{"id":18925,"date":"2024-12-10T10:00:00","date_gmt":"2024-12-10T09:00:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=18925"},"modified":"2025-08-12T17:58:51","modified_gmt":"2025-08-12T15:58:51","slug":"cutter","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/schneider\/","title":{"rendered":"Schneider Electronic hacked &amp; mocked"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"18925\" class=\"elementor elementor-18925\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d481a3f e-flex e-con-boxed e-con e-parent\" data-id=\"1d481a3f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c73aa0e elementor-widget elementor-widget-text-editor\" data-id=\"3c73aa0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"wp-block-heading\">Totally theatrical<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>A hacker by the name of Grep has not only stolen sensitive data from the French electrical engineering group Schneider Electric, but is also mocking the long-established company. After gaining access to the company's JIRA server through openly accessible credentials, he used a MiniOrange REST API to systematically steal user data from the system. In doing so, he captured 400,000 data records, including 75,000 unique email addresses with the full names of Schneider Electric employees and customers.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Are you prepared for cyber attacks?<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>With the <a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a> you are one step ahead of cyber threats: Strengthen your company's resistance to hacker attacks - especially in your own environment!<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Would you like to know how secure your company is? Find out with a test setup! Book now:<\/p>\n<!-- \/wp:paragraph --><!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"backgroundColor\":\"luminous-vivid-orange\"} -->\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-luminous-vivid-orange-background-color has-background wp-element-button\" href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>TEST INSTALLATION<\/strong><\/a><br \/><br \/><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Extraordinary ransom demand<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>The gag: he demanded 125,000 dollars in the form of baguettes as ransom! His group has renounced classic blackmail. Prerequisite: the company makes the incident public within 48 hours, then only half of the stolen data is published - if not, the entire material is put online.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Theatrical staging<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>The story shows the seemingly increasing theatrical staging of cybercrime. While traditional hackers still operate in secret, the new digital cyber intruders present themselves as a kind of performance artist, complete with their own brand identity and PR strategy.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>This is the second incident for Schneider Electric in 2020. Just recently, the sustainability department was the victim of a ransomware attack.<\/p>\n<!-- \/wp:paragraph --><!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"className\":\"is-style-fill\",\"style\":{\"typography\":{\"fontSize\":\"15px\"}}} --><\/div>\n<!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>This is the second time this year that Schneider Electronics has been hacked! This time 400,000 data records were stolen...<\/p>","protected":false},"author":3,"featured_media":18927,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28],"tags":[41,39,38,40,37,36],"class_list":["post-18925","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-neues-auf-der-cyberfront","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Schneider Electronic gehackt &amp; verspottet - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/cutter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Schneider Electronic gehackt &amp; verspottet - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/cutter\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-10T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T15:58:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/11\/KI-Bild-erstellen.de-Total-theatralisch.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/schneider\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/schneider\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Schneider Electronic gehackt &amp; verspottet\",\"datePublished\":\"2024-12-10T09:00:00+00:00\",\"dateModified\":\"2025-08-12T15:58:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/schneider\\\/\"},\"wordCount\":245,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/schneider\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/KI-Bild-erstellen.de-Total-theatralisch.png\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/schneider\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/schneider\\\/\",\"name\":\"Schneider Electronic gehackt &amp; verspottet - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/schneider\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/schneider\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/KI-Bild-erstellen.de-Total-theatralisch.png\",\"datePublished\":\"2024-12-10T09:00:00+00:00\",\"dateModified\":\"2025-08-12T15:58:51+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/schneider\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/schneider\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/schneider\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/KI-Bild-erstellen.de-Total-theatralisch.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/KI-Bild-erstellen.de-Total-theatralisch.png\",\"width\":1344,\"height\":768,\"caption\":\"Schneider Electric gehackt & verspottet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/schneider\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Schneider Electronic gehackt &amp; verspottet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Schneider Electronic hacked &amp; mocked - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/cutter\/","og_locale":"en_US","og_type":"article","og_title":"Schneider Electronic gehackt &amp; verspottet - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/cutter\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2024-12-10T09:00:00+00:00","article_modified_time":"2025-08-12T15:58:51+00:00","og_image":[{"width":1344,"height":768,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/11\/KI-Bild-erstellen.de-Total-theatralisch.png","type":"image\/png"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/schneider\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/schneider\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Schneider Electronic gehackt &amp; verspottet","datePublished":"2024-12-10T09:00:00+00:00","dateModified":"2025-08-12T15:58:51+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/schneider\/"},"wordCount":245,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/schneider\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/11\/KI-Bild-erstellen.de-Total-theatralisch.png","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/schneider\/","url":"https:\/\/defenderbox.de\/schneider\/","name":"Schneider Electronic hacked &amp; mocked - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/schneider\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/schneider\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/11\/KI-Bild-erstellen.de-Total-theatralisch.png","datePublished":"2024-12-10T09:00:00+00:00","dateModified":"2025-08-12T15:58:51+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/schneider\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/schneider\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/schneider\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/11\/KI-Bild-erstellen.de-Total-theatralisch.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/11\/KI-Bild-erstellen.de-Total-theatralisch.png","width":1344,"height":768,"caption":"Schneider Electric gehackt & verspottet"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/schneider\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Schneider Electronic gehackt &amp; verspottet"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/18925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=18925"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/18925\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/18927"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=18925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=18925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=18925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}