{"id":248,"date":"2025-09-29T12:05:15","date_gmt":"2025-09-29T12:05:15","guid":{"rendered":"https:\/\/ntrigo.com\/blog\/?p=248"},"modified":"2026-01-14T12:39:53","modified_gmt":"2026-01-14T12:39:53","slug":"supply-chain-ransomware-how-third-party-attacks-impact-major-companies","status":"publish","type":"post","link":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/","title":{"rendered":"Supply Chain Ransomware: How Third-Party Attacks Impact Major Companies"},"content":{"rendered":"\n<p>In recent years, ransomware attacks have become a familiar threat, but in recent months a particularly dangerous pattern has become clearer: attacks aimed at one organization that end up impacting dozens or even hundreds of other companies through an external supplier.<\/p>\n\n\n\n<p>Instead of attempting to directly breach large, well-protected companies, attackers are increasingly targeting software vendors, IT providers, and external service companies. These suppliers often have access to sensitive systems and business data of many customers, making them an easier entry point.<\/p>\n\n\n\n<p>One notable example occurred in late August, when the Swedish HR systems provider Milj\u00f6data was hit by a ransomware attack. Although this was a single company, the impact quickly spread to major organizations that relied on its services, including Volvo Group and many local authorities in Sweden. In early September, reports began to emerge about the scale of the data exposure, which included sensitive personal information of employees and other individuals.<\/p>\n\n\n\n<p>This is a key characteristic of supply chain attacks:<br>the incident starts with one supplier, but the consequences cascade across its entire customer base. Within a short time, organizations that did not experience any direct breach find themselves dealing with data leaks, system outages, regulatory inquiries, and crisis management.<\/p>\n\n\n\n<p>Over the past two months, more and more similar cases have been reported across Europe and North America, mainly involving enterprise software vendors, cloud service providers, and managed service operators. The trend is clear: attackers are looking for the weakest link in a complex organizational ecosystem, not necessarily the largest target.<\/p>\n\n\n\n<p>Beyond the technical damage, the real impact is business-related:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Disruption of critical processes<\/li>\n\n\n\n<li>Exposure of employee and customer data<\/li>\n\n\n\n<li>Delays across projects and supply chains<\/li>\n\n\n\n<li>Damage to reputation and trust<\/li>\n\n\n\n<li>Direct and indirect costs that continue to accumulate months after the incident<\/li>\n<\/ul>\n\n\n\n<p><strong>Recent events highlight that this is a systemic risk, not an isolated one.<\/strong><br>As organizations rely more heavily on external services and interconnected systems, the boundaries of responsibility and security become blurred, and the impact of a single attack can be far broader than initially expected.<\/p>\n\n\n\n<p>Supply chain ransomware attacks are no longer \u201cthe supplier\u2019s problem.\u201d They have become a broad business issue that often starts far from the organization itself, but reaches it very quickly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent years, ransomware attacks have become a familiar threat, but in recent months a particularly dangerous pattern has become clearer: attacks aimed at one&hellip;<\/p>\n","protected":false},"author":1,"featured_media":249,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Supply Chain Ransomware: How Third-Party Attacks Impact Major Companies - NTrigo Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Supply Chain Ransomware: How Third-Party Attacks Impact Major Companies - NTrigo Security Blog\" \/>\n<meta property=\"og:description\" content=\"In recent years, ransomware attacks have become a familiar threat, but in recent months a particularly dangerous pattern has become clearer: attacks aimed at one&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/\" \/>\n<meta property=\"og:site_name\" content=\"NTrigo Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nTrigoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-29T12:05:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-14T12:39:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ntrigo.com\/blog\/wp-content\/uploads\/2026\/01\/20260114_1935_Image-Generation_remix_01key81542fpy8zrgjnqgps1vy.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/#\\\/schema\\\/person\\\/ed9591b6fc8456fc58fae61be7cb0770\"},\"headline\":\"Supply Chain Ransomware: How Third-Party Attacks Impact Major Companies\",\"datePublished\":\"2025-09-29T12:05:15+00:00\",\"dateModified\":\"2026-01-14T12:39:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/\"},\"wordCount\":382,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/20260114_1935_Image-Generation_remix_01key81542fpy8zrgjnqgps1vy.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/\",\"url\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/\",\"name\":\"Supply Chain Ransomware: How Third-Party Attacks Impact Major Companies - NTrigo Security Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/20260114_1935_Image-Generation_remix_01key81542fpy8zrgjnqgps1vy.png\",\"datePublished\":\"2025-09-29T12:05:15+00:00\",\"dateModified\":\"2026-01-14T12:39:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/20260114_1935_Image-Generation_remix_01key81542fpy8zrgjnqgps1vy.png\",\"contentUrl\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/20260114_1935_Image-Generation_remix_01key81542fpy8zrgjnqgps1vy.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Supply Chain Ransomware: How Third-Party Attacks Impact Major Companies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/\",\"name\":\"NTrigo Security Blog\",\"description\":\"NTrigo Security Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/#organization\",\"name\":\"NTrigo Security Blog\",\"url\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/NTrigo-Blog.png\",\"contentUrl\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/NTrigo-Blog.png\",\"width\":148,\"height\":95,\"caption\":\"NTrigo Security Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/nTrigoSoftware\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/#\\\/schema\\\/person\\\/ed9591b6fc8456fc58fae61be7cb0770\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0049ab18a7fc704da3bcaaaaf62c9b51301fd388c1e23acc3c15e39b6279ef6a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0049ab18a7fc704da3bcaaaaf62c9b51301fd388c1e23acc3c15e39b6279ef6a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0049ab18a7fc704da3bcaaaaf62c9b51301fd388c1e23acc3c15e39b6279ef6a?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/ntrigo.com\\\/blog\"],\"url\":\"https:\\\/\\\/ntrigo.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Supply Chain Ransomware: How Third-Party Attacks Impact Major Companies - NTrigo Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/","og_locale":"en_US","og_type":"article","og_title":"Supply Chain Ransomware: How Third-Party Attacks Impact Major Companies - NTrigo Security Blog","og_description":"In recent years, ransomware attacks have become a familiar threat, but in recent months a particularly dangerous pattern has become clearer: attacks aimed at one&hellip;","og_url":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/","og_site_name":"NTrigo Security Blog","article_publisher":"https:\/\/www.facebook.com\/nTrigoSoftware\/","article_published_time":"2025-09-29T12:05:15+00:00","article_modified_time":"2026-01-14T12:39:53+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/ntrigo.com\/blog\/wp-content\/uploads\/2026\/01\/20260114_1935_Image-Generation_remix_01key81542fpy8zrgjnqgps1vy.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/#article","isPartOf":{"@id":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/"},"author":{"name":"admin","@id":"https:\/\/ntrigo.com\/blog\/#\/schema\/person\/ed9591b6fc8456fc58fae61be7cb0770"},"headline":"Supply Chain Ransomware: How Third-Party Attacks Impact Major Companies","datePublished":"2025-09-29T12:05:15+00:00","dateModified":"2026-01-14T12:39:53+00:00","mainEntityOfPage":{"@id":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/"},"wordCount":382,"commentCount":0,"publisher":{"@id":"https:\/\/ntrigo.com\/blog\/#organization"},"image":{"@id":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/#primaryimage"},"thumbnailUrl":"https:\/\/ntrigo.com\/blog\/wp-content\/uploads\/2026\/01\/20260114_1935_Image-Generation_remix_01key81542fpy8zrgjnqgps1vy.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/","url":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/","name":"Supply Chain Ransomware: How Third-Party Attacks Impact Major Companies - NTrigo Security Blog","isPartOf":{"@id":"https:\/\/ntrigo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/#primaryimage"},"image":{"@id":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/#primaryimage"},"thumbnailUrl":"https:\/\/ntrigo.com\/blog\/wp-content\/uploads\/2026\/01\/20260114_1935_Image-Generation_remix_01key81542fpy8zrgjnqgps1vy.png","datePublished":"2025-09-29T12:05:15+00:00","dateModified":"2026-01-14T12:39:53+00:00","breadcrumb":{"@id":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/#primaryimage","url":"https:\/\/ntrigo.com\/blog\/wp-content\/uploads\/2026\/01\/20260114_1935_Image-Generation_remix_01key81542fpy8zrgjnqgps1vy.png","contentUrl":"https:\/\/ntrigo.com\/blog\/wp-content\/uploads\/2026\/01\/20260114_1935_Image-Generation_remix_01key81542fpy8zrgjnqgps1vy.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/ntrigo.com\/blog\/supply-chain-ransomware-how-third-party-attacks-impact-major-companies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ntrigo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Supply Chain Ransomware: How Third-Party Attacks Impact Major Companies"}]},{"@type":"WebSite","@id":"https:\/\/ntrigo.com\/blog\/#website","url":"https:\/\/ntrigo.com\/blog\/","name":"NTrigo Security Blog","description":"NTrigo Security Blog","publisher":{"@id":"https:\/\/ntrigo.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ntrigo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ntrigo.com\/blog\/#organization","name":"NTrigo Security Blog","url":"https:\/\/ntrigo.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ntrigo.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/ntrigo.com\/blog\/wp-content\/uploads\/2026\/01\/NTrigo-Blog.png","contentUrl":"https:\/\/ntrigo.com\/blog\/wp-content\/uploads\/2026\/01\/NTrigo-Blog.png","width":148,"height":95,"caption":"NTrigo Security Blog"},"image":{"@id":"https:\/\/ntrigo.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nTrigoSoftware\/"]},{"@type":"Person","@id":"https:\/\/ntrigo.com\/blog\/#\/schema\/person\/ed9591b6fc8456fc58fae61be7cb0770","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0049ab18a7fc704da3bcaaaaf62c9b51301fd388c1e23acc3c15e39b6279ef6a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0049ab18a7fc704da3bcaaaaf62c9b51301fd388c1e23acc3c15e39b6279ef6a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0049ab18a7fc704da3bcaaaaf62c9b51301fd388c1e23acc3c15e39b6279ef6a?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/ntrigo.com\/blog"],"url":"https:\/\/ntrigo.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/ntrigo.com\/blog\/wp-json\/wp\/v2\/posts\/248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ntrigo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ntrigo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ntrigo.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ntrigo.com\/blog\/wp-json\/wp\/v2\/comments?post=248"}],"version-history":[{"count":1,"href":"https:\/\/ntrigo.com\/blog\/wp-json\/wp\/v2\/posts\/248\/revisions"}],"predecessor-version":[{"id":250,"href":"https:\/\/ntrigo.com\/blog\/wp-json\/wp\/v2\/posts\/248\/revisions\/250"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ntrigo.com\/blog\/wp-json\/wp\/v2\/media\/249"}],"wp:attachment":[{"href":"https:\/\/ntrigo.com\/blog\/wp-json\/wp\/v2\/media?parent=248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ntrigo.com\/blog\/wp-json\/wp\/v2\/categories?post=248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ntrigo.com\/blog\/wp-json\/wp\/v2\/tags?post=248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}