{"id":1449,"date":"2017-01-14T02:07:31","date_gmt":"2017-01-14T07:07:31","guid":{"rendered":"https:\/\/www.knownhost.com\/blog\/?p=1449"},"modified":"2020-03-20T16:03:28","modified_gmt":"2020-03-20T20:03:28","slug":"common-reasons-hackers-will-ddos-sites","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/","title":{"rendered":"What Are the Most Common Reasons Hackers Will DDoS Sites?"},"content":{"rendered":"<p>Brian Krebs. OVH. Dyn. And the open-sourcing of the code of the botnet that attacked them. Are you DDoS-defending your business? If not, now is the time.<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>A supercharged botnet<\/strong><\/li>\n<li><strong>7 reasons DDoS is popular among hackers<\/strong><\/li>\n<li><strong>Action to DDoS-defend your business<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>A supercharged botnet<\/strong><\/h3>\n<p>The Mirai botnet has been busy lately. In September, it was used for a couple of massive attacks, one against US-based security journalist Brian Krebs, the other against French web host OVH. In October, the network of IoT devices that make up its bot army (some 380,000, according to its purported author) were used to DDoS Dyn and temporarily cripple a large chunk of the internet in the United States.<\/p>\n<p>&nbsp;<\/p>\n<p>But, unfortunately, it gets worse\u2026 <em>much worse<\/em>. Security thought-leaders are sounding the alarm bell after a hacker publicly released the source code for Mirai. After all, the scope of the DDoS attacks from Mirai are highly disturbing. The one that hit Krebs measured 620 gigabits per second. The one that hit OVH measured 1.1 terabits per second. If you are having trouble grasping that sheer attack volume, it\u2019s understandable: Mirai delivers almost unimaginable information-overload by our current standards.<\/p>\n<p>&nbsp;<\/p>\n<p>Mirai is getting the press, but Bashlight is the original, explained Dan Goodin of <a href=\"http:\/\/arstechnica.com\/security\/2016\/10\/brace-yourselves-source-code-powering-potent-iot-ddoses-just-went-public\/\"><em>Ars Technica<\/em><\/a>. \u201cUntil now, the botnets created with the newer and technically more sophisticated Mirai have been greatly outnumbered by those based on its rival Bashlight,\u201d he said, \u201cwith about 233,000 infected devices versus 963,000 respectively.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>The release of Mirai\u2019s code \u2013 via the user Anna-senpai on <em>Hack Forums<\/em> (a site that has since been accused of running a DDoS-for-hire service) \u2013 is troubling to security pros because easy access means proliferation of gigantic DDoS assaults.<\/p>\n<p>&nbsp;<\/p>\n The post on Hack Forums, which included links to the Mirai source code and noted that it was time to \u201cGTFO\u201d (direct quote) of IoT DDoS due to increased attention. (Source: Security Affairs)\n<p>&nbsp;<\/p>\n<p>Goodin noted that there has been an increased focus among those who use botnets to target CCTV cameras, routers, thermostats, webcams, and other vulnerable IoT devices. Once formed, the army of slaves is used to extract ransom from victims (in exchange for halting a DDoS).<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cBoth Mirai and Bashlight exploit the same IoT vulnerabilities,\u201d said Goodin, \u201cmostly\u2026 weakness involving the telnet remote connection protocol in devices running a form of embedded Linux known as BusyBox.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>One reason Mirai has become more prominent, though, is that it encrypts communications it sends to central command (i.e., the master). Also, some believe that the conversion of some 80,000 of the 963K Bashlight devices to Mirai suggests that the newer malware may be overtaking and then patching devices so that other botnets can\u2019t reclaim them.<\/p>\n<p>&nbsp;<\/p>\n<p>Although the open sourcing of the code is especially troubling, the attack on Dyn should also not be overlooked when we consider the power that is currently in the hands of botnet operators. Mirai successfully sabotaged the DNS provider Dyn and brought its response time to a crawl (or at least a large portion of the attack came from Mirai slaves). According to Michael Kan of <em>Computerworld<\/em>, many in the security community think that the Dyn DDoS (2 attacks of 130 minutes and 70 minutes, divided by a 2 \u00bd hour break) was more of a warning shot than an actual siege: it just leveraged 100,000 devices of the half-million or so devices then available.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>7 reasons DDoS is popular among hackers<\/strong><\/h3>\n<p>Why are these attacks becoming such a common form of malicious intrusion?<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Reason #1 \u2013 Easy as 1, 2, 100 thousand<\/strong><\/p>\n<p>One reason DDoS is a go-to for hackers is that it\u2019s simple, and it works. The Dyn attack sidelined household-name web giants such as Spotify, Netflix, Airbnb, and Twitter, all of which use Dyn to connect their site to users.<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cIt doesn&#8217;t take particularly advanced hacking skills to block access to those sites,\u201d said <a href=\"http:\/\/mashable.com\/2016\/10\/21\/ddos-attack-dyn-cyberattack\/\">Emma Hinchliffe<\/a>. \u201cIt just takes a huge network.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>Well, how do you access a huge network? Even before the open sourcing of Mirai, the simplicity of carrying out a DDoS has been troubling to those who protect networks. Through paid services, anyone is able to rent a botnet. In fact, the criminally oriented can even have a stressor or booter service do the dirty work for them.<\/p>\n<p>&nbsp;<\/p>\n<p>It is often challenging for the security team or law enforcement to track down the booters because they use proxies to assault you from different locations.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Reason # 2 \u2013 Cash for peace<\/strong><\/p>\n<p>DDoS-for-ransom, a form of extortion, has been on the rise over the last few years. Essentially you get barraged by traffic, see your site go down, and then get a note letting you know that you can regain your smoothly functional site for a certain amount of Bitcoin.<\/p>\n<p>&nbsp;<\/p>\n<p>Security experts recommend never paying the attackers because there is no guarantee they won\u2019t do it again and because it feeds the growth of the problem; however, some site owners feel they have no choice to get their own revenue coming in again.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Reason #3 \u2013 Slash-and-burn competition<\/strong><\/p>\n<p>What\u2019s one way to outperform the rivals in your industry? Well, you could make it impossible for them to operate.<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cJust small amounts of downtime can end up costing a company thousands [or millions] of dollars,\u201d noted <a href=\"http:\/\/www.brainstuffshow.com\/blogs\/why-do-people-perform-ddos-attacks.htm\">Christian Sager<\/a>. \u201cIt can also promote negative associations with a brand, so that customers no longer trust their services.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Reason #4 \u2013 Hacktivism <\/strong><\/p>\n<p>DDoS isn\u2019t always just about pummeling someone for money. It\u2019s also a way that some actors use to voice dissent. South Korea, the U.S., Russia, and Georgia have historically been DDoS targets. Keep in mind that many of these attacks are thought to be perpetrated by other nations \u2013 which makes them more cyberwarfare than citizen protest. However, individuals do sometimes DDoS governments or companies because they disagree with them ethically.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Reason #5 \u2013 Rise of the &#8220;script kiddy&#8221;<\/strong><\/p>\n<p>Some of those behind DDoS events have been given the derisive name \u201cscript kiddies,\u201d highlighting the fact that they lack technical skills (instead grabbing a script in a forum) and have what are viewed as immature intentions.<\/p>\n<p>&nbsp;<\/p>\n<p>For instance, game publishers are sometimes DDoSed immediately following an update, because an irritated player believes they \u201cnerfed\u201d the best part.<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cAlso, let&#8217;s be honest, being able to take out a company from your bedroom is probably amusingly empowering in a David and Goliath sort of way,\u201d said Sager. \u201cToday&#8217;s DDoS is yesterday&#8217;s vandalism.\u201d <em>(Note that he made these comments in 2014, when DDoS was much less destructive and economically devastating than it is today.)<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Reason #6 \u2013 The overpowering decoy<\/strong><\/p>\n<p>A DDoS is certainly more uncontrollable than a fake duck that you can throw in your hunting bag, but it is sometimes a decoy in the sense of a distraction. In these cases, the directness and crudeness of a DDoS is used as a cover for a more technical, surgical hack. A landmark incident of this <em>Ocean\u2019s-11<\/em>-style assault occurred in 2013, when a botnet operator slammed the Bank of the West with fraudulent requests while they entered an account and withdrew $900K.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Reason #7 \u2013 This is only a test\u2026<\/strong><\/p>\n<p>A company will occasionally force itself offline \u2013 whether by accident or when intentionally resilience-testing their systems.<\/p>\n<p>&nbsp;<\/p>\n<p>Game servers are not exempt from DDoS.\u00a0 It&#8217;s an easy way to gain advantage over competing players in player vs player competition.\u00a0 <a href=\"https:\/\/www.knownhost.com\/blog\/choosing-dedicated-game-server-hosting\/\">Learn more about the dedicated game servers from KnownHost.<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Action to DDoS-defend your business<\/strong><\/h3>\n<p>In the post-open-sourcing of Mirai, heavyweight DDoS has become more widely available than ever before. And people continue to have various reasons to want to crash websites.<\/p>\n<p>&nbsp;<\/p>\n<p>In this increasingly volatile climate, are you DDoS-defended? At <strong><a href=\"https:\/\/www.knownhost.com\">KnownHost<\/a><\/strong>, we offer complimentary DDOS protection on all <strong><a href=\"https:\/\/www.knownhost.com\/managed-vps\">VPS<\/a><\/strong> and SSD VPS product lines. <a href=\"https:\/\/www.knownhost.com\/ddos-protection\"><strong>See how you\u2019re protected.<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brian Krebs. OVH. Dyn. And the open-sourcing of the code of the botnet that attacked them. Are you DDoS-defending your business? If not, now is the time. &nbsp; A supercharged botnet 7 reasons DDoS is popular among hackers Action to DDoS-defend your business &nbsp; A supercharged botnet The Mirai botnet has been busy lately. In [&hellip;]<\/p>\n","protected":false},"author":137,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1424],"tags":[414,243],"class_list":["post-1449","post","type-post","status-publish","format-standard","hentry","category-security","tag-ddos","tag-hackers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Are the Most Common Reasons Hackers Will DDoS Sites? - KnownHost<\/title>\n<meta name=\"description\" content=\"We are under attack is not something you want to hear your system administrator say. Here are some common reasons why that may happen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Are the Most Common Reasons Hackers Will DDoS Sites? - KnownHost\" \/>\n<meta property=\"og:description\" content=\"We are under attack is not something you want to hear your system administrator say. Here are some common reasons why that may happen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KnownHost\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-14T07:07:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-20T20:03:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2017\/01\/Why-Hackers-DDoS.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"901\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jerry\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:site\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jerry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/common-reasons-hackers-will-ddos-sites\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/common-reasons-hackers-will-ddos-sites\\\/\"},\"author\":{\"name\":\"Jerry\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/e8335f865579ddedb2ab3553b100afdc\"},\"headline\":\"What Are the Most Common Reasons Hackers Will DDoS Sites?\",\"datePublished\":\"2017-01-14T07:07:31+00:00\",\"dateModified\":\"2020-03-20T20:03:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/common-reasons-hackers-will-ddos-sites\\\/\"},\"wordCount\":1315,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"keywords\":[\"ddos\",\"hackers\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/common-reasons-hackers-will-ddos-sites\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/common-reasons-hackers-will-ddos-sites\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/common-reasons-hackers-will-ddos-sites\\\/\",\"name\":\"What Are the Most Common Reasons Hackers Will DDoS Sites? - KnownHost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\"},\"datePublished\":\"2017-01-14T07:07:31+00:00\",\"dateModified\":\"2020-03-20T20:03:28+00:00\",\"description\":\"We are under attack is not something you want to hear your system administrator say. Here are some common reasons why that may happen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/common-reasons-hackers-will-ddos-sites\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/common-reasons-hackers-will-ddos-sites\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/common-reasons-hackers-will-ddos-sites\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Are the Most Common Reasons Hackers Will DDoS Sites?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"name\":\"KnownHost.com\",\"description\":\"Quality Managed Web Hosting by KnownHost\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\",\"name\":\"KnownHost, LLC\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"width\":1200,\"height\":400,\"caption\":\"KnownHost, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/KnownHost\\\/\",\"https:\\\/\\\/x.com\\\/KnownHost\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/knownhost\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/e8335f865579ddedb2ab3553b100afdc\",\"name\":\"Jerry\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/author\\\/jerrysteadydemand-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Are the Most Common Reasons Hackers Will DDoS Sites? - KnownHost","description":"We are under attack is not something you want to hear your system administrator say. Here are some common reasons why that may happen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/","og_locale":"en_US","og_type":"article","og_title":"What Are the Most Common Reasons Hackers Will DDoS Sites? - KnownHost","og_description":"We are under attack is not something you want to hear your system administrator say. Here are some common reasons why that may happen.","og_url":"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/","og_site_name":"KnownHost","article_publisher":"https:\/\/www.facebook.com\/KnownHost\/","article_published_time":"2017-01-14T07:07:31+00:00","article_modified_time":"2020-03-20T20:03:28+00:00","og_image":[{"width":901,"height":750,"url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2017\/01\/Why-Hackers-DDoS.jpeg","type":"image\/jpeg"}],"author":"Jerry","twitter_card":"summary_large_image","twitter_creator":"@KnownHost","twitter_site":"@KnownHost","twitter_misc":{"Written by":"Jerry","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/"},"author":{"name":"Jerry","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/e8335f865579ddedb2ab3553b100afdc"},"headline":"What Are the Most Common Reasons Hackers Will DDoS Sites?","datePublished":"2017-01-14T07:07:31+00:00","dateModified":"2020-03-20T20:03:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/"},"wordCount":1315,"commentCount":0,"publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"keywords":["ddos","hackers"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/","url":"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/","name":"What Are the Most Common Reasons Hackers Will DDoS Sites? - KnownHost","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/#website"},"datePublished":"2017-01-14T07:07:31+00:00","dateModified":"2020-03-20T20:03:28+00:00","description":"We are under attack is not something you want to hear your system administrator say. Here are some common reasons why that may happen.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/blog\/common-reasons-hackers-will-ddos-sites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Are the Most Common Reasons Hackers Will DDoS Sites?"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/blog\/#website","url":"https:\/\/www.knownhost.com\/blog\/","name":"KnownHost.com","description":"Quality Managed Web Hosting by KnownHost","publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.knownhost.com\/blog\/#organization","name":"KnownHost, LLC","url":"https:\/\/www.knownhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","contentUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","width":1200,"height":400,"caption":"KnownHost, LLC"},"image":{"@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KnownHost\/","https:\/\/x.com\/KnownHost","https:\/\/www.linkedin.com\/company\/knownhost"]},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/e8335f865579ddedb2ab3553b100afdc","name":"Jerry","url":"https:\/\/www.knownhost.com\/blog\/author\/jerrysteadydemand-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/1449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/users\/137"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/comments?post=1449"}],"version-history":[{"count":0,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/1449\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/media?parent=1449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/categories?post=1449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/tags?post=1449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}