{"id":11103,"date":"2022-03-24T14:52:59","date_gmt":"2022-03-24T18:52:59","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=11103"},"modified":"2026-01-19T09:37:07","modified_gmt":"2026-01-19T14:37:07","slug":"how-to-manage-the-online-effects-of-the-ukraine-war","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/","title":{"rendered":"How to Manage the Online Effects of the Ukraine War"},"content":{"rendered":"\n<p>As the war in Ukraine continues to unfold, government-led cybersecurity organizations are advising companies to strengthen their security posture, as an increase in cyber threats such as distributed denial of service (DDoS) attacks, phishing, website defacements, ransomware, and malware is likely to follow.<\/p>\n\n\n\n<p>Observations from CSC have also shown that the general online effects of this war need to be watched as well, as some of the tactics used by fraudsters\u2014particularly with malicious domain names and website spoofing\u2014are magnified during a major world event. The observations below outline some of the emerging trends across a range of key online content areas and are followed by recommendations to protect against the associated threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Surge in domain registrations<\/strong><\/h3>\n\n\n\n<p>As seen in past CSC studies, significant world events often trigger spikes in domain registrations. With the Ukraine war, we analysed the landscape based on a snapshot of all domains containing the keyword \u201cUkraine\u201d that had been registered by the end of the month of the initial Russian invasion (Figure 1).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture1-3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"411\" height=\"256\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture1-3.png\" alt=\"\" class=\"wp-image-11109\" style=\"width:411px;height:256px\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture1-3.png 411w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture1-3-300x187.png 300w\" sizes=\"auto, (max-width: 411px) 100vw, 411px\" \/><\/a><figcaption class=\"wp-element-caption\"><strong>Figure 1:<\/strong> Daily total numbers of Ukraine-related domain registrations during February 2022 (date of the initial invasion shown as a dotted line)<\/figcaption><\/figure>\n<\/div>\n\n\n<p>This event shows a similar pattern of activity to others that CSC has monitored, with the start of the war immediately followed by a spike in activity. Entities registering these domains\u2014whether legitimate or with criminal intent\u2014do so to take advantage of public interest in the emerging situation and to attract the increased web traffic.<\/p>\n\n\n\n<p>More than 700 new Ukraine-related domains were registered in the five-day period beginning February 24. These feature a range of associated keywords and content, the most potentially concerning of which are shown in Figure 2.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"371\" height=\"225\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture2.png\" alt=\"\" class=\"wp-image-11110\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture2.png 371w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture2-300x182.png 300w\" sizes=\"auto, (max-width: 371px) 100vw, 371px\" \/><\/a><figcaption class=\"wp-element-caption\"><strong>Figure 2:<\/strong> Numbers of domains registered in the five-day period beginning February 24 with names featuring keywords of particular concern<\/figcaption><\/figure>\n<\/div>\n\n\n<p>A significant proportion of the sites are directly soliciting for donations, using either traditional payment methods or cryptocurrency (Figure 3). While several may be genuine resources for supporting victims of the war, any that are not legitimate are an obvious cause for concern. They may be associated with fraudulent activity, attempting to take advantage of well-meaning people wishing to help those in need.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture4-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"459\" data-id=\"11117\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture4-1.jpg\" alt=\"\" class=\"wp-image-11117\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture4-1.jpg 651w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture4-1-300x212.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture3-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"467\" data-id=\"11116\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture3-1.jpg\" alt=\"\" class=\"wp-image-11116\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture3-1.jpg 651w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture3-1-300x215.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture6.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"470\" data-id=\"11111\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture6.jpg\" alt=\"\" class=\"wp-image-11111\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture6.jpg 651w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture6-300x217.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><a href=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture5.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"467\" data-id=\"11112\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture5.jpg\" alt=\"\" class=\"wp-image-11112\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture5.jpg 651w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture5-300x215.jpg 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/a><\/figure>\n<figcaption class=\"blocks-gallery-caption wp-element-caption\"><strong>Figure 3:<\/strong> Examples of Ukraine-related domain names resolving to donation sites<\/figcaption><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p>Many other researchers have also noted this emergence of fake donation sites, stressing the importance of contributing via legitimate agencies like the International Red Cross, Save the Children\u00ae, Doctors without Borders, or UNICEF<a id=\"_ftnref1\" href=\"#_ftn1\"><sup>[1]<\/sup><\/a><sup>,<a id=\"_ftnref2\" href=\"#_ftn2\">[2]<\/a>,<a id=\"_ftnref3\" href=\"#_ftn3\">[3]<\/a><\/sup>.<\/p>\n\n\n\n<p>Fraudulent solicitations for donations\u2014particularly using cryptocurrency\u2014have also been reported as circulating via numerous other routes, including phishing emails and forum posts<a id=\"_ftnref4\" href=\"#_ftn4\"><sup>[4]<\/sup><\/a>. These follow a legitimate call for donations from the Ukrainian government, posted through its official Twitter\u00ae account<a id=\"_ftnref5\" href=\"#_ftn5\"><sup>[5]<\/sup><\/a>.<\/p>\n\n\n\n<p>Interestingly, amongst the (de-duplicated) set of 170 domains featuring keywords of concern, many are registered through consumer-grade domain registrars, a trend commonly seen with non-legitimate sites.<\/p>\n\n\n\n<p>Some of the other domains within the dataset were also found to include references to trusted charities or other key organizations, as a way of misleading internet users and adding credibility to the site content. Examples included domains with the keyword strings \u201credcrossukraine\u201d (resolving to a site soliciting for cryptocurrency donations) and \u201cnato4ukraine\u201d (resolving to a parking page with pay-per-click links at the time of analysis).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Spread of misinformation<\/strong><\/h3>\n\n\n\n<p>As with any major world event, there has been an increase in misinformation appearing online following the start of the war, which has taken several different forms.<\/p>\n\n\n\n<ol style=\"font-size:18px;list-style-type:lower-roman\" class=\"wp-block-list\">\n<li><strong>Recycled, out-of-context, and modified imagery<\/strong> \u2013 Various photos and videos purporting to show events occurring in the war in Ukraine have been circulating, particularly on social media. In many cases, these have been found to be images from unrelated events, which may have occurred many years earlier<a id=\"_ftnref6\" href=\"#_ftn6\"><sup>[6]<\/sup><\/a><sup>,<a id=\"_ftnref7\" href=\"#_ftn7\">[7]<\/a><\/sup>, or are material that\u2019s been modified<a id=\"_ftnref8\" href=\"#_ftn8\"><sup>[8]<\/sup><\/a> or falsified altogether<a id=\"_ftnref9\" href=\"#_ftn9\"><sup>[9]<\/sup><\/a>. In many cases, these posts have gone viral, with some examples attracting hundreds of thousands of views.<br \/><br \/>From a brand protection perspective, in some instances, the original sources of the material can be identified through open-source investigation techniques (e.g., reverse-image searches). Similar approaches may be possible using screen grabs taken from video content. Furthermore, geolocation techniques can sometimes be used to verify the geographical origin of imagery<a id=\"_ftnref10\" href=\"#_ftn10\"><sup>[10]<\/sup><\/a>.<br \/><br \/>General advice for internet users is to be mindful of the origins of information, and only to share content from trusted sources.<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" style=\"font-size:18px;list-style-type:lower-roman\" class=\"wp-block-list\">\n<li><strong>Pro-Russian content and propaganda<\/strong> \u2013 We found significant amounts of online content showing support for Russia. While some of this will presumably be legitimate, a significant amount (particularly on social media) appears to have been posted by Russian state-sponsored profiles or automated accounts (bots). Recent creation dates, low numbers of followers, and high numbers of likes for postings, are characteristics that demonstrate profiles may fall into this latter category. Social media is a popular channel for spreading propaganda and generating political support due to the ease of creating content, combined with its wide potential reach and speed of spread (Figure 4). Many of the identified postings make use of popular hashtags (e.g., <em>#istandwithrussia<\/em> or <em>#istandwithputin<\/em>), or associate their content with other emotive issues (e.g., Israeli or Palestinian content). One study<a id=\"_ftnref11\" href=\"#_ftn11\"><sup>[11]<\/sup><\/a> found that a significant subset of these postings were intended simply to attract traffic, in some cases driving readers to eCommerce listings or websites for other service providers.<br \/><br \/>Another significant observation is that even some mainstream Russian-based news accounts have been suspended from social media platforms in response to their pro-Russian stance and justification of military action based on reasoning unsupported by the known facts<a id=\"_ftnref12\" href=\"#_ftn12\"><sup>[12]<\/sup><\/a><sup>,<a id=\"_ftnref13\" href=\"#_ftn13\">[13]<\/a><\/sup>. Meta (the organization behind Facebook\u00ae, Instagram, and WhatsApp) announced its refusal to cease fact-checking content posted by Russian state-owned media<a id=\"_ftnref14\" href=\"#_ftn14\"><sup>[14]<\/sup><\/a>, as demanded by Russian authorities. Furthermore, on March 6, TikTok announced that it was suspending the creation of new videos in Russia. This was due to uncertainty around the safety of content creators following the introduction of Russia\u2019s fake news law, which can impose up to 15 years\u2019 imprisonment on those found publicly calling for sanctions, or spreading what Russia perceives to be false information about its military<a id=\"_ftnref15\" href=\"#_ftn15\"><sup>[15]<\/sup><\/a>.<\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture7-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"324\" height=\"256\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture7-1.png\" alt=\"\" class=\"wp-image-11123\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture7-1.png 324w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture7-1-300x237.png 300w\" sizes=\"auto, (max-width: 324px) 100vw, 324px\" \/><\/a><figcaption class=\"wp-element-caption\"><strong>Figure 4:<\/strong> Example of a pro-Russia viral image circulating on social media<\/figcaption><\/figure>\n<\/div>\n\n\n<ol start=\"3\" style=\"font-size:18px;list-style-type:lower-roman\" class=\"wp-block-list\">\n<li><strong>Conspiracy theories and other fake information<\/strong> \u2013 One of the common themes identified in online commentary, particularly on social media, are claims that the war is fake<a id=\"_ftnref16\" href=\"#_ftn16\"><sup>[16]<\/sup><\/a>. In some cases, this has been accompanied with claims that real imagery has been staged<a id=\"_ftnref17\" href=\"#_ftn17\"><sup>[17]<\/sup><\/a>. These claims have been made by a range of entities, typically promoting pro-Russian or conspiracy theorist agendas.<br \/><br \/>An additional concerning observation is the use of fake accounts to post fake messages, such as the case of a Telegram account purporting to be that of Ukrainian President Volodymyr Zelenskyy<a id=\"_ftnref18\" href=\"#_ftn18\"><sup>[18]<\/sup><\/a>. Several outlets claiming to offer breaking news stories have been circulating fake news, with the content on these untrustworthy channels frequently unaccompanied by sources or any other evidence<a id=\"_ftnref19\" href=\"#_ftn19\"><sup>[19]<\/sup><\/a>.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Direct effects on online businesses and organizations<\/strong><\/h3>\n\n\n\n<p>The war in Ukraine has had a range of effects on corporations, from the Russian authorities blocking internet access to several key western websites and platforms (particularly social media), to organizations withdrawing business operations in Russia. Conversely, there\u2019s also been a rise in activism against corporations who have failed to pull out of Russia, with hashtags such as <em>#boycottcocacola<\/em> and <em>#boycottmcdonalds<\/em> trending on social media in the first two weeks following the invasion.<\/p>\n\n\n\n<p>A particularly significant effect from a brand protection point of view is the direct repercussions for both Ukrainian and Russian online organizations resulting from the business interruptions, sanctions, and economic damage that have arisen during the war. One example is the closure of a series of Ukraine-based websites and marketplaces. One affected organization is EVO (evo.company), the Ukrainian IT company behind a range of eCommerce platforms in the region, including Prom.ua, Tiu.ru, Bigl.ua, Deal.by, and Satu.kz, among others. At the start of March, the Tiu.ru website suspended its operations in response to the war (Figure 6). This website was tailored to the Russian market but had been hosted on Ukrainian servers<a id=\"_ftnref20\" href=\"#_ftn20\"><sup>[20]<\/sup><\/a>.<\/p>\n\n\n\n<p>These changes will have a domino effect on the eCommerce landscape in the region, the balance of available legitimate and counterfeit products, and may ultimately lead to the emergence of new marketplace sites to take their place.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"311\" height=\"116\" src=\"https:\/\/www.cscdbs.com\/blog\/wp-content\/uploads\/2022\/03\/Picture8.png\" alt=\"\" class=\"wp-image-11124\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture8.png 311w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2022\/03\/Picture8-300x112.png 300w\" sizes=\"auto, (max-width: 311px) 100vw, 311px\" \/><\/a><figcaption class=\"wp-element-caption\"><strong>Figure 5:<\/strong> Message displayed on the Tiu.ru website at the start of March 2022<\/figcaption><\/figure>\n<\/div>\n\n\n<p><strong>Conclusion and recommendations<\/strong> The Ukraine war increases the possibility of cyberattacks against Western websites and internet infrastructure. Employing a robust domain security posture is critical. In times of global uncertainty, companies should not only have <a href=\"https:\/\/www.cscdbs.com\/blog\/interpreting-global-guidance-on-cyber-threats-due-to-the-ukraine-crisis\/\">advanced security measures<\/a> in place to safely mitigate threats, but should also employ a holistic online monitoring program to ensure rapid detection and allow for quick and effective takedown of any IP abuse, such as fake sites, fraudulent campaigns, or other false content or misinformation.<\/p>\n\n\n\n<p>CSC recommends taking the following steps.<\/p>\n\n\n\n<ol style=\"font-size:18px\" class=\"wp-block-list\">\n<li>Confirm that your domain registrar\u2019s business practices are not contributing to fraud and brand abuse. The following issues are often common with consumer-grade domain registrars:\n<ul class=\"wp-block-list\">\n<li>Operating domain marketplaces that drop catch, auction, and sell domain names containing trademarks to the highest bidder<\/li>\n\n\n\n<li>Domain name spinning and advocating the registration of domain names containing trademarks<\/li>\n\n\n\n<li>Monetizing domain names containing trademarks with pay-per-click sites<\/li>\n\n\n\n<li>Experiencing frequently occurring breaches resulting in DNS attacks, phishing, and business email compromise<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Identify trademark and copyright abuse in web content, and on online marketplaces, social media, and mobile app stores via an online monitoring service.<\/li>\n\n\n\n<li>Leverage global enforcement, including takedowns and advanced techniques in internet blocking.<\/li>\n\n\n\n<li>Employ phishing monitoring and a fraud-blocking network of browsers, partners, internet service providers (ISPs), and security information and event management (SIEM) systems.<\/li>\n<\/ol>\n\n\n\n<p>We\u2019re currently engaged with many of our customers to both assess and provide tangible recommendations to quickly control threats. If you have any questions on developing your own cybersecurity checklist, please <a href=\"https:\/\/www.cscdbs.com\/en\/contact-us\/\">contact us<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref1\" id=\"_ftn1\">[1]<\/a> <a href=\"https:\/\/domaingang.com\/domain-news\/new-help-ukraine-domains-are-most-likely-not-legit\/\">domaingang.com\/domain-news\/new-help-ukraine-domains-are-most-likely-not-legit\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref2\" id=\"_ftn2\">[2]<\/a> <a href=\"https:\/\/www.welivesecurity.com\/2022\/02\/27\/beware-charity-scams-exploiting-war-ukraine\/\">welivesecurity.com\/2022\/02\/27\/beware-charity-scams-exploiting-war-ukraine\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref3\" id=\"_ftn3\">[3]<\/a> <a href=\"https:\/\/twitter.com\/ESETresearch\/status\/1497194165561659394\">twitter.com\/ESETresearch\/status\/1497194165561659394<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref4\" id=\"_ftn4\">[4]<\/a> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/help-ukraine-crypto-scams-emerge-as-ukraine-raises-over-37-million\/\">bleepingcomputer.com\/news\/security\/help-ukraine-crypto-scams-emerge-as-ukraine-raises-over-37-million\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref5\" id=\"_ftn5\">[5]<\/a> <a href=\"https:\/\/twitter.com\/Ukraine\/status\/1497594592438497282\">twitter.com\/Ukraine\/status\/1497594592438497282<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref6\" id=\"_ftn6\">[6]<\/a> <a href=\"https:\/\/www.bbc.com\/news\/60554910\">bbc.com\/news\/60554910<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a id=\"_ftn7\" href=\"#_ftnref7\">[7]<\/a> bbc-monitoring.co.uk\/campaign\/RwbbAiso\/aab564822c8140a6c46681ea\/b680b576f310643c916458a491cf5d77<\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref8\" id=\"_ftn8\">[8]<\/a> <a href=\"https:\/\/twitter.com\/Shayan86\/status\/1496944075378855942\">twitter.com\/Shayan86\/status\/1496944075378855942<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref9\" id=\"_ftn9\">[9]<\/a> <a href=\"https:\/\/www.cnn.com\/2022\/03\/05\/politics\/fact-check-fake-cnn-ukraine\/index.html\">cnn.com\/2022\/03\/05\/politics\/fact-check-fake-cnn-ukraine\/index.html<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref10\" id=\"_ftn10\">[10]<\/a> <a href=\"https:\/\/www.youtube.com\/watch?v=KtOaC0emsxY\">youtube.com\/watch?v=KtOaC0emsxY<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref11\" id=\"_ftn11\">[11]<\/a> <a href=\"https:\/\/twitter.com\/marcowenjones\/status\/1499312091727020032\">twitter.com\/marcowenjones\/status\/1499312091727020032<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref12\" id=\"_ftn12\">[12]<\/a> <a href=\"https:\/\/www.euronews.com\/next\/2022\/03\/02\/ukraine-war-facebook-and-youtube-block-russia-s-rt-and-sputnik-in-europe\">euronews.com\/next\/2022\/03\/02\/ukraine-war-facebook-and-youtube-block-russia-s-rt-and-sputnik-in-europe<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref13\" id=\"_ftn13\">[13]<\/a> <a href=\"https:\/\/www.businessinsider.com\/facebook-ukraine-russia-news-state-media-2022-3\">businessinsider.com\/facebook-ukraine-russia-news-state-media-2022-3<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref14\" id=\"_ftn14\">[14]<\/a> <a href=\"https:\/\/twitter.com\/nickclegg\/status\/1497279120853590025\">twitter.com\/nickclegg\/status\/1497279120853590025<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref15\" id=\"_ftn15\">[15]<\/a> <a href=\"https:\/\/www.theverge.com\/2022\/3\/6\/22964418\/tiktok-suspends-creation-new-video-content-russia-ukraine\">theverge.com\/2022\/3\/6\/22964418\/tiktok-suspends-creation-new-video-content-russia-ukraine<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref16\" id=\"_ftn16\">[16]<\/a> <a href=\"https:\/\/www.bbc.com\/news\/60589965\">bbc.com\/news\/60589965<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref17\" id=\"_ftn17\">[17]<\/a> <a href=\"https:\/\/twitter.com\/hoaxeye\/status\/1497514958174699522\">twitter.com\/hoaxeye\/status\/1497514958174699522<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref18\" id=\"_ftn18\">[18]<\/a> <a href=\"https:\/\/twitter.com\/Shayan86\/status\/1497485340738785283\">twitter.com\/Shayan86\/status\/1497485340738785283<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref19\" id=\"_ftn19\">[19]<\/a> <a href=\"https:\/\/twitter.com\/conspirator0\/status\/1496720310577602561\">twitter.com\/conspirator0\/status\/1496720310577602561<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><a href=\"#_ftnref20\" id=\"_ftn20\">[20]<\/a> <a href=\"https:\/\/www.dk.ru\/news\/237164313\">dk.ru\/news\/237164313<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the war in Ukraine continues to unfold, government-led cybersecurity organizations are advising companies to strengthen their security posture, as an increase in cyber threats such as distributed denial of service (DDoS) attacks, phishing, website defacements, ransomware, and malware is likely to follow. Observations from CSC have also shown that the general online effects of [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":10466,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,547,548,521],"tags":[],"class_list":["post-11103","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-brands","category-domain-management","category-domain-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Manage the Online Effects of the Ukraine War | CSC<\/title>\n<meta name=\"description\" content=\"As the war in Ukraine continues to unfold, government-led cybersecurity organizations are advising companies to strengthen their security posture, as an\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Manage the Online Effects of the Ukraine War | CSC\" \/>\n<meta property=\"og:description\" content=\"As the war in Ukraine continues to unfold, government-led cybersecurity organizations are advising companies to strengthen their security posture, as an\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-24T18:52:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-19T14:37:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55045.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-to-manage-the-online-effects-of-the-ukraine-war\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-to-manage-the-online-effects-of-the-ukraine-war\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"How to Manage the Online Effects of the Ukraine War\",\"datePublished\":\"2022-03-24T18:52:59+00:00\",\"dateModified\":\"2026-01-19T14:37:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-to-manage-the-online-effects-of-the-ukraine-war\\\/\"},\"wordCount\":1721,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-to-manage-the-online-effects-of-the-ukraine-war\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55045.jpg\",\"articleSection\":[\"Brand Protection\",\"Domain Management\",\"Domain Security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-to-manage-the-online-effects-of-the-ukraine-war\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-to-manage-the-online-effects-of-the-ukraine-war\\\/\",\"name\":\"How to Manage the Online Effects of the Ukraine War | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-to-manage-the-online-effects-of-the-ukraine-war\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-to-manage-the-online-effects-of-the-ukraine-war\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55045.jpg\",\"datePublished\":\"2022-03-24T18:52:59+00:00\",\"dateModified\":\"2026-01-19T14:37:07+00:00\",\"description\":\"As the war in Ukraine continues to unfold, government-led cybersecurity organizations are advising companies to strengthen their security posture, as an\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-to-manage-the-online-effects-of-the-ukraine-war\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-to-manage-the-online-effects-of-the-ukraine-war\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-to-manage-the-online-effects-of-the-ukraine-war\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55045.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55045.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/how-to-manage-the-online-effects-of-the-ukraine-war\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Manage the Online Effects of the Ukraine War\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Manage the Online Effects of the Ukraine War | CSC","description":"As the war in Ukraine continues to unfold, government-led cybersecurity organizations are advising companies to strengthen their security posture, as an","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/","og_locale":"en_US","og_type":"article","og_title":"How to Manage the Online Effects of the Ukraine War | CSC","og_description":"As the war in Ukraine continues to unfold, government-led cybersecurity organizations are advising companies to strengthen their security posture, as an","og_url":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2022-03-24T18:52:59+00:00","article_modified_time":"2026-01-19T14:37:07+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55045.jpg","type":"image\/jpeg"}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"How to Manage the Online Effects of the Ukraine War","datePublished":"2022-03-24T18:52:59+00:00","dateModified":"2026-01-19T14:37:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/"},"wordCount":1721,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55045.jpg","articleSection":["Brand Protection","Domain Management","Domain Security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/","url":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/","name":"How to Manage the Online Effects of the Ukraine War | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55045.jpg","datePublished":"2022-03-24T18:52:59+00:00","dateModified":"2026-01-19T14:37:07+00:00","description":"As the war in Ukraine continues to unfold, government-led cybersecurity organizations are advising companies to strengthen their security posture, as an","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55045.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55045.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/how-to-manage-the-online-effects-of-the-ukraine-war\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Manage the Online Effects of the Ukraine War"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/11103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=11103"}],"version-history":[{"count":19,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/11103\/revisions"}],"predecessor-version":[{"id":15024,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/11103\/revisions\/15024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10466"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=11103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=11103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=11103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}