{"id":28389,"date":"2025-02-06T09:44:06","date_gmt":"2025-02-06T08:44:06","guid":{"rendered":"https:\/\/networks.imdea.org\/?p=28389"},"modified":"2025-02-06T10:20:18","modified_gmt":"2025-02-06T09:20:18","slug":"from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats","status":"publish","type":"post","link":"https:\/\/networks.imdea.org\/es\/desde-estafas-por-sms-hasta-camaras-de-eco-comet-analiza-el-impacto-de-las-amenazas-digitales\/","title":{"rendered":"Desde estafas por SMS hasta c\u00e1maras de eco: COMET analiza el impacto de las amenazas digitales"},"content":{"rendered":"<p>IMDEA Networks ha finalizado con \u00e9xito su participaci\u00f3n en el proyecto <a href=\"https:\/\/networks.imdea.org\/es\/proyectos\/comet\/\" target=\"_blank\" rel=\"noopener\">COMET<\/a>, una iniciativa financiada por el Ministerio de Ciencia, Innovaci\u00f3n y Universidades de Espa\u00f1a y la Uni\u00f3n Europea a trav\u00e9s de los fondos NextGenerationEU\/PRTR. Este proyecto, liderado en nuestro instituto por el investigador <strong>Guillermo Su\u00e1rez-Tangil<\/strong>, ha logrado importantes avances en el estudio del software malicioso, el fraude en l\u00ednea y la propagaci\u00f3n de desinformaci\u00f3n en redes sociales.<\/p>\n<h2>Desentra\u00f1ando el fraude digital<\/h2>\n<p>Uno de los estudios destacados del proyecto COMET, en colaboraci\u00f3n con University College London, ha analizado en profundidad <strong>la estafa conocida como \u00abHola, mam\u00e1 y pap\u00e1\u00bb<\/strong>, que opera a trav\u00e9s de SMS. \u00abInteractuamos con presuntos estafadores haci\u00e9ndonos pasar por posibles v\u00edctimas. A trav\u00e9s de 711 interacciones, identificamos 582 cuentas de mulas utilizadas por los estafadores, quienes intentaron obtener m\u00e1s de \u00a3577,000 en tres meses\u00bb, explica Su\u00e1rez-Tangil. Este trabajo, publicado en USENIX Security 2025, demuestra c\u00f3mo los ciberdelincuentes explotan servicios de operadores m\u00f3viles e instituciones financieras para cometer fraudes.<\/p>\n<h2>Herramientas para la detecci\u00f3n temprana de amenazas<\/h2>\n<p>En el marco del proyecto, se ha desarrollado la <strong>herramienta IOC Stalker<\/strong>, dise\u00f1ada para extraer inteligencia sobre Indicadores de Compromiso (IoCs) a partir de mercados clandestinos. \u00abHemos analizado un foro de hacking de alto perfil que nos permite detectar IoCs aproximadamente 490 d\u00edas antes de que aparezcan en fuentes de inteligencia de acceso abierto (OSINT), utilizadas por populares antivirus\u00bb, destaca Su\u00e1rez-Tangil.<\/p>\n<h2>Patrones de c\u00f3digo malicioso y su impacto en plataformas digitales<\/h2>\n<p>El equipo de investigaci\u00f3n tambi\u00e9n ha identificado patrones de reutilizaci\u00f3n de c\u00f3digo en ataques fraudulentos. \u00abRecopilamos una gran cantidad de c\u00f3digo malicioso de foros clandestinos, archivos adjuntos y repositorios de GitHub. Encontramos tres repositorios con programas de spam para Instagram que comparten grandes porciones de c\u00f3digo, as\u00ed como siete muestras de ransomware (un tipo de malware) en GitHub, incluyendo un repositorio de recopilaci\u00f3n de ransomware\u00bb, se\u00f1ala Su\u00e1rez-Tangil.<\/p>\n<h2>An\u00e1lisis de la propagaci\u00f3n de desinformaci\u00f3n<\/h2>\n<p>Los hallazgos del proyecto COMET tambi\u00e9n han permitido estudiar la <strong>propagaci\u00f3n de informaci\u00f3n en redes sociales<\/strong> y la formaci\u00f3n de c\u00e1maras de eco. En un caso de estudio, analizaron tres temas pol\u00edticos recientes y altamente controvertidos, principalmente en Estados Unidos, junto con un tema no controversial: la guerra entre Rusia y Ucrania, el aborto, el control de armas y el festival de m\u00fasica SXSW. Se observ\u00f3 que \u00abexiste un mayor efecto de c\u00e1mara de eco entre los republicanos en comparaci\u00f3n con los dem\u00f3cratas y un amplio apoyo expl\u00edcito a Ucrania, especialmente entre los dem\u00f3cratas\u00bb, explica Su\u00e1rez-Tangil. Adem\u00e1s, se encontr\u00f3 que una menor polarizaci\u00f3n est\u00e1 correlacionada con un menor efecto de c\u00e1mara de eco, como en el caso del conflicto entre Rusia y Ucrania.<\/p>\n<h2>Perspectivas futuras<\/h2>\n<p>Los m\u00e9todos desarrollados en el proyecto COMET sientan las bases para futuras investigaciones sobre amenazas emergentes. \u00abQueremos aplicar estas metodolog\u00edas al estudio del Metaverso y nuevas tendencias en fraude online\u00bb, concluye Su\u00e1rez-Tangil.<\/p>\n<p>El proyecto COMET ha reforzado el conocimiento sobre amenazas digitales y sus mecanismos de difusi\u00f3n, aportando herramientas y metodolog\u00edas clave para la seguridad en l\u00ednea y la regulaci\u00f3n de plataformas digitales.<\/p>\n<div style=\"min-height: 30px;\"><a target=\"_blank\" rel=\"noindex,nofollow\" href=\"https:\/\/networks.imdea.org\/es\/desde-estafas-por-sms-hasta-camaras-de-eco-comet-analiza-el-impacto-de-las-amenazas-digitales\/?format=pdf\" title=\"Download PDF\"><img decoding=\"async\" style=\"float: left;max-width: 50px;\" alt=\"Download PDF\" src=\"https:\/\/networks.imdea.org\/wp-content\/plugins\/wp-advanced-pdf\/asset\/images\/pdf.png\"><\/a><\/div>","protected":false},"excerpt":{"rendered":"IMDEA Networks ha finalizado con \u00e9xito su participaci\u00f3n en el proyecto COMET, una iniciativa financiada por el Ministerio de Ciencia, Innovaci\u00f3n y Universidades de Espa\u00f1a y la Uni\u00f3n Europea a trav\u00e9s de los fondos NextGenerationEU\/PRTR. Este proyecto, liderado en nuestro instituto por el investigador Guillermo Su\u00e1rez-Tangil, ha logrado importantes avances en el estudio del software&#8230;","protected":false},"author":145,"featured_media":28390,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1,1187],"tags":[1222,464,465,471,486],"class_list":["post-28389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categoria","category-press-release","tag-cybersecurity","tag-imdea-networks","tag-internet","tag-privacy","tag-social-networks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Desde estafas por SMS hasta c\u00e1maras de eco: COMET analiza el impacto de las amenazas digitales - IMDEA Networks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Desde estafas por SMS hasta c\u00e1maras de eco: COMET analiza el impacto de las amenazas digitales - IMDEA Networks\" \/>\n<meta property=\"og:description\" content=\"IMDEA Networks ha finalizado con \u00e9xito su participaci\u00f3n en el proyecto COMET, una iniciativa financiada por el Ministerio de Ciencia, Innovaci\u00f3n y Universidades de Espa\u00f1a y la Uni\u00f3n Europea a trav\u00e9s de los fondos NextGenerationEU\/PRTR. Este proyecto, liderado en nuestro instituto por el investigador Guillermo Su\u00e1rez-Tangil, ha logrado importantes avances en el estudio del software...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"IMDEA Networks\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-06T08:44:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-06T09:20:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/networks.imdea.org\/wp-content\/uploads\/2025\/02\/media-file-scam.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marta Dorado\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marta Dorado\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/networks.imdea.org\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/networks.imdea.org\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/\"},\"author\":{\"name\":\"Marta Dorado\",\"@id\":\"https:\/\/networks.imdea.org\/#\/schema\/person\/1dbef87c79bf3d3657cbd4cc6c129e74\"},\"headline\":\"Desde estafas por SMS hasta c\u00e1maras de eco: COMET analiza el impacto de las amenazas digitales\",\"datePublished\":\"2025-02-06T08:44:06+00:00\",\"dateModified\":\"2025-02-06T09:20:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/networks.imdea.org\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/\"},\"wordCount\":1052,\"image\":{\"@id\":\"https:\/\/networks.imdea.org\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/networks.imdea.org\/wp-content\/uploads\/2025\/02\/media-file-scam.png\",\"keywords\":[\"Cybersecurity\",\"IMDEA Networks\",\"Internet\",\"Privacy\",\"Social networks\"],\"articleSection\":[\"Noticias\",\"Press release\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/\",\"url\":\"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/\",\"name\":\"Desde estafas por SMS hasta c\u00e1maras de eco: COMET analiza el impacto de las amenazas digitales - IMDEA Networks\",\"isPartOf\":{\"@id\":\"https:\/\/networks.imdea.org\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/networks.imdea.org\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/networks.imdea.org\/wp-content\/uploads\/2025\/02\/media-file-scam.png\",\"datePublished\":\"2025-02-06T08:44:06+00:00\",\"dateModified\":\"2025-02-06T09:20:18+00:00\",\"author\":{\"@id\":\"https:\/\/networks.imdea.org\/#\/schema\/person\/1dbef87c79bf3d3657cbd4cc6c129e74\"},\"breadcrumb\":{\"@id\":\"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[[\"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/\"]]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#primaryimage\",\"url\":\"https:\/\/networks.imdea.org\/wp-content\/uploads\/2025\/02\/media-file-scam.png\",\"contentUrl\":\"https:\/\/networks.imdea.org\/wp-content\/uploads\/2025\/02\/media-file-scam.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/networks.imdea.org\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From SMS scams to echo chambers: COMET analyzes the impact of digital threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/networks.imdea.org\/es\/#website\",\"url\":\"https:\/\/networks.imdea.org\/es\/\",\"name\":\"IMDEA Networks\",\"description\":\"IMDEA Networks Multisite\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/networks.imdea.org\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/networks.imdea.org\/#\/schema\/person\/1dbef87c79bf3d3657cbd4cc6c129e74\",\"name\":\"Marta Dorado\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/networks.imdea.org\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a6b289793dc91627659ec2e23425956502b6bd683dce1548a16e9ea0d40fecfb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a6b289793dc91627659ec2e23425956502b6bd683dce1548a16e9ea0d40fecfb?s=96&d=mm&r=g\",\"caption\":\"Marta Dorado\"},\"url\":\"https:\/\/networks.imdea.org\/es\/author\/marta-doradoimdea-org\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Desde estafas por SMS hasta c\u00e1maras de eco: COMET analiza el impacto de las amenazas digitales - IMDEA Networks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/","og_locale":"es_ES","og_type":"article","og_title":"Desde estafas por SMS hasta c\u00e1maras de eco: COMET analiza el impacto de las amenazas digitales - IMDEA Networks","og_description":"IMDEA Networks ha finalizado con \u00e9xito su participaci\u00f3n en el proyecto COMET, una iniciativa financiada por el Ministerio de Ciencia, Innovaci\u00f3n y Universidades de Espa\u00f1a y la Uni\u00f3n Europea a trav\u00e9s de los fondos NextGenerationEU\/PRTR. Este proyecto, liderado en nuestro instituto por el investigador Guillermo Su\u00e1rez-Tangil, ha logrado importantes avances en el estudio del software...","og_url":"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/","og_site_name":"IMDEA Networks","article_published_time":"2025-02-06T08:44:06+00:00","article_modified_time":"2025-02-06T09:20:18+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/networks.imdea.org\/wp-content\/uploads\/2025\/02\/media-file-scam.png","type":"image\/png"}],"author":"Marta Dorado","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Marta Dorado","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/networks.imdea.org\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#article","isPartOf":{"@id":"https:\/\/networks.imdea.org\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/"},"author":{"name":"Marta Dorado","@id":"https:\/\/networks.imdea.org\/#\/schema\/person\/1dbef87c79bf3d3657cbd4cc6c129e74"},"headline":"Desde estafas por SMS hasta c\u00e1maras de eco: COMET analiza el impacto de las amenazas digitales","datePublished":"2025-02-06T08:44:06+00:00","dateModified":"2025-02-06T09:20:18+00:00","mainEntityOfPage":{"@id":"https:\/\/networks.imdea.org\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/"},"wordCount":1052,"image":{"@id":"https:\/\/networks.imdea.org\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/networks.imdea.org\/wp-content\/uploads\/2025\/02\/media-file-scam.png","keywords":["Cybersecurity","IMDEA Networks","Internet","Privacy","Social networks"],"articleSection":["Noticias","Press release"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/","url":"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/","name":"Desde estafas por SMS hasta c\u00e1maras de eco: COMET analiza el impacto de las amenazas digitales - IMDEA Networks","isPartOf":{"@id":"https:\/\/networks.imdea.org\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#primaryimage"},"image":{"@id":"https:\/\/networks.imdea.org\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/networks.imdea.org\/wp-content\/uploads\/2025\/02\/media-file-scam.png","datePublished":"2025-02-06T08:44:06+00:00","dateModified":"2025-02-06T09:20:18+00:00","author":{"@id":"https:\/\/networks.imdea.org\/#\/schema\/person\/1dbef87c79bf3d3657cbd4cc6c129e74"},"breadcrumb":{"@id":"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":[["https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/"]]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#primaryimage","url":"https:\/\/networks.imdea.org\/wp-content\/uploads\/2025\/02\/media-file-scam.png","contentUrl":"https:\/\/networks.imdea.org\/wp-content\/uploads\/2025\/02\/media-file-scam.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/networks.imdea.org\/es\/from-sms-scams-to-echo-chambers-comet-analyzes-the-impact-of-digital-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/networks.imdea.org\/es\/"},{"@type":"ListItem","position":2,"name":"From SMS scams to echo chambers: COMET analyzes the impact of digital threats"}]},{"@type":"WebSite","@id":"https:\/\/networks.imdea.org\/es\/#website","url":"https:\/\/networks.imdea.org\/es\/","name":"IMDEA Networks","description":"IMDEA Networks Multisite","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/networks.imdea.org\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/networks.imdea.org\/#\/schema\/person\/1dbef87c79bf3d3657cbd4cc6c129e74","name":"Marta Dorado","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/networks.imdea.org\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a6b289793dc91627659ec2e23425956502b6bd683dce1548a16e9ea0d40fecfb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a6b289793dc91627659ec2e23425956502b6bd683dce1548a16e9ea0d40fecfb?s=96&d=mm&r=g","caption":"Marta Dorado"},"url":"https:\/\/networks.imdea.org\/es\/author\/marta-doradoimdea-org\/"}]}},"_links":{"self":[{"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/posts\/28389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/users\/145"}],"replies":[{"embeddable":true,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/comments?post=28389"}],"version-history":[{"count":5,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/posts\/28389\/revisions"}],"predecessor-version":[{"id":28395,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/posts\/28389\/revisions\/28395"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/media\/28390"}],"wp:attachment":[{"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/media?parent=28389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/categories?post=28389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/networks.imdea.org\/es\/wp-json\/wp\/v2\/tags?post=28389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}