	{"id":3763,"date":"2012-03-08T09:44:57","date_gmt":"2012-03-08T17:44:57","guid":{"rendered":"http:\/\/blog.intego.com\/?p=3763"},"modified":"2016-02-12T10:13:46","modified_gmt":"2016-02-12T18:13:46","slug":"flashback-malware-new-variant-changes-twitter-hashtags","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/","title":{"rendered":"Flashback Malware: New Variant Changes Twitter Hashtags"},"content":{"rendered":"<p>We recently reported on how the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-mac-malware-uses-twitter-as-command-and-control-center\/\">Flashback malware was using Twitter as a command and control center<\/a>, using a correspondence table between dates and four-letter strings, combining them to make twelve-letter strings.<!--more--> The malware sends HTTP requests to Twitter ever hour, searching for these hashtags, and only those tweets posted since the last time it checked, but we have yet to find any actual tweets containing them.<\/p>\n<p>After our blog post, the latest variant contains a slightly different correspondence table. One letter in most of the four-letter codes has changed, and one is the same. Here are the new codes:<\/p>\n<table class=\"flashback-code\">\n<tbody>\n<tr>\n<td class=\"number-a\">0<\/td>\n<td class=\"code-a\">gsqj<\/td>\n<td class=\"number-b\">18<\/td>\n<td class=\"code-b\">kddd<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">1<\/td>\n<td class=\"code-a\">dljt<\/td>\n<td class=\"number-b\">19<\/td>\n<td class=\"code-b\">neal<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">2<\/td>\n<td class=\"code-a\">yxad<\/td>\n<td class=\"number-b\">20<\/td>\n<td class=\"code-b\">hcca<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">3<\/td>\n<td class=\"code-a\">kpdh<\/td>\n<td class=\"number-b\">21<\/td>\n<td class=\"code-b\">dqzo<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">4<\/td>\n<td class=\"code-a\">izaw<\/td>\n<td class=\"number-b\">22<\/td>\n<td class=\"code-b\">kxag<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">5<\/td>\n<td class=\"code-a\">pepb<\/td>\n<td class=\"number-b\">23<\/td>\n<td class=\"code-b\">vpqt<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">6<\/td>\n<td class=\"code-a\">ezvn<\/td>\n<td class=\"number-b\">24<\/td>\n<td class=\"code-b\">wdld<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">7<\/td>\n<td class=\"code-a\">hwbd<\/td>\n<td class=\"number-b\">25<\/td>\n<td class=\"code-b\">nsiy<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">8<\/td>\n<td class=\"code-a\">d2ir<\/td>\n<td class=\"number-b\">26<\/td>\n<td class=\"code-b\">mlvo<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">9<\/td>\n<td class=\"code-a\">rnep<\/td>\n<td class=\"number-b\">27<\/td>\n<td class=\"code-b\">rdel<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">10<\/td>\n<td class=\"code-a\">uqdw<\/td>\n<td class=\"number-b\">28<\/td>\n<td class=\"code-b\">zdxl<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">11<\/td>\n<td class=\"code-a\">jfng<\/td>\n<td class=\"number-b\">29<\/td>\n<td class=\"code-b\">dlno<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">12<\/td>\n<td class=\"code-a\">xloa<\/td>\n<td class=\"number-b\">30<\/td>\n<td class=\"code-b\">bcti<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">13<\/td>\n<td class=\"code-a\">rpdg<\/td>\n<td class=\"number-b\">31<\/td>\n<td class=\"code-b\">eoof<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">14<\/td>\n<td class=\"code-a\">aefl<\/td>\n<td class=\"number-b\">32<\/td>\n<td class=\"code-b\">msan<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">15<\/td>\n<td class=\"code-a\">ocur<\/td>\n<td class=\"number-b\">33<\/td>\n<td class=\"code-b\">xlco<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">16<\/td>\n<td class=\"code-a\">dppu<\/td>\n<td class=\"number-b\">34<\/td>\n<td class=\"code-b\">jsiq<\/td>\n<\/tr>\n<tr>\n<td class=\"number-a\">17<\/td>\n<td class=\"code-a\">jeuv<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>We&#8217;re certain that this change was made because we published the previous codes. We will continue publishing them each time we find new codes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We recently reported on how the Flashback malware was using Twitter as a command and control center, using a correspondence table between dates and four-letter strings, combining them to make twelve-letter strings.<\/p>\n","protected":false},"author":3,"featured_media":8755,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[153,1939,86,134],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We recently reported on how the Flashback malware was using Twitter as a command and control center, using a correspondence table between dates and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Flashback Malware: New Variant Changes Twitter Hashtags - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We recently reported on how the Flashback malware was using Twitter as a command and control center, using a correspondence table between dates and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-08T17:44:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:13:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/\",\"name\":\"Flashback Malware: New Variant Changes Twitter Hashtags - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#primaryimage\"},\"datePublished\":\"2012-03-08T17:44:57+00:00\",\"dateModified\":\"2016-02-12T18:13:46+00:00\",\"description\":\"We recently reported on how the Flashback malware was using Twitter as a command and control center, using a correspondence table between dates and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Flashback Malware: New Variant Changes Twitter Hashtags\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Flashback Malware: New Variant Changes Twitter Hashtags\",\"datePublished\":\"2012-03-08T17:44:57+00:00\",\"dateModified\":\"2016-02-12T18:13:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#webpage\"},\"wordCount\":167,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png\",\"keywords\":[\"Flashback\",\"Hashtags\",\"Malware\",\"X (Twitter)\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We recently reported on how the Flashback malware was using Twitter as a command and control center, using a correspondence table between dates and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/","og_locale":"en_US","og_type":"article","og_title":"Flashback Malware: New Variant Changes Twitter Hashtags - The Mac Security Blog","og_description":"We recently reported on how the Flashback malware was using Twitter as a command and control center, using a correspondence table between dates and","og_url":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-03-08T17:44:57+00:00","article_modified_time":"2016-02-12T18:13:46+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/","name":"Flashback Malware: New Variant Changes Twitter Hashtags - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#primaryimage"},"datePublished":"2012-03-08T17:44:57+00:00","dateModified":"2016-02-12T18:13:46+00:00","description":"We recently reported on how the Flashback malware was using Twitter as a command and control center, using a correspondence table between dates and","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Flashback Malware: New Variant Changes Twitter Hashtags"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Flashback Malware: New Variant Changes Twitter Hashtags","datePublished":"2012-03-08T17:44:57+00:00","dateModified":"2016-02-12T18:13:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#webpage"},"wordCount":167,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","keywords":["Flashback","Hashtags","Malware","X (Twitter)"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/flashback-malware-new-variant-changes-twitter-hashtags\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-YH","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3763"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=3763"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3763\/revisions"}],"predecessor-version":[{"id":4348,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3763\/revisions\/4348"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8755"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=3763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=3763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=3763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}