{"id":2482,"date":"2024-12-30T22:29:11","date_gmt":"2024-12-30T22:29:11","guid":{"rendered":"https:\/\/www.upgreat.pl\/?p=2482"},"modified":"2025-02-03T14:09:11","modified_gmt":"2025-02-03T14:09:11","slug":"ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc","status":"publish","type":"post","link":"https:\/\/www.upgreat.pl\/en\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/","title":{"rendered":"RANSOMWARE \u2013 HOW TO BEHAVE WHEN WE ARE ATTACKED AND HOW TO PROTECT OURSELVES TO MAINTAIN THE CONTINUITY OF BUSINESS PROCESSES"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"2482\" class=\"elementor elementor-2482\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1dd2d7c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1dd2d7c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-168a2919\" data-id=\"168a2919\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7539bd1c elementor-widget elementor-widget-text-editor\" data-id=\"7539bd1c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p aria-level=\"2\">\u00a0<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">FROM THIS ARTICLE YOU WILL LEARN<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #2f2f2f;color:#2f2f2f\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #2f2f2f;color:#2f2f2f\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.upgreat.pl\/en\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#Czym_jest_atak_ransomware\" >What is a ransomware attack?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.upgreat.pl\/en\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#Kto_moze_pasc_ofiara_atakow_ransomware\" >Who can fall victim to ransomware attacks?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.upgreat.pl\/en\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#Jakimi_metodami_posluguja_sie_atakujacy\" >What methods do attackers use?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.upgreat.pl\/en\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#Ja_zachowac_sie_po_ataku_ransomware_i_czy_nalezy_zaplacic_okup\" >How to behave after a ransomware attack and should you pay the ransom?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.upgreat.pl\/en\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#Jakie_dzialania_formalne_nalezy_podjac\" >What formal actions should be taken?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.upgreat.pl\/en\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#Jak_zapobiec_atakom_ransomware\" >How to prevent ransomware attacks?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.upgreat.pl\/en\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#Podsumowanie\" >Summary<\/a><\/li><\/ul><\/nav><\/div>\n<h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"Czym_jest_atak_ransomware\"><\/span><span data-contrast=\"none\">What is a ransomware attack?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2><p>\u00a0<\/p><p><span data-contrast=\"auto\">At first it seemed to be something with the network. But then it turned out that it was not only with the network, but with everything. And not just on one computer, but on all\u00a0<\/span><span data-contrast=\"auto\">nothing works!<\/span>\u00a0<\/p><p><span data-contrast=\"auto\">More or less like that\u00a0<\/span><span data-contrast=\"auto\">they look\u00a0<\/span><span data-contrast=\"auto\">symptoms of a ransomware attack. Later, a ransom demand will likely appear. These can be large amounts in hacker-safe cryptocurrencies.<\/span>\u00a0<\/p><p><span data-contrast=\"auto\">A probable attack scenario is as follows:<\/span>\u00a0<\/p><ol><li data-aria-posinset=\"1\" data-aria-level=\"2\"><span data-contrast=\"auto\">Infection,<\/span><\/li><li data-aria-posinset=\"2\" data-aria-level=\"2\"><span data-contrast=\"auto\">Reconnaissance and data theft,<\/span><\/li><li data-aria-posinset=\"3\" data-aria-level=\"2\"><span data-contrast=\"auto\">Encryption and ransom demand.<\/span><\/li><\/ol><p>\u00a0<\/p><p><span data-contrast=\"auto\">A ransomware attack is a shock to people and organizations. Panic sets in and we slowly realize what happened and what the consequences are. The question also arises, what to do next?!<\/span>\u00a0<\/p><p><span data-contrast=\"auto\">The first and most severe effect of the attack is that the company cannot operate. It is impossible to do anything (in most cases, literally nothing these days) similar to the lack of electricity in the office or on the production floor, with the difference that the power returns at some point, but the data unfortunately does not reappear, and the software does not start working as before.<\/span>\u00a0<\/p><p><span data-contrast=\"auto\">The attack also has a negative impact on employee morale and motivation, and on reputation with collaborators. In this case, managers must show that they have a plan to resolve the crisis, and that contacts with the company do not pose a threat to the business environment.<\/span>\u00a0<\/p><p><span data-contrast=\"auto\">Another consequence of a ransomware attack is the likelihood of data leakage. This is a significant threat to the company, its employees and partners. If the attacker believes that there will be buyers for the stolen information (this may be personal data, salary tables, PESEL numbers, passwords, data constituting trade secrets, company secrets and many others).<\/span>\u00a0<\/p><p><span data-contrast=\"auto\">The above description is just one scenario. An attack could also involve shutting down production processes in a steel mill, preventing rail communication from functioning, stopping the functioning of an e-commerce platform or preventing treatment in a large hospital.\u00a0<\/span><span data-contrast=\"auto\">The goal of a ransomware attack is, as the name suggests, to obtain a ransom to restore access to data or restart processes in a company or organization. So the greater the financial or social costs, the larger the ransom attackers can demand.<\/span><\/p><p>\u00a0<\/p><h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"Kto_moze_pasc_ofiara_atakow_ransomware\"><\/span><span data-contrast=\"none\">Who can fall victim to ransomware attacks?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2><p>\u00a0<\/p><p><span data-contrast=\"auto\">Everyone, including you, but the more severe the downtime, the greater the likelihood of an attack. Most often, however, c<\/span><span data-contrast=\"auto\">Ybercriminals do not choose victims because they want to hit as many users as possible in order to make the most money.<\/span>\u00a0<\/p><p><span data-contrast=\"auto\">There have been reports of ransomware operating in accounting firms, law firms, consulting firms, the automotive, food and pharmaceutical industries, healthcare, logistics, transport, energy, mining, banking, and power engineering. As you can see, the range of interests of cybercriminals is wide. It should also be added that it is impossible to protect yourself from an attack and its effects in 100%. However, actions should be taken to minimize the probability of the attack&#039;s success and ensure the possibility of quickly restoring the systems&#039; operation if the attack is successful.<\/span><\/p><p>According to <a href=\"https:\/\/www.gov.pl\/web\/rcb\/ransomware-w-nowej-odslonie\" target=\"_blank\" rel=\"noopener\">article<\/a> on the Government Security Center website, even large companies fall victim:<\/p><ul><li>Garmin \u2013 WastedLocker malware, $10 million ransom payment confirmed,<\/li><li>Banco Estado Chile \u2013 Sodinokibi malware,<\/li><li>Canon USA \u2013 Maze malware,<\/li><li>Orange SA \u2013 Nefilim malware,<\/li><li>The Volksvagen Group \u2013 Conti malware.<\/li><\/ul><p>\u00a0<\/p><h2><span class=\"ez-toc-section\" id=\"Jakimi_metodami_posluguja_sie_atakujacy\"><\/span><span data-contrast=\"none\">What methods do attackers use?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2><p>\u00a0<\/p><p><span data-contrast=\"auto\">There are many attack methods and they are constantly being improved. Among them are:<\/span>\u00a0<\/p><ul style=\"font-weight: 400;\"><li data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Infected attachments and files \u2013\u00a0<\/span><span data-contrast=\"auto\">email attachments, files on USB drives or download links,<\/span>\u00a0<\/li><li data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Attacks on IT\/OT infrastructure \u2013 exploitation\u00a0<\/span><span data-contrast=\"auto\">bow\u00a0<\/span><span data-contrast=\"auto\">in production line operating systems or SCADA controllers,<\/span>\u00a0<\/li><li data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Impersonating legitimate updates \u2013\u00a0<\/span><span data-contrast=\"auto\">ransomware pretends to be legitimate software or driver updates,<\/span>\u00a0<\/li><li data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Phishing and social engineering \u2013\u00a0<\/span><span data-contrast=\"auto\">malicious emails containing attachments or links leading to malicious websites,<\/span>\u00a0<\/li><li data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Exploitation of software vulnerabilities \u2013\u00a0<\/span><span data-contrast=\"auto\">exploiting known or previously undiscovered vulnerabilities of operating systems or applications<\/span><span data-contrast=\"auto\">,<\/span>\u00a0<\/li><li data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">Attacks by service providers \u2013 use of cooperator or cooperating company software,<\/span>\u00a0<\/li><li data-aria-posinset=\"7\" data-aria-level=\"1\"><span data-contrast=\"auto\">Administrative credentials are captured \u2013 for example, via weak system administrator passwords or remote access sessions left logged in.<\/span>\u00a0<\/li><li data-aria-posinset=\"8\" data-aria-level=\"1\"><span data-contrast=\"auto\">Attacks on remote protocols (RDP) - exploitation of unsecured\u00a0<\/span><span data-contrast=\"auto\">properly remote desktops,<\/span>\u00a0<\/li><li data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-contrast=\"auto\">Attacks on network devices and servers,<\/span>\u00a0<\/li><li data-aria-posinset=\"10\" data-aria-level=\"1\"><span data-contrast=\"auto\">Ransomware injection via malicious ads (malvertising)<\/span>\u00a0<\/li><\/ul><p><span data-contrast=\"auto\">As you can see, there are many methods of attacks and threats and there is much to watch out for. That is why it is worth using the competences of experienced external companies or using the knowledge of your own IT departments.<\/span>\u00a0<\/p><p>\u00a0<\/p><h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"Ja_zachowac_sie_po_ataku_ransomware_i_czy_nalezy_zaplacic_okup\"><\/span><span data-contrast=\"none\">How to behave after a ransomware attack and should you pay the ransom?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2><p>\u00a0<\/p><p><span data-contrast=\"auto\">Unfortunately, there is no guarantee that the files will be decrypted after paying the ransom. This may be due to bugs in the decryption software or the attackers&#039; lack of intention to allow decryption of the data. Additionally, for<\/span><span data-contrast=\"auto\">paying the ransom reinforces the idea that their business is profitable or that they have achieved their goals. It can also be said that by paying the ransom, we are financing further activities of cybercriminals who improve their tools, which means more infections.<\/span>\u00a0<\/p><p><span data-contrast=\"auto\">But there is also good news, because sometimes it happens that some data can be recovered using publicly available decryption keys. There is also a chance that due to the specifics of some types of ransomware, some data can be recovered even without access to the decryption key.<\/span>\u00a0<\/p><p><span data-contrast=\"auto\">No matter what\u00a0<\/span><span data-contrast=\"auto\">you need to act very quickly to prevent further hacker access to IT systems and, if possible, stop the data encryption process. The recommended actions are listed below:<\/span>\u00a0<\/p><ul style=\"font-weight: 400;\"><li data-aria-posinset=\"11\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Isolation of infected systems:<\/span><\/b><span data-contrast=\"auto\">\u00a0The first step should be to isolate infected systems from the network to prevent further spread of ransomware.<\/span>\u00a0<\/li><li data-aria-posinset=\"12\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Identify and remove threats:<\/span><\/b><span data-contrast=\"auto\">\u00a0Using ransomware scanning and removal tools such as Malwarebytes to remove the active threat from your system.<\/span>\u00a0<\/li><li data-aria-posinset=\"13\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Attempting to decrypt files:<\/span><\/b><span data-contrast=\"auto\">\u00a0Check available decryption tools on sites like No More Ransom to see if it is possible to recover your encrypted data.<\/span>\u00a0<\/li><li data-aria-posinset=\"14\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Restoring the system from a backup:<\/span><\/b><span data-contrast=\"auto\">\u00a0If decryption is not possible, it is best to restore the system from a previous backup, if one is available.<\/span>\u00a0<\/li><li data-aria-posinset=\"15\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">System analysis and security:<\/span><\/b><span data-contrast=\"auto\">\u00a0Using analytical tools to understand how an attack occurred and implementing additional security measures to prevent future incidents.<\/span>\u00a0<\/li><\/ul><p><span data-contrast=\"auto\">In a company or organization, there should be a ready plan of what to do and how to behave when business continuity is threatened or impossible. Such a plan is called a Business Continuity Plan (BCP) and its content and scope results from the analysis of what is most painful for business processes and what specific risks affect these processes. An example of an analysis of the impact on the business (BIA) is o<\/span><span data-contrast=\"auto\">price of the impact of the unavailability of the financial system on the company&#039;s ability to make payments.<\/span><span data-contrast=\"auto\">\u00a0In turn, risk analysis (Risk Assessment \u2013 RA) is about<\/span><span data-contrast=\"auto\">the risk of a critical payment server failing due to a ransomware attack.<\/span>\u00a0<\/p><p><span data-contrast=\"auto\">In short, we should know in advance what we are most afraid of, when this threat may occur and how to prevent it.<\/span>\u00a0<\/p><p>\u00a0<\/p><h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"Jakie_dzialania_formalne_nalezy_podjac\"><\/span><span data-contrast=\"none\">What formal actions should be taken?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2><p>\u00a0<\/p><p><span data-contrast=\"auto\">The attack also imposes certain formal obligations on managers.\u00a0<\/span><span data-contrast=\"auto\">These will be:<\/span>\u00a0<\/p><ul><li data-aria-posinset=\"1\" data-aria-level=\"2\"><span data-contrast=\"auto\">Reporting the incident to the President of the Personal Data Protection Office (UODO) \u2013 this must be done within 72 hours of detecting the incident.<\/span>\u00a0<\/li><li data-aria-posinset=\"2\" data-aria-level=\"2\"><span data-contrast=\"auto\">Notification of those whose data has been leaked (employees and others).<\/span>\u00a0<\/li><li data-aria-posinset=\"3\" data-aria-level=\"2\"><span data-contrast=\"auto\">Reporting an incident to the NASK Computer Security Incident Response Team (CSIRT).<\/span>\u00a0<\/li><li data-aria-posinset=\"4\" data-aria-level=\"2\"><span data-contrast=\"auto\">Reporting a crime to the prosecutor&#039;s office or the police.<\/span>\u00a0<\/li><li data-aria-posinset=\"5\" data-aria-level=\"2\"><span data-contrast=\"auto\">There may also be an obligation and<\/span><span data-contrast=\"auto\">Informing shareholders or business partners (larger entities and listed companies).<\/span>\u00a0<\/li><li data-aria-posinset=\"6\" data-aria-level=\"2\"><span data-contrast=\"auto\">Even while removing the effects of an attack, it is worth creating r<\/span><span data-contrast=\"auto\">incident report (for internal purposes and for future audits) and create guidelines for<\/span><span data-contrast=\"auto\">updating risk management procedures and security policies.<\/span>\u00a0<\/li><\/ul><p>\u00a0<\/p><p><span data-contrast=\"auto\">In Poland, formal obligations in the event of a ransomware attack include reporting to UODO, CSIRT NASK and law enforcement agencies if it concerns personal data, critical systems or other resources subject to legal regulations. Quick action and documentation of the incident are essential to meet legal requirements and minimize the risk of sanctions (high financial penalties).<\/span>\u00a0<\/p><p>\u00a0<\/p><h2 aria-level=\"2\"><span class=\"ez-toc-section\" id=\"Jak_zapobiec_atakom_ransomware\"><\/span><span data-contrast=\"none\">How to prevent ransomware attacks?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2><p>\u00a0<\/p><p><span data-contrast=\"auto\">There are a number of ways to significantly reduce the vulnerability of IT systems to ransomware.<\/span>\u00a0<\/p><p><span data-contrast=\"auto\">Among them are the following:<\/span>\u00a0<\/p><ul><li data-aria-posinset=\"1\" data-aria-level=\"2\"><span data-contrast=\"auto\">Backups \u2013 preferably multiple copies on different media,<\/span>\u00a0<\/li><li data-aria-posinset=\"2\" data-aria-level=\"2\"><span data-contrast=\"auto\">Regular scanning and removal of vulnerabilities to cyberattacks \u2013 software updates and necessary reconfigurations,<\/span>\u00a0<\/li><li data-aria-posinset=\"3\" data-aria-level=\"2\"><span data-contrast=\"auto\">Network segmentation \u2013 limiting the possibility of ransomware spreading across the corporate network,<\/span>\u00a0<\/li><li data-aria-posinset=\"4\" data-aria-level=\"2\"><span data-contrast=\"auto\">Installing proven antivirus software with an option to prevent ransomware attacks (endpoint security),<\/span>\u00a0<\/li><li data-aria-posinset=\"5\" data-aria-level=\"2\"><span data-contrast=\"auto\">Periodic employee training to provide knowledge about current threats and ways to avoid them,<\/span>\u00a0<\/li><li data-aria-posinset=\"6\" data-aria-level=\"2\"><span data-contrast=\"auto\">Installing proven firewalls at the edge of the network that block cybercriminals from accessing IT systems from the outside,<\/span>\u00a0<\/li><li data-aria-posinset=\"7\" data-aria-level=\"2\"><span data-contrast=\"auto\">Securing remote access, for example by enabling multi-factor authentication (as in electronic banking systems),<\/span>\u00a0<\/li><li data-aria-posinset=\"8\" data-aria-level=\"2\"><span data-contrast=\"auto\">Monitoring and detecting threats \u2013 there are systems that allow for detecting attacks at an early stage,<\/span>\u00a0<\/li><li data-aria-posinset=\"9\" data-aria-level=\"2\"><span data-contrast=\"auto\">Proper policy for granting permissions to files and systems \u2013 granting users only those permissions that are necessary to perform their tasks,<\/span>\u00a0<\/li><li data-aria-posinset=\"10\" data-aria-level=\"2\"><span data-contrast=\"auto\">Incident response planning and testing.<\/span>\u00a0<\/li><\/ul><p><span data-contrast=\"auto\">It is worth mentioning here that additional security for a company or organization can be provided by:<\/span><span data-contrast=\"auto\">protection against cyber and GDPR risks offered by some insurance companies.<\/span>\u00a0<\/p><p>\u00a0<\/p><h2><span class=\"ez-toc-section\" id=\"Podsumowanie\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h2><p>\u00a0<\/p><p><span data-contrast=\"auto\">As described above, hacker attacks happen even in companies that pay attention to IT security issues, and there is no way to protect yourself from them in 100%. Protection against cyber threats is a continuous process, just as the methods of attackers are constantly being improved. However, we can reduce the chances of an attack succeeding and minimize its effects.<\/span><\/p><p><span data-contrast=\"auto\">It is best not to be a victim, but even if it happens, remember that not everything is lost, and depending on whether and how many usable copies of data we have, we can restore the functioning of our systems. We also have a chance to decrypt some or all of the collected data.<\/span><\/p><p><span data-contrast=\"auto\">We hope that our post will help you choose ways to protect yourself from ransomware attacks, and in the event of a threat, it will suggest what actions to take. In either case, please contact us.<\/span><\/p><p>By phone:<\/p><ul><li>Paulina \u015arama, phone: +48 605 586 507, email:\u00a0<a href=\"mailto:paulina.srama@upgreat.com.pl\">paulina.srama@upgreat.com.pl<\/a><\/li><li class=\"active\">Michalina Puzan\u00f3w, phone: +48 667 752 750, email:\u00a0<a href=\"mailto:michalina.puzanow@upgreat.com.pl\">michalina.puzanow@upgreat.com.pl<\/a><\/li><\/ul><p>\u00a0<\/p><p>or using the form -&gt; <a href=\"https:\/\/www.upgreat.pl\/en\/kontakt\/\">Contact | Upgreat<\/a><\/p><p>\u00a0<\/p><p>We will help.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u00a0 What is a ransomware attack? At first, it seemed to be something with the network. But then it turned out that it was not just the network, but everything. And not just on one computer, but on all of them, nothing works! These are the symptoms of a ransomware attack. Later, a ransom demand will probably appear. These can be large [\u2026]<\/p>","protected":false},"author":3,"featured_media":2500,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-2482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-poradniki"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>RANSOMWARE - JAK SI\u0118 ZACHOWA\u0106 GDY ZOSTANIEMY ZAATAKOWANI I JAK SI\u0118 ZABEZPIECZY\u0106 ABY ZACHOWA\u0106 CI\u0104G\u0141O\u015a\u0106 PROCES\u00d3W BIZNESOWYCH | Upgreat<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.upgreat.pl\/en\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RANSOMWARE - JAK SI\u0118 ZACHOWA\u0106 GDY ZOSTANIEMY ZAATAKOWANI I JAK SI\u0118 ZABEZPIECZY\u0106 ABY ZACHOWA\u0106 CI\u0104G\u0141O\u015a\u0106 PROCES\u00d3W BIZNESOWYCH | Upgreat\" \/>\n<meta property=\"og:description\" content=\"\u00a0 Czym jest atak ransomware? \u00a0 Na pocz\u0105tku wydawa\u0142o si\u0119, \u017ce to co\u015b z sieci\u0105. Potem jednak okaza\u0142o si\u0119, \u017ce nie tylko z sieci\u0105, ale w og\u00f3le ze wszystkim. I nie tylko na jednym komputerze, ale na wszystkich\u00a0nic nie dzia\u0142a!\u00a0 Tak mniej wi\u0119cej\u00a0wygl\u0105daj\u0105\u00a0objawy ataku ransomware. P\u00f3\u017aniej prawdopodobnie pojawi si\u0119 \u017c\u0105danie okupu. Mog\u0105 to by\u0107 du\u017ce [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.upgreat.pl\/en\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/\" \/>\n<meta property=\"og:site_name\" content=\"Upgreat\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-30T22:29:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-03T14:09:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2024\/12\/Ransoware-e1735647003756.png\" \/>\n\t<meta property=\"og:image:width\" content=\"5038\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Piotr Flis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Piotr Flis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/\"},\"author\":{\"name\":\"Piotr Flis\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/person\/b36c076cac02412eaf7aaf645a98ccff\"},\"headline\":\"RANSOMWARE &#8211; JAK SI\u0118 ZACHOWA\u0106 GDY ZOSTANIEMY ZAATAKOWANI I JAK SI\u0118 ZABEZPIECZY\u0106 ABY ZACHOWA\u0106 CI\u0104G\u0141O\u015a\u0106 PROCES\u00d3W BIZNESOWYCH\",\"datePublished\":\"2024-12-30T22:29:11+00:00\",\"dateModified\":\"2025-02-03T14:09:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/\"},\"wordCount\":1855,\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2024\/12\/Ransoware-e1735647003756.png\",\"articleSection\":[\"Poradniki\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/\",\"url\":\"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/\",\"name\":\"RANSOMWARE - JAK SI\u0118 ZACHOWA\u0106 GDY ZOSTANIEMY ZAATAKOWANI I JAK SI\u0118 ZABEZPIECZY\u0106 ABY ZACHOWA\u0106 CI\u0104G\u0141O\u015a\u0106 PROCES\u00d3W BIZNESOWYCH | Upgreat\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2024\/12\/Ransoware-e1735647003756.png\",\"datePublished\":\"2024-12-30T22:29:11+00:00\",\"dateModified\":\"2025-02-03T14:09:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#primaryimage\",\"url\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2024\/12\/Ransoware-e1735647003756.png\",\"contentUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2024\/12\/Ransoware-e1735647003756.png\",\"width\":5038,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.upgreat.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Poradniki\",\"item\":\"https:\/\/www.upgreat.pl\/blog\/category\/poradniki\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"RANSOMWARE &#8211; JAK SI\u0118 ZACHOWA\u0106 GDY ZOSTANIEMY ZAATAKOWANI I JAK SI\u0118 ZABEZPIECZY\u0106 ABY ZACHOWA\u0106 CI\u0104G\u0141O\u015a\u0106 PROCES\u00d3W BIZNESOWYCH\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.upgreat.pl\/#website\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"name\":\"Upgreat\",\"description\":\"Bezpiecze\u0144stwo system\u00f3w IT, Outsourcing IT, Architektura system\u00f3w IT\",\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.upgreat.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.upgreat.pl\/#organization\",\"name\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"contentUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"width\":600,\"height\":220,\"caption\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/person\/b36c076cac02412eaf7aaf645a98ccff\",\"name\":\"Piotr Flis\",\"description\":\"Wsp\u00f3\u0142za\u0142o\u017cyciel i prezes zarz\u0105du UpGreat Systemy Komputerowe Sp. z o.o. Firma od 30 lat wspiera du\u017ce i ma\u0142e przedsi\u0119biorstwa z terenu ca\u0142ej Polski w zakresie technologii informatycznych. Jego g\u0142\u00f3wne obszary zainteresowa\u0144 to bezpiecze\u0144stwo IT, z\u0142o\u017cone rozwi\u0105zania sieciowe oraz systemy pracy grupowej. Po godzinach smakuje niuanse prozy Stanis\u0142awa Lema.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RANSOMWARE - JAK SI\u0118 ZACHOWA\u0106 GDY ZOSTANIEMY ZAATAKOWANI I JAK SI\u0118 ZABEZPIECZY\u0106 ABY ZACHOWA\u0106 CI\u0104G\u0141O\u015a\u0106 PROCES\u00d3W BIZNESOWYCH | Upgreat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.upgreat.pl\/en\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/","og_locale":"en_US","og_type":"article","og_title":"RANSOMWARE - JAK SI\u0118 ZACHOWA\u0106 GDY ZOSTANIEMY ZAATAKOWANI I JAK SI\u0118 ZABEZPIECZY\u0106 ABY ZACHOWA\u0106 CI\u0104G\u0141O\u015a\u0106 PROCES\u00d3W BIZNESOWYCH | Upgreat","og_description":"\u00a0 Czym jest atak ransomware? \u00a0 Na pocz\u0105tku wydawa\u0142o si\u0119, \u017ce to co\u015b z sieci\u0105. Potem jednak okaza\u0142o si\u0119, \u017ce nie tylko z sieci\u0105, ale w og\u00f3le ze wszystkim. I nie tylko na jednym komputerze, ale na wszystkich\u00a0nic nie dzia\u0142a!\u00a0 Tak mniej wi\u0119cej\u00a0wygl\u0105daj\u0105\u00a0objawy ataku ransomware. P\u00f3\u017aniej prawdopodobnie pojawi si\u0119 \u017c\u0105danie okupu. Mog\u0105 to by\u0107 du\u017ce [&hellip;]","og_url":"https:\/\/www.upgreat.pl\/en\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/","og_site_name":"Upgreat","article_published_time":"2024-12-30T22:29:11+00:00","article_modified_time":"2025-02-03T14:09:11+00:00","og_image":[{"width":5038,"height":2560,"url":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2024\/12\/Ransoware-e1735647003756.png","type":"image\/png"}],"author":"Piotr Flis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Piotr Flis","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#article","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/"},"author":{"name":"Piotr Flis","@id":"https:\/\/www.upgreat.pl\/#\/schema\/person\/b36c076cac02412eaf7aaf645a98ccff"},"headline":"RANSOMWARE &#8211; JAK SI\u0118 ZACHOWA\u0106 GDY ZOSTANIEMY ZAATAKOWANI I JAK SI\u0118 ZABEZPIECZY\u0106 ABY ZACHOWA\u0106 CI\u0104G\u0141O\u015a\u0106 PROCES\u00d3W BIZNESOWYCH","datePublished":"2024-12-30T22:29:11+00:00","dateModified":"2025-02-03T14:09:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/"},"wordCount":1855,"publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"image":{"@id":"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2024\/12\/Ransoware-e1735647003756.png","articleSection":["Poradniki"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/","url":"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/","name":"RANSOMWARE - JAK SI\u0118 ZACHOWA\u0106 GDY ZOSTANIEMY ZAATAKOWANI I JAK SI\u0118 ZABEZPIECZY\u0106 ABY ZACHOWA\u0106 CI\u0104G\u0141O\u015a\u0106 PROCES\u00d3W BIZNESOWYCH | Upgreat","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#primaryimage"},"image":{"@id":"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2024\/12\/Ransoware-e1735647003756.png","datePublished":"2024-12-30T22:29:11+00:00","dateModified":"2025-02-03T14:09:11+00:00","breadcrumb":{"@id":"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#primaryimage","url":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2024\/12\/Ransoware-e1735647003756.png","contentUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2024\/12\/Ransoware-e1735647003756.png","width":5038,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/www.upgreat.pl\/blog\/ransomware-jak-sie-zachowac-gdy-zostaniemy-zaatakowani-i-jak-sie-zabezpieczyc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.upgreat.pl\/"},{"@type":"ListItem","position":2,"name":"Poradniki","item":"https:\/\/www.upgreat.pl\/blog\/category\/poradniki\/"},{"@type":"ListItem","position":3,"name":"RANSOMWARE &#8211; JAK SI\u0118 ZACHOWA\u0106 GDY ZOSTANIEMY ZAATAKOWANI I JAK SI\u0118 ZABEZPIECZY\u0106 ABY ZACHOWA\u0106 CI\u0104G\u0141O\u015a\u0106 PROCES\u00d3W BIZNESOWYCH"}]},{"@type":"WebSite","@id":"https:\/\/www.upgreat.pl\/#website","url":"https:\/\/www.upgreat.pl\/","name":"Upgreat","description":"Security of IT systems, IT Outsourcing, Architecture of IT systems","publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.upgreat.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.upgreat.pl\/#organization","name":"UpGreat.pl \u2013 professional IT services","url":"https:\/\/www.upgreat.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/","url":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","contentUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","width":600,"height":220,"caption":"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne"},"image":{"@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.upgreat.pl\/#\/schema\/person\/b36c076cac02412eaf7aaf645a98ccff","name":"Peter Flis","description":"Co-founder and CEO of UpGreat Computer Systems Sp. z o. o. The company has been supporting large and small enterprises from all over Poland in the field of information technology for 30 years. His main areas of interest are IT security, complex network solutions and group work systems. After hours, he savors the nuances of Stanis\u0142aw Lem&#039;s prose."}]}},"_links":{"self":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/2482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/comments?post=2482"}],"version-history":[{"count":26,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/2482\/revisions"}],"predecessor-version":[{"id":2545,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/posts\/2482\/revisions\/2545"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/media\/2500"}],"wp:attachment":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/media?parent=2482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/categories?post=2482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/tags?post=2482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}