{"id":129600,"date":"2025-03-21T08:02:09","date_gmt":"2025-03-21T13:02:09","guid":{"rendered":"https:\/\/www.controleng.com\/?p=129600"},"modified":"2025-04-23T19:00:10","modified_gmt":"2025-04-24T00:00:10","slug":"new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems","status":"publish","type":"post","link":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/","title":{"rendered":"New cybersecurity report reveals year-long intrusion in utility systems"},"content":{"rendered":"\n<p>A\u00a0<a href=\"http:\/\/email2.madisonalexanderpr.com\/c\/eJwcjr1u3DAQBp-G6iIslxRFFSyCJKrSpUgpLHeXPsH6g8Tz2W9v3LXfN8CMpDhA5_tGk-29jQNE65pbQuTsNBMjR8iBc8aSCxWNEBxxaOaEgB0462x0zrmW-qELIec8iAiyNR5WkvnaN1r0kzbR8zhb3tdmSbdaj8u4nwZHg-Pj8WjlpLf9et7P4fjB-1Z1qwbH-7HsJJfB8Sk0OIIzOP5-8dPfudZF675Nfxbles48_aeq5_SLLv1X7_LVHlKaM623_XpX44GLriozvUpq6gpEy704zEAWIGII2HeUS8eqAzY1CQMjiSKID6WQ9oMjm1F8Dh7ENx8JvwMAAP__HJVl_Q\" target=\"_blank\" rel=\"noreferrer noopener\">report<\/a>\u00a0published by cybersecurity firm Dragos details how Chinese hackers linked to the Volt <a href=\"https:\/\/www.controleng.com\/how-to-mitigate-the-ongoing-salt-typhoon-telecom-hack-cisa\/\" target=\"_blank\" rel=\"noreferrer noopener\">Typhoon<\/a> group maintained access to a major power and water company near Boston, for nearly a year.<\/p>\n\n\n\n<p>The breach at Littleton Electric Light &amp; Water Department occurred between February and late November 2023, when the FBI notified the utility of the intrusion.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline-1024x576.jpg\" alt=\"\" class=\"wp-image-129601\" srcset=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline-1024x576.jpg 1024w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline-300x169.jpg 300w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline-768x432.jpg 768w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline-900x506.jpg 900w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline-400x225.jpg 400w, https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em style=\"font-size: 0.9rem; background-color: var(--wp--preset--color--background); color: var(--wp--preset--color--main); font-family: var(--wp--preset--font-family--primary-font); display: inline !important;\">Courtesy: Control Engineering, using information from Dragos<\/em><\/figcaption><\/figure>\n\n\n\n<p>The activity was assessed as part of a broader campaign linked to the Chinese government \u201cseeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against U.S. critical infrastructure in the event of a major crisis or conflict with the United States,\u201d CISA and the FBI have repeatedly warned.<\/p>\n\n\n\n<p>\u201cThe significance of the discovery of this attack is that it highlights that the adversary not only aimed to maintain persistent access to the victim&#8217;s environment for a long tenure, but also were aiming to exfiltrate specific data related to OT operating procedures and spatial layout data relating to energy grid operations,\u201d a Dragos expert said.<\/p>\n\n\n\n<p>The incident led to increased cybersecurity measures at Littleton Electric Light &amp; Water Department, resulting in the deployment of the Dragos Platform to improve OT network monitoring, threat detection, and response.<\/p>\n\n\n\n<p>U.S. law enforcement reports that Volt Typhoon has accessed multiple critical infrastructure organizations in the U.S., Guam, and areas near U.S. military bases, potentially to disrupt military operations.<\/p>\n\n\n\n<p>Experts offer perspectives on the matter.<\/p>\n\n\n\n<p>Ted Miracco, CEO, <a href=\"https:\/\/approov.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">Approov<\/a>:\u00a0\u201cVolt Typhoon\u2019s 300-day foothold in the U.S. electric grid was a blueprint for future sabotage. Against nation-state actors this sophisticated, only a Zero Trust, intelligence-driven defense can outmatch their persistence. Assume compromise, segment ruthlessly, and hunt threats before they strike.\u201d<\/p>\n\n\n\n<p>Evan Dornbush,&nbsp;former NSA cybersecurity expert:&nbsp;\u201cAttackers have an unfair and perpetual advantage because they monopolize output from the vulnerability research community. Until defenders can effectively engage the audience that produces the zero day exploits attackers rely on, defenders will always be reacting post-attack rather than taking proactive measures.<\/p>\n\n\n\n<p>\u201cThe re-emergence of network threat detection is critical in adversary discovery.&nbsp;While overall I&#8217;m an AI skeptic, if there&#8217;s one area that continues to show promise, consider investing in AI-based NDR solutions, which Dragos&#8217; marketing team reminds us can be very effective at picking out lateral movement and other abnormal traffic from your network, far more efficiently than log file analysis.&#8221;<\/p>\n\n\n\n<p>Dragos focuses on protecting industrial control systems (ICS) and operational technology (OT) from cyber threats and collaborates with government agencies and private sector partners.<\/p>\n\n\n\n<p>Edited by Puja Mitra, WTWH Media, for <em>Control Engineering<\/em>, from a <a href=\"https:\/\/www.dragos.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dragos<\/a> news release.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Dragos report details how Volt Typhoon hackers accessed a Boston-area utility for a year, prompting cybersecurity upgrades.<\/p>\n","protected":false},"author":1371,"featured_media":129601,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[109309,109314],"tags":[109340,109809,109994],"tracking-metrics":[],"display-location":[],"class_list":{"2":"type-post"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New cybersecurity report reveals year-long intrusion in utility systems - Control Engineering<\/title>\n<meta name=\"description\" content=\"A Dragos report details how Volt Typhoon hackers accessed a Boston-area utility for a year, prompting cybersecurity upgrades.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New cybersecurity report reveals year-long intrusion in utility systems - Control Engineering\" \/>\n<meta property=\"og:description\" content=\"A Dragos report details how Volt Typhoon hackers accessed a Boston-area utility for a year, prompting cybersecurity upgrades.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Control Engineering\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-21T13:02:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-24T00:00:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dragos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:site\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dragos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/\"},\"author\":{\"name\":\"Dragos\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/bc4741211e4ab3344c9b62f2b03cdf3f\"},\"headline\":\"New cybersecurity report reveals year-long intrusion in utility systems\",\"datePublished\":\"2025-03-21T13:02:09+00:00\",\"dateModified\":\"2025-04-24T00:00:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/\"},\"wordCount\":448,\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline.jpg\",\"keywords\":[\"control engineering\",\"cybersecurity\",\"Volt Typhoon hack\"],\"articleSection\":[\"Hacks &amp; Attacks\",\"Industrial Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/\",\"url\":\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/\",\"name\":\"New cybersecurity report reveals year-long intrusion in utility systems - Control Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline.jpg\",\"datePublished\":\"2025-03-21T13:02:09+00:00\",\"dateModified\":\"2025-04-24T00:00:10+00:00\",\"description\":\"A Dragos report details how Volt Typhoon hackers accessed a Boston-area utility for a year, prompting cybersecurity upgrades.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#primaryimage\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline.jpg\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.controleng.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New cybersecurity report reveals year-long intrusion in utility systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.controleng.com\/#website\",\"url\":\"https:\/\/www.controleng.com\/\",\"name\":\"Control Engineering\",\"description\":\"Control Engineering covers and educates about automation, control and instrumentation technologies\",\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.controleng.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.controleng.com\/#organization\",\"name\":\"Control Engineering\",\"url\":\"https:\/\/www.controleng.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"width\":300,\"height\":93,\"caption\":\"Control Engineering\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\",\"https:\/\/x.com\/controlengtips\",\"https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/bc4741211e4ab3344c9b62f2b03cdf3f\",\"name\":\"Dragos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f06b1c6671e2e0f0a4fafd4e5b39dd39ab6a66b7a6ed1d5ef3bcda9d589c9cae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f06b1c6671e2e0f0a4fafd4e5b39dd39ab6a66b7a6ed1d5ef3bcda9d589c9cae?s=96&d=mm&r=g\",\"caption\":\"Dragos\"},\"url\":\"https:\/\/www.controleng.com\/author\/dragos\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New cybersecurity report reveals year-long intrusion in utility systems - Control Engineering","description":"A Dragos report details how Volt Typhoon hackers accessed a Boston-area utility for a year, prompting cybersecurity upgrades.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/","og_locale":"en_US","og_type":"article","og_title":"New cybersecurity report reveals year-long intrusion in utility systems - Control Engineering","og_description":"A Dragos report details how Volt Typhoon hackers accessed a Boston-area utility for a year, prompting cybersecurity upgrades.","og_url":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/","og_site_name":"Control Engineering","article_publisher":"https:\/\/www.facebook.com\/ControlEngineeringMagazine","article_published_time":"2025-03-21T13:02:09+00:00","article_modified_time":"2025-04-24T00:00:10+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline.jpg","type":"image\/jpeg"}],"author":"Dragos","twitter_card":"summary_large_image","twitter_creator":"@controlengtips","twitter_site":"@controlengtips","twitter_misc":{"Written by":"Dragos","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#article","isPartOf":{"@id":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/"},"author":{"name":"Dragos","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/bc4741211e4ab3344c9b62f2b03cdf3f"},"headline":"New cybersecurity report reveals year-long intrusion in utility systems","datePublished":"2025-03-21T13:02:09+00:00","dateModified":"2025-04-24T00:00:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/"},"wordCount":448,"publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"image":{"@id":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline.jpg","keywords":["control engineering","cybersecurity","Volt Typhoon hack"],"articleSection":["Hacks &amp; Attacks","Industrial Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/","url":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/","name":"New cybersecurity report reveals year-long intrusion in utility systems - Control Engineering","isPartOf":{"@id":"https:\/\/www.controleng.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline.jpg","datePublished":"2025-03-21T13:02:09+00:00","dateModified":"2025-04-24T00:00:10+00:00","description":"A Dragos report details how Volt Typhoon hackers accessed a Boston-area utility for a year, prompting cybersecurity upgrades.","breadcrumb":{"@id":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#primaryimage","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline.jpg","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/03\/Volt-typhoon-cyber-intrusion-and-response-timeline.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.controleng.com\/new-cybersecurity-report-reveals-year-long-intrusion-in-utility-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.controleng.com\/"},{"@type":"ListItem","position":2,"name":"New cybersecurity report reveals year-long intrusion in utility systems"}]},{"@type":"WebSite","@id":"https:\/\/www.controleng.com\/#website","url":"https:\/\/www.controleng.com\/","name":"Control Engineering","description":"Control Engineering covers and educates about automation, control and instrumentation technologies","publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.controleng.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.controleng.com\/#organization","name":"Control Engineering","url":"https:\/\/www.controleng.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","width":300,"height":93,"caption":"Control Engineering"},"image":{"@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ControlEngineeringMagazine","https:\/\/x.com\/controlengtips","https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/"]},{"@type":"Person","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/bc4741211e4ab3344c9b62f2b03cdf3f","name":"Dragos","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f06b1c6671e2e0f0a4fafd4e5b39dd39ab6a66b7a6ed1d5ef3bcda9d589c9cae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f06b1c6671e2e0f0a4fafd4e5b39dd39ab6a66b7a6ed1d5ef3bcda9d589c9cae?s=96&d=mm&r=g","caption":"Dragos"},"url":"https:\/\/www.controleng.com\/author\/dragos\/"}]}},"_links":{"self":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/129600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/users\/1371"}],"replies":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/comments?post=129600"}],"version-history":[{"count":0,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/129600\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media\/129601"}],"wp:attachment":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media?parent=129600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/categories?post=129600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tags?post=129600"},{"taxonomy":"tracking-metric","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tracking-metrics?post=129600"},{"taxonomy":"display-location","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/display-location?post=129600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}