{"id":15221,"date":"2021-06-16T14:21:46","date_gmt":"2021-06-16T14:21:46","guid":{"rendered":"https:\/\/fastestvpn.com\/resources\/?p=15221"},"modified":"2025-05-23T14:52:17","modified_gmt":"2025-05-23T14:52:17","slug":"ransomware-crippled","status":"publish","type":"post","link":"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/","title":{"rendered":"How a Ransomware Crippled the USA\u2019s Fuel Supply","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"<p>Malware\u2019s ability to disrupt a service or business is profound. If adequate security and protocols are not set in place, it can cause downtime and incur significant financial damage. Moreover, it can make important data inaccessible or even make the confidential information public in the event of a breach. It&#8217;s exactly what happened in the Colonial Pipeline ransomware hack.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-15238\" title=\"How a Ransomware Crippled the USA\u2019s Fuel Supply\" src=\"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/2021\/06\/How-a-Ransomware-Crippled-the-USAs-Fuel-Supply-f-300x125.png\" alt=\"How a Ransomware Crippled the USA\u2019s Fuel Supply\" width=\"1200\" height=\"500\" srcset=\"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/06\/How-a-Ransomware-Crippled-the-USAs-Fuel-Supply-f-300x125.png 300w, https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/06\/How-a-Ransomware-Crippled-the-USAs-Fuel-Supply-f-1024x427.png 1024w, https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/06\/How-a-Ransomware-Crippled-the-USAs-Fuel-Supply-f-768x320.png 768w, https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/06\/How-a-Ransomware-Crippled-the-USAs-Fuel-Supply-f-1536x640.png 1536w, https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/06\/How-a-Ransomware-Crippled-the-USAs-Fuel-Supply-f.png 1920w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p>When a ransomware targeted the Colonial Pipeline in May last month, it successfully penetrated its cybersecurity and crippled the operations of a major fuel pipeline. Colonial Pipeline supplies 45 percent of fuel to the USA\u2019s East Coast, so halting operations meant a significant setback in the fuel supply that could have resulted in price hikes.<\/p>\n<p>But, Colonial Pipeline was not the only victim. It was revealed that LineStar Integrity Services was affected by a data breach that resulted in a huge leak of private data. Confidential data from the breach is still floating around on the dark corners of the web.<\/p>\n<p>As more victims of malware, especially ransomware, continue to build up, there is a much-needed briefing on how malware works and why it\u2019s one of the <a href=\"https:\/\/fastestvpn.com\/resources\/most-destructive-malware\/\" target=\"_blank\" rel=\"noopener\">most destructive forms of malware<\/a> out there.<\/p>\n <div class=\"fastest-hd-btn\">\n <a class=\"hd-conter-btn\" href=\"https:\/\/fastestvpn.com\/lifetime-special-deals?a_aid=634829be4d0b2\" title=\"Get FastestVPN\">Get FastestVPN <i class=\"fa fa-hand-o-right\" aria-hidden=\"true\"><\/i><\/a>\n <\/div>\n\n<h3>What is Ransomware?<\/h3>\n<p>Ransomware is a type of malware that locks you out of your data by encrypting it. Encryption is the process of converting plain text into an unreadable format called ciphertext using complex algorithms. Once encrypted, a document containing data like your personal information or something related to work will appear as complete gibberish.<\/p>\n<p>The only way to revert it to the original state (plain text) is to use the decryption key. The key is what you will then have to retrieve from the attacker by paying the ransom. It is one of the most destructive forms of malware because not even an anti-virus can remove the encryption, whereas other types of malware like a virus can be purged from the system. In a ransomware attack, the only way to get your data back is to pay a ransom, which can be in millions if you are a multi-national organization.<\/p>\n<h2>The Colonial Pipeline Ransomware Hack<\/h2>\n<p>It was May 7 when Colonial Pipeline company announced that it had become a victim of a cyberattack. The type of attack was identified as ransomware that encrypted Colonial Pipeline\u2019s data and demanded ransomware. The attackers were able to breach and steal private data that they threatened to release online if the ransom was not paid.<\/p>\n<p>The complete nature of the attack was not known at the time; hence the company decided to take some of its operations offline to contain the threat. The company wanted to ensure that the attackers did not have access to its systems and cannot influence the automated processes that industries like it rely on. Colonial Pipeline issued the help of a cybersecurity firm called Mandiant. After carefully examining the nature of the attack, the operations slowly came online, and the entire operations were online within a week.<\/p>\n<p>It has been revealed that the proverbial hole in the boat was a compromised VPN password that allowed the attackers to gain access. A Virtual Private Network (VPN) allows remote workers to log in to a local network and access resources inaccessible to outside networks. The compromised VPN password was discovered to be a part of leaked passwords available on the dark web.<\/p>\n<p>It didn\u2019t help that the associated account did not have multi-factor authentication. We have stressed how important <a href=\"https:\/\/fastestvpn.com\/resources\/two-factor-authentication\/\" target=\"_blank\" rel=\"noopener\">Two-Factor Authentication <\/a>(2FA) is to the security of your account. Even if someone knew the password to your account, they would not be able to get in without a second verification, like a One-Time Passcode (OTP) sent to your phone.<\/p>\n<h3>Possible Implications of Such an Attack<\/h3>\n<p>Although Colonial Pipeline is a privately-held company, it serves a major commodity: <strong>fuel<\/strong>. As part of the 2.5 million barrels it delivers every day, much of it also goes to airports in the USA. Thus, such attacks have major implications like the involvement of foreign intelligence agencies to cripple a nation\u2019s industry.<\/p>\n<p>The Federal Bureau of Investigation (FBI) and other federal forces like the Cybersecurity and Infrastructure Security Agency were deeply engaged with the company on the matter. The FBI <a href=\"https:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/fbi-statement-on-compromise-of-colonial-pipeline-networks\" target=\"_blank\" rel=\"nofollow noopener\">confirmed<\/a> that it was the work of a cybercriminal group known as Darkside.<\/p>\n<p>The hacker group released a <a href=\"https:\/\/www.reuters.com\/business\/energy\/statement-suspected-us-pipeline-hackers-say-they-dont-want-cause-problems-2021-05-10\/\" target=\"_blank\" rel=\"nofollow noopener\">statement<\/a> that the Colonial Pipeline ransomware hack was motivated by money, not foreign influence.<\/p>\n<h3>How the FBI Responded to the Colonial Pipeline Ransomware Hack<\/h3>\n<p>In an astonishing feat, the FBI was able to recover the ransom paid to the hackers by Colonial Pipeline to retrieve the stolen data and decryption key.<\/p>\n<p>Cybercriminals usually ask for ransom in cryptocurrency because it is harder to trace. The absence of a central authority controlling transactions and the encrypted nature of wallets makes it near-impossible to trace funds. But, the FBI seems to have figured it out.<\/p>\n<p>The FBI monitored the Bitcoin ledger and traced the transfer of 64 bitcoins to an address. Then, the FBI used the key belonging to the Bitcoin wallet and retrieved those bitcoins. It is a remarkable achievement because a crypto wallet holds the private key required to authorize transactions. If anyone gets a hold of your private key, you can lose the precious Bitcoins in the wallet.<\/p>\n<p>The FBI did not reveal how it managed to do it.<\/p>\n<blockquote><p>&#8220;I don&#8217;t want to give up our tradecraft in case we want to use this again for future endeavors,&#8221; &#8211; Elvis Chan, FBI<\/p><\/blockquote>\n<p>Furthermore, the FBI took down servers and websites operated by Darkside. The hacker group <a href=\"https:\/\/www.intel471.com\/blog\/darkside-ransomware-shut-down-revil-avaddon-cybercrime\" target=\"_blank\" rel=\"nofollow noopener\">announced<\/a> its plan to shut down its Ransomware-as-a-Service (RaaS), essentially winding up its operation for good.<\/p>\n<p>Cryptocurrency is often used by criminals to move money or seek a ransom. It was considered untraceable until now. The scathing response sends a message to cybercriminals that they can\u2019t expect to get away from digital theft as they once could.<\/p>\n<h3>LineStar Integrity Services Hack &#8211; Another Data Breach Followed Up<\/h3>\n<p>As events around the attack unfolded, another U.S-based company became a victim of a data breach. The <a href=\"https:\/\/www.wired.com\/story\/linestar-pipeline-ransomware-leak\/\">report<\/a> revealed that LineStar Integrity Services had a massive breach that resulted in the leak of 70GBs worth of data. The breach, which is the result of a hacker group called Xing Team, did not make many headlines because the company chose to stay quiet on the matter.<\/p>\n<p>LineStar Integrity Services sells compliance, maintenance, and technology solutions to customers. The data obtained from the breach has been dumped on the dark web. As reported, it contains emails, business documents, proprietary code, and even details on employees like their driver\u2019s licenses and social security cards.<\/p>\n<p>The fact that such data exists publicly now opens up the doors for a number of sinister possibilities. Cybercriminals can use this information to launch <a href=\"https:\/\/fastestvpn.com\/resources\/what-is-phishing\/\" target=\"_blank\" rel=\"noopener\">Phishing <\/a>and <a href=\"https:\/\/fastestvpn.com\/resources\/spear-phishing\/\" target=\"_blank\" rel=\"noopener\">Spear Phishing<\/a> campaigns against those named in the leak. LineStar provides integration and technology, so the data could allow hackers to find vulnerabilities in them and follow up with another Colonial Pipeline-type attack.<\/p>\n<h3>Conclusion &#8211; How to Protect Yourself from Malware<\/h3>\n<p>Malware is an umbrella term to describe software that contains \u2018bad code\u2019; it can alter the functionality of your device or cause significant damage to it.<\/p>\n<p>Cybercriminals are always working to find vulnerabilities like <a href=\"https:\/\/fastestvpn.com\/resources\/zero-day-attack\/\" target=\"_blank\" rel=\"noopener\">zero-day<\/a> exploits. Certain practices can improve your chances of becoming a victim of malware. Keep your device updated with the latest operating system version, keep your applications up to date, never download attachments from suspicious emails, or install programs from third-party websites.<\/p>\n<p>Above all, invest in anti-virus that is robust to handle all types of malware. Keep the anti-virus updated for the latest malware signatures. When you are out in the streets or a cafe using public Wi-Fi, use a VPN to encrypt your communication.<\/p>\n<p>As a business, you need to deploy Threat Management and have clear protocols in place. It includes limiting access to information to the only people who need it as part of the job and implementing a zero-trust rule.<br \/>\n <div class=\"fastest-hd-cta\">\n <h3>Take Control of Your Privacy Today! \n <span>Unblock websites, access streaming platforms, and bypass ISP monitoring.<\/span>\n <\/h3>\n <a class=\"hd-conter-btn\" href=\"https:\/\/fastestvpn.com\/lifetime-special-deals?a_aid=634829be4d0b2\" title=\"Get FastestVPN\">Get FastestVPN <i class=\"fa fa-hand-o-right\" aria-hidden=\"true\"><\/i><\/a>\n <\/div>\n <\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"<p>Malware\u2019s ability to disrupt a service or business is profound. If adequate security and protocols are not set in place, it can cause downtime and incur significant financial damage. Moreover, it can make important data inaccessible or even make the confidential information public in the event of a breach. It&#8217;s exactly what happened in the [&hellip;]<\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":1,"featured_media":15237,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"acf":[],"yoast_head":"\n<title>What is the Colonial Pipeline Ransomware Hack of 2021?<\/title>\n<meta name=\"description\" content=\"The Colonial Pipeline ransomware hack is proof of malware\u2019s ability to disrupt businesses. Here&#039;s how hackers crippled the USA\u2019s fuel supply.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is the Colonial Pipeline Ransomware Hack?\" \/>\n<meta property=\"og:description\" content=\"The Colonial Pipeline ransomware hack is another proof of malware\u2019s ability to disrupt business operations. Find out more about how hackers crippled the USA\u2019s fuel supply.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/\" \/>\n<meta property=\"og:site_name\" content=\"Fastest Resources Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-16T14:21:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-23T14:52:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/06\/How-a-Ransomware-Crippled-the-USAs-Fuel-Supply-f.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is the Colonial Pipeline Ransomware Hack?\" \/>\n<meta name=\"twitter:description\" content=\"The Colonial Pipeline ransomware hack is another proof of malware\u2019s ability to disrupt business operations. Find out more about how hackers crippled the USA\u2019s fuel supply.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/06\/How-a-Ransomware-Crippled-the-USAs-Fuel-Supply-f.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/\",\"url\":\"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/\",\"name\":\"What is the Colonial Pipeline Ransomware Hack of 2021?\",\"isPartOf\":{\"@id\":\"https:\/\/fastestvpn.com\/resources\/#website\"},\"datePublished\":\"2021-06-16T14:21:46+00:00\",\"dateModified\":\"2025-05-23T14:52:17+00:00\",\"author\":{\"@id\":\"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/2bc5619b8836e9394fe98d51f919a1f9\"},\"description\":\"The Colonial Pipeline ransomware hack is proof of malware\u2019s ability to disrupt businesses. Here's how hackers crippled the USA\u2019s fuel supply.\",\"breadcrumb\":{\"@id\":\"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fastestvpn.com\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How a Ransomware Crippled the USA\u2019s Fuel Supply\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/#website\",\"url\":\"https:\/\/fastestvpn.com\/resources\/\",\"name\":\"Fastest Resources Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fastestvpn.com\/resources\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/2bc5619b8836e9394fe98d51f919a1f9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eef1d615408428f84f63535211fda790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eef1d615408428f84f63535211fda790?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n","yoast_head_json":{"title":"What is the Colonial Pipeline Ransomware Hack of 2021?","description":"The Colonial Pipeline ransomware hack is proof of malware\u2019s ability to disrupt businesses. Here's how hackers crippled the USA\u2019s fuel supply.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/","og_locale":"en_US","og_type":"article","og_title":"What is the Colonial Pipeline Ransomware Hack?","og_description":"The Colonial Pipeline ransomware hack is another proof of malware\u2019s ability to disrupt business operations. Find out more about how hackers crippled the USA\u2019s fuel supply.","og_url":"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/","og_site_name":"Fastest Resources Blog","article_published_time":"2021-06-16T14:21:46+00:00","article_modified_time":"2025-05-23T14:52:17+00:00","og_image":[{"width":1920,"height":800,"url":"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/06\/How-a-Ransomware-Crippled-the-USAs-Fuel-Supply-f.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"What is the Colonial Pipeline Ransomware Hack?","twitter_description":"The Colonial Pipeline ransomware hack is another proof of malware\u2019s ability to disrupt business operations. Find out more about how hackers crippled the USA\u2019s fuel supply.","twitter_image":"https:\/\/fastestvpn.com\/resources\/wp-content\/uploads\/sites\/2\/2021\/06\/How-a-Ransomware-Crippled-the-USAs-Fuel-Supply-f.png","twitter_misc":{"Written by":"admin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/","url":"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/","name":"What is the Colonial Pipeline Ransomware Hack of 2021?","isPartOf":{"@id":"https:\/\/fastestvpn.com\/resources\/#website"},"datePublished":"2021-06-16T14:21:46+00:00","dateModified":"2025-05-23T14:52:17+00:00","author":{"@id":"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/2bc5619b8836e9394fe98d51f919a1f9"},"description":"The Colonial Pipeline ransomware hack is proof of malware\u2019s ability to disrupt businesses. Here's how hackers crippled the USA\u2019s fuel supply.","breadcrumb":{"@id":"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fastestvpn.com\/resources\/ransomware-crippled\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fastestvpn.com\/resources\/"},{"@type":"ListItem","position":2,"name":"How a Ransomware Crippled the USA\u2019s Fuel Supply"}]},{"@type":"WebSite","@id":"https:\/\/fastestvpn.com\/resources\/#website","url":"https:\/\/fastestvpn.com\/resources\/","name":"Fastest Resources Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fastestvpn.com\/resources\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/2bc5619b8836e9394fe98d51f919a1f9","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fastestvpn.com\/resources\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eef1d615408428f84f63535211fda790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eef1d615408428f84f63535211fda790?s=96&d=mm&r=g","caption":"admin"}}]}},"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/posts\/15221"}],"collection":[{"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/comments?post=15221"}],"version-history":[{"count":1,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/posts\/15221\/revisions"}],"predecessor-version":[{"id":39956,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/posts\/15221\/revisions\/39956"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/media\/15237"}],"wp:attachment":[{"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/media?parent=15221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/categories?post=15221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fastestvpn.com\/resources\/wp-json\/wp\/v2\/tags?post=15221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}