=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Iss-Cyber.jpg",
"type": "image"
}
],
"summary": "Governments and technology companies must collaborate to prevent attacks and prosecute alleged hackers. By Albertus Schoeman for ISS TODAY.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "ISS Today: Be ready for the next global cyberattack",
"search_description": "<p><span class=\"s1\">First published by </span><a href=\"file:///Users/jilliangreen/Dropbox/DM%20production%202016/2017/C:/Users/Diane/Desktop/Daily%20Maverick%20subbing/ISS%20Today:%20Be%20ready%20for%",
"social_title": "ISS Today: Be ready for the next global cyberattack",
"social_description": "<p><span class=\"s1\">First published by </span><a href=\"file:///Users/jilliangreen/Dropbox/DM%20production%202016/2017/C:/Users/Diane/Desktop/Daily%20Maverick%20subbing/ISS%20Today:%20Be%20ready%20for%",
"social_image": ""
},
"cached": true,
"access_allowed": true
}