{"id":4842,"date":"2012-06-06T16:00:20","date_gmt":"2012-06-06T23:00:20","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=4842"},"modified":"2016-02-12T10:20:19","modified_gmt":"2016-02-12T18:20:19","slug":"flame-education-part-2","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/","title":{"rendered":"Flame Education, Part 2"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO.jpg\"><img loading=\"lazy\" class=\"size-full wp-image-4869 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO.jpg\" alt=\"\" width=\"560\" height=\"199\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO.jpg 560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO-300x106.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO-100x35.jpg 100w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/a><a href=\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/\"><br \/>\nLast week we discussed<\/a> some of the techniques that could have helped detect Flame in its earliest stages: Layered defense and generic detection. This week, we\u2019ll discuss something without which the security industry would be much less effective: Sample and information sharing.<\/p>\n<p>Most people assume that security companies operate like any other business, in that any information going to competitors is strictly forbidden. But in fact, security companies are something like a combination between a regular business and a police force. We share samples, research, and certain data as needed to ensure we\u2019re all protecting the public as best as possible.<\/p>\n<p>Security software companies all have a research department that goes hunting for malware, vulnerabilities, spam, phish, or whatever other nasties are their specialty. But for many companies, anti-malware in particular, the bulk of the samples they receive are from people or businesses whose systems have been affected. In an era where targeted attacks are becoming more prevalent and more sophisticated, we need these legions of extra pairs of eyes in the field to make sure that we have all the information to protect everyone. If we\u2019re not the target, we would never be able to access to this data otherwise.<\/p>\n<p>Once the nasties have been found, researchers take them back and tear them apart so that we can find ways to protect against them. And at the end of the day, we share information about the threats with a variety of different organizations. Most security companies report particularly notable threats on blogs or in cybersecurity groups. We send information to law enforcement agencies when there is the possibility of prosecuting the offenders, or ISPs and Domain Name Registrars when there is an opportunity to shut down a cybercrime operation.<\/p>\n<p>This last instance is another instance where reports from customers are essential. Part of the process of proving a crime that has been committed is bad enough to warrant arresting someone or shutting down a web address, is assessing monetary damage. Security companies can\u2019t know this information because it isn\u2019t our machines that are being damaged; it\u2019s customers\u2019 machines.<\/p>\n<p><strong>How does this pertain to Flame?<\/strong><\/p>\n<p>Now that I\u2019ve gone through this whole long pre-amble, you may be wondering: What does this have to do with the Flame situation?<\/p>\n<p>So, we know that Flame was a targeted attack. Likely state-sponsored. It was quite sneaky, and the target they were going after was very limited, both geographically and by industry. It wasn\u2019t exactly ninja-quality stealth, as samples of some components were sent to the security industry years ago. But nevertheless, it was pretty far under the radar.<\/p>\n<p>As no one in the security industry had a complete sample until several days ago, we didn\u2019t have a good idea of what we were looking at. The vast majority of samples come to security companies piecemeal, with little to no information. It\u2019s a little like trying to identify an elephant from a picture of its toenails. We might be able to tell you it\u2019s probably an elephant, but we won\u2019t have enough context to tell you whether it\u2019s Asian or African, whether it\u2019s male or female, how old it is, etc.<\/p>\n<p>The thing that really turned the tide with Flame is the <a href=\"http:\/\/www.darkreading.com\/threat-intelligence\/167901121\/security\/attacks-breaches\/240001228\/iranian-cert-takes-center-stage-with-flame.html\">cooperation of Iranian CERT<\/a> . Most countries have some sort of CERT, or Computer Emergency Readiness (or Response) Team. Most of those teams have some sort of relationship with security software companies to report incidents so that we can make sure the public is maximally protected. Because of the current international political situation, this has been very difficult with Iran. But they provided security vendors with enough information to get us all started on analyzing this threat in earnest.<\/p>\n<p><strong>What does this have to do with me?<\/strong><\/p>\n<p>This is really what it all comes down to. Iranian CERT would not have had information to share if the affected companies had kept information about the Flame attacks to themselves. It\u2019s vitally important for all of us, not just government agencies or big businesses, to report cybercrime.<\/p>\n<p>There are not yet a lot of countries that have centralized cybercrime reporting, but here is a list of a few countries and their reporting instructions:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.ic3.gov\/default.aspx\">USA<\/a><\/li>\n<li><a href=\"http:\/\/www.met.police.uk\/pceu\/\">UK<\/a><\/li>\n<li><a href=\"http:\/\/indiacyberlab.in\/cybercrimes\/report.htm\">India<\/a><\/li>\n<li><a href=\"http:\/\/www.cybercrime.admin.ch\/content\/kobik\/en\/home\/meldeformular.html\">Switzerland<\/a><\/li>\n<\/ul>\n<p>You can also send samples of malware to your anti-malware vendors. Our sample-submission address is <a title=\"sample@virusbarrier.com\" href=\"sample@virusbarrier.com\">sample@virusbarrier.com<\/a><\/p>\n<p>Any details you can include about how you think the sample came to you (website, email, instant message, thumb drive, etc.) is greatly appreciated. It\u2019s best to send the sample in a password-protected ZIP file (password \u2013 infected). But it\u2019s better to send us a sample however you can rather than not to report it at all. If we require more information, we can work with you to help you gather the appropriate information. It\u2019s easy, and it helps us all be better protected.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week we discussed some of the techniques that could have helped detect Flame in its earliest stages: Layered defense and generic detection. This week, we\u2019ll discuss something without which the security industry would be much less effective: Sample and information sharing.<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,13,5],"tags":[163,86,3154],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Last week we discussed some of the techniques that could have helped detect Flame in its earliest stages: Layered defense and generic detection. This week, we\u2019ll discuss something without which the security industry would be much less effective: Sample and information sharing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Flame Education, Part 2 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Last week we discussed some of the techniques that could have helped detect Flame in its earliest stages: Layered defense and generic detection. This week, we\u2019ll discuss something without which the security industry would be much less effective: Sample and information sharing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-06T23:00:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:20:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO.jpg\",\"width\":\"560\",\"height\":\"199\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/\",\"name\":\"Flame Education, Part 2 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#primaryimage\"},\"datePublished\":\"2012-06-06T23:00:20+00:00\",\"dateModified\":\"2016-02-12T18:20:19+00:00\",\"description\":\"Last week we discussed some of the techniques that could have helped detect Flame in its earliest stages: Layered defense and generic detection. This week, we\\u2019ll discuss something without which the security industry would be much less effective: Sample and information sharing.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Flame Education, Part 2\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Flame Education, Part 2\",\"datePublished\":\"2012-06-06T23:00:20+00:00\",\"dateModified\":\"2016-02-12T18:20:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#webpage\"},\"wordCount\":824,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO.jpg\",\"keywords\":[\"Flame\",\"Malware\",\"Security &amp; Privacy\"],\"articleSection\":[\"Malware\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Last week we discussed some of the techniques that could have helped detect Flame in its earliest stages: Layered defense and generic detection. This week, we\u2019ll discuss something without which the security industry would be much less effective: Sample and information sharing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/","og_locale":"en_US","og_type":"article","og_title":"Flame Education, Part 2 - The Mac Security Blog","og_description":"Last week we discussed some of the techniques that could have helped detect Flame in its earliest stages: Layered defense and generic detection. This week, we\u2019ll discuss something without which the security industry would be much less effective: Sample and information sharing.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-06-06T23:00:20+00:00","article_modified_time":"2016-02-12T18:20:19+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO.jpg","width":"560","height":"199"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/","name":"Flame Education, Part 2 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#primaryimage"},"datePublished":"2012-06-06T23:00:20+00:00","dateModified":"2016-02-12T18:20:19+00:00","description":"Last week we discussed some of the techniques that could have helped detect Flame in its earliest stages: Layered defense and generic detection. This week, we\u2019ll discuss something without which the security industry would be much less effective: Sample and information sharing.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Flame Education, Part 2"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Flame Education, Part 2","datePublished":"2012-06-06T23:00:20+00:00","dateModified":"2016-02-12T18:20:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#webpage"},"wordCount":824,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_04a_CO.jpg","keywords":["Flame","Malware","Security &amp; Privacy"],"articleSection":["Malware","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-2\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1g6","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4842"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=4842"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4842\/revisions"}],"predecessor-version":[{"id":7173,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4842\/revisions\/7173"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=4842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=4842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=4842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}