{"id":15424,"date":"2025-10-02T14:54:30","date_gmt":"2025-10-02T01:54:30","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=15424"},"modified":"2025-10-02T14:54:30","modified_gmt":"2025-10-02T01:54:30","slug":"spamgpt-when-ai-becomes-a-phishing-playbook-and-how-to-protect-your-business","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=15424","title":{"rendered":"SpamGPT: When AI Becomes a Phishing Playbook\u2014And How to Protect Your Business"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;1470.2px&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p class=\"whitespace-normal break-words\"><strong>For years, we&#8217;ve told businesses to watch for telltale phishing signs: poor grammar, suspicious sender addresses, generic greetings. But what happens when cybercriminals have access to the same sophisticated AI tools your marketing team uses\u2014except weaponised specifically to bypass your defenses?<\/strong><\/p>\n<h2 class=\"whitespace-normal break-words\">Meet SpamGPT, the latest evolution in cybercrime that should concern all of us.<\/h2>\n<p class=\"whitespace-normal break-words\">This AI-powered toolkit, discovered on Russian-language hacking forums and advertised for around $US7,600, provides cybercriminals with an all-in-one platform that handles every aspect of email fraud campaigns\u2014from content generation to delivery optimisation.<\/p>\n<p class=\"whitespace-normal break-words\">SpamGPT represents a fundamental shift in the phishing landscape\u2014not because it introduces entirely new attack methods, but because it democratises sophisticated attack capabilities that previously required significant technical expertise.<\/p>\n<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\">The Professionalisation of Cybercrime<\/h2>\n<p class=\"whitespace-normal break-words\">SpamGPT&#8217;s interface mimics professional email marketing services, featuring modules for campaign management, SMTP\/IMAP setup, deliverability testing, and analytics\u2014offering all the conveniences a Fortune 500 marketer might expect, but adapted for cybercrime.<\/p>\n<p class=\"whitespace-normal break-words\">This isn&#8217;t your typical underground hacking tool. SpamGPT represents a troubling evolution: cybercrime-as-a-service delivered through enterprise-grade software.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>What makes SpamGPT particularly dangerous:<\/strong><\/p>\n<p class=\"whitespace-normal break-words\">The platform includes an integrated AI assistant (branded as &#8220;KaliGPT&#8221;) that generates phishing email content and suggests optimisations, meaning attackers no longer need to write convincing phishing emails themselves. They simply prompt the AI for persuasive scam templates, subject lines, or targeting advice.<\/p>\n<p class=\"whitespace-normal break-words\">The toolkit promises guaranteed inbox delivery to popular providers like Gmail, Outlook, and Microsoft 365 by abusing trusted cloud services such as Amazon AWS and SendGrid to mask malicious traffic.<\/p>\n<p class=\"whitespace-normal break-words\">The toolkit includes training on &#8220;SMTP cracking mastery,&#8221; teaching users how to compromise or create an unlimited supply of high-quality SMTP servers for sending spam, empowering even low-skilled actors to access the infrastructure needed for large-scale attacks.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>The strategic implications:<\/strong> What previously required a team of skilled developers can now be accomplished by a single bad actor with a ready-made toolkit. The barrier to entry for sophisticated phishing campaigns has collapsed.<\/p>\n<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\">Beyond Traditional Phishing Detection<\/h2>\n<p class=\"whitespace-normal break-words\">Traditional phishing detection relied on identifiable patterns: grammatical errors, suspicious links, generic messaging. SpamGPT systematically eliminates these telltale signs.<\/p>\n<p class=\"whitespace-normal break-words\">The platform provides real-time campaign monitoring and control, allowing attackers to track email delivery rates, open rates, and engagement\u2014then optimise their approach based on what works. It&#8217;s legitimate marketing analytics repurposed for criminal enterprise.<\/p>\n<p class=\"whitespace-normal break-words\">Even more concerning, SpamGPT helps attackers bypass basic email authentication checks by forging sender details and rotating them, especially effective if target domains lack strict DMARC, SPF, and DKIM enforcement.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>What this means for your business:<\/strong><\/p>\n<p class=\"whitespace-normal break-words\">The phishing emails reaching your staff inbox are becoming indistinguishable from legitimate business communications. They use proper grammar, reference relevant industry context, and land in the inbox rather than spam folders.<\/p>\n<p class=\"whitespace-normal break-words\">Your traditional &#8220;trust your instincts&#8221; approach to phishing detection becomes significantly less reliable when AI generates contextually appropriate, grammatically perfect content designed specifically to bypass your defenses.<\/p>\n<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\">The Scale Problem: From Targeted Attacks to Mass Personalisation<\/h2>\n<p class=\"whitespace-normal break-words\">Previous phishing campaigns faced a trade-off: broad reach or personalized targeting. SpamGPT eliminates this constraint.<\/p>\n<p class=\"whitespace-normal break-words\">Attackers can bulk import SMTP accounts, validate credentials, and pool dozens of SMTP servers for large campaigns, while IMAP monitoring allows them to log into inboxes to collect data and test whether messages land in the inbox versus spam folders.<\/p>\n<p class=\"whitespace-normal break-words\">This creates a new threat profile: mass phishing campaigns with personalisation typically associated with highly targeted attacks. Cybercriminals can now operate with the efficiency of enterprise marketing platforms while maintaining the convincing detail of hand-crafted scams.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>The business vulnerability:<\/strong> Your staff receives sophisticated, personalised phishing attempts at unprecedented volume.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>Even security-aware employees face decision fatigue when every communication requires heightened scrutiny.<\/strong><\/p>\n<p class=\"whitespace-normal break-words\"><strong><\/strong><\/p>\n<p class=\"whitespace-normal break-words\"><strong><\/strong><\/p>\n<p class=\"whitespace-normal break-words\"><strong><\/strong><\/p>\n<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\">Strategic Defence: Moving Beyond Reactive Security<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p class=\"whitespace-normal break-words\"><strong>The strategic security framework requires three integrated layers:<\/strong><\/p>\n<h3 class=\"text-lg font-bold text-text-100 mt-1 -mb-1.5\">Layer 1: Technical Authentication and Filtering<\/h3>\n<p class=\"whitespace-normal break-words\">Organisations must enforce strong email authentication protocols including DMARC, SPF, and DKIM to make domain spoofing more difficult, while deploying AI-powered email security solutions capable of detecting the subtle linguistic patterns and technical signatures of AI-generated phishing content.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>What this means practically:<\/strong> If you haven&#8217;t implemented strict email authentication policies, your domain can be easily spoofed by SpamGPT users. If your email security relies solely on traditional spam filters, AI-generated content will increasingly bypass your defences.<\/p>\n<p class=\"whitespace-normal break-words\">At Kinetics, our KARE Foundation service includes multi-layered email security that specifically addresses AI-generated threats. This isn&#8217;t just about blocking known bad actors\u2014it&#8217;s about identifying the subtle patterns that distinguish AI-generated phishing from legitimate communication.\u00a0 But even our best tools are always going to be playing &#8220;catch-up&#8221; when we&#8217;re fighting these threats.<\/p>\n<h3 class=\"text-lg font-bold text-text-100 mt-1 -mb-1.5\">Layer 2: Systematic User Education and Testing<\/h3>\n<p class=\"whitespace-normal break-words\">Traditional annual security training becomes obsolete when threat patterns evolve monthly. Strategic security requires continuous education that adapts to emerging threats.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>Effective security awareness includes:<\/strong><\/p>\n<ul>\n<li class=\"whitespace-normal break-words\"><strong>Regular phishing simulations<\/strong> that reflect current attack sophistication, including AI-generated content that mimics your specific business communications.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Contextual training<\/strong> that occurs when staff encounter actual threats, reinforcing lessons at the moment they&#8217;re most relevant.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Clear reporting procedures<\/strong> that make it trivially easy for staff to flag suspicious communications without fear of being wrong or wasting time.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Positive reinforcement<\/strong> when staff correctly identify and report potential phishing, creating a security-conscious culture rather than a punitive environment.<\/li>\n<\/ul>\n<p class=\"whitespace-normal break-words\">The goal isn&#8217;t teaching staff to be cybersecurity experts\u2014it&#8217;s creating systematic habits that reduce successful phishing attempts even as attack sophistication increases.<\/p>\n<h3 class=\"text-lg font-bold text-text-100 mt-1 -mb-1.5\">Layer 3: Incident Response and Business Continuity<\/h3>\n<p class=\"whitespace-normal break-words\">Despite best efforts, assume that some phishing attempts will succeed. Strategic security includes documented procedures for containing damage and maintaining business operations.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>Critical incident response elements:<\/strong><\/p>\n<ul>\n<li class=\"whitespace-normal break-words\"><strong>Rapid identification and isolation<\/strong> of compromised accounts before attackers can leverage access for broader damage.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Clear escalation procedures<\/strong> that ensure security incidents receive appropriate attention without creating organisational chaos.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Communication protocols<\/strong> that notify affected parties, maintain client confidence, and fulfill any regulatory requirements.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Recovery procedures<\/strong> that restore normal operations quickly while identifying how the breach occurred and preventing recurrence.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Regular testing<\/strong> of these procedures to ensure they work under actual incident conditions rather than just existing as documentation.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h3 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\">The Human Factor: Why Technology Alone Isn&#8217;t Sufficient<\/h3>\n<p class=\"whitespace-normal break-words\">SpamGPT&#8217;s effectiveness ultimately depends on exploiting human judgment. Even the most sophisticated technical defenses can be undermined by well-crafted social engineering.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>The strategic challenge:<\/strong> As AI makes phishing attacks more convincing, the human element becomes both your greatest vulnerability and your most important defense.<\/p>\n<p class=\"whitespace-normal break-words\">Consider these scenarios SpamGPT enables:<\/p>\n<ul>\n<li class=\"whitespace-normal break-words\"><strong>Finance team receives invoice:<\/strong> AI-generated email perfectly mimics vendor communication style, references legitimate project context, includes proper branding, and lands in the primary inbox. The only red flag is a slightly modified payment account\u2014easily missed during routine processing.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Executive receives urgent request:<\/strong> Sophisticated phishing email appears to come from board member, uses appropriate terminology and context from recent discussions, requests confidential information for &#8220;board review.&#8221; The urgency and authority combine to bypass normal verification procedures.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>IT department sees security alert:<\/strong> Convincing notification appears to warn of security issue, includes legitimate-looking login portal, uses proper branding and urgent language. Even security-aware staff might click through when presented with what appears to be a genuine security concern.<\/li>\n<\/ul>\n<p class=\"whitespace-normal break-words\"><strong>The defense:<\/strong> These scenarios aren&#8217;t prevented by technology alone. They require organisational culture that normalises verification, systematic procedures that catch anomalies, and business processes designed with security integration rather than security as afterthought.<\/p>\n<p class=\"whitespace-normal break-words\">\n<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\">Strategic Implementation:<\/h2>\n<h3 class=\"text-lg font-bold text-text-100 mt-1 -mb-1.5\">Immediate Actions<\/h3>\n<ul>\n<li class=\"whitespace-normal break-words\"><strong>Audit your email authentication settings.<\/strong> Verify that your domain has proper DMARC, SPF, and DKIM records configured to prevent spoofing. If you&#8217;re uncertain about your current configuration, this should be assessed immediately.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Review your email security solution.<\/strong> Does your current provider specifically address AI-generated phishing? Traditional spam filters designed for older threat patterns may not detect sophisticated AI-generated content.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Test your staff&#8217;s current awareness.<\/strong> Send realistic phishing simulations that reflect AI-generated sophistication. The results will identify immediate training needs and baseline your current vulnerability. (This is included in KARE Foundation)<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Document incident response procedures.<\/strong> If you don&#8217;t have clear, documented procedures for responding to successful phishing attempts, create them now. The middle of an incident is not the time to develop response protocols.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Create verification protocols.<\/strong> For high-risk actions (payment changes, data access, financial transfers), implement systematic verification procedures that occur outside email channels.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Enable multi-factor authentication universally.<\/strong> Even if credentials are compromised through phishing, MFA provides critical additional protection layer.<\/li>\n<\/ul>\n<h3 class=\"text-lg font-bold text-text-100 mt-1 -mb-1.5\"><\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\">The Cost of Delayed Action<\/h2>\n<p class=\"whitespace-normal break-words\">While SpamGPT represents a new sophistication level, it won&#8217;t be the last evolution in AI-powered cybercrime. The tool&#8217;s sellers have indicated a &#8220;new version&#8221; is coming soon, suggesting continuous development and capability enhancement.<\/p>\n<p class=\"whitespace-normal break-words\">Every day your business operates without strategic email security increases accumulated risk. The question isn&#8217;t whether your organisation will face AI-powered phishing attempts\u2014<span style=\"text-decoration: underline;\">it&#8217;s whether your defences will be adequate when they arrive.<\/span><\/p>\n<p class=\"whitespace-normal break-words\"><strong>The business impact of successful phishing extends beyond immediate theft:<\/strong><\/p>\n<p class=\"whitespace-normal break-words\">Financial losses from fraudulent transfers or invoice manipulation can be substantial, but often represent just the initial damage. Compromised credentials provide attackers with ongoing access to sensitive data, client information, and business systems.<\/p>\n<p class=\"whitespace-normal break-words\">Regulatory consequences follow data breaches, particularly when inadequate security measures contributed to the incident. Client confidence erodes when businesses demonstrate insufficient protection for sensitive information.<\/p>\n<p class=\"whitespace-normal break-words\">Operational disruption occurs when security incidents require system lockdowns, account resets, and comprehensive audits. The time your team spends recovering from incidents represents opportunity cost that compounds the direct financial impact.<\/p>\n<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\">The Kinetics Approach to Evolving Threats<\/h2>\n<p class=\"whitespace-normal break-words\">At Kinetics, we&#8217;ve watched cybersecurity threats evolve for nearly three decades. SpamGPT isn&#8217;t fundamentally different from previous threat evolutions\u2014it&#8217;s more sophisticated, more accessible, and more dangerous, but the strategic response remains consistent: systematic, layered defense that adapts to emerging threats.<\/p>\n<p class=\"whitespace-normal break-words\">Our <a href=\"https:\/\/new.kinetics.co.nz\/cybersecurity\/\">KARE Foundation servic<\/a>e provides the integrated security framework that addresses AI-powered threats:<\/p>\n<ul>\n<li class=\"whitespace-normal break-words\"><strong>Multi-layered email protection<\/strong> that specifically identifies AI-generated phishing patterns rather than relying solely on traditional spam detection.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Continuous monitoring and threat intelligence<\/strong> that adapts to emerging attack patterns as they develop rather than responding only after successful breaches.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Systematic user education<\/strong> that evolves with threat sophistication, ensuring your team&#8217;s security awareness matches current attack capabilities.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Documented incident response<\/strong> that enables rapid containment and recovery when breaches occur despite prevention efforts.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Regular security assessments<\/strong> that evaluate your protection posture against realistic business threats rather than generic compliance checklists.<\/li>\n<\/ul>\n<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\">Beyond SpamGPT: Building Resilient Security<\/h2>\n<p class=\"whitespace-normal break-words\">The strategic question isn&#8217;t &#8220;How do we stop SpamGPT?&#8221;\u2014it&#8217;s &#8220;How do we build security frameworks that remain effective as threats continue evolving?&#8221;<\/p>\n<p class=\"whitespace-normal break-words\">SpamGPT represents current sophistication, but cybercriminals will continue developing more capable tools. Strategic security focuses on creating resilient frameworks that adapt to emerging threats rather than responding reactively to each new tool.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>The resilience framework includes:<\/strong><\/p>\n<ul>\n<li class=\"whitespace-normal break-words\"><strong>Systematic processes<\/strong> that don&#8217;t depend on perfect threat identification but rather create multiple verification layers that catch anomalies.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Organisational culture<\/strong> where security awareness is normalized rather than treated as burden or compliance requirement.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Technical defenses<\/strong> that specifically address AI-generated threats while remaining adaptable as attack patterns evolve.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Business continuity planning<\/strong> that assumes some breaches will occur despite best efforts and focuses on minimizing damage and recovery time.<\/li>\n<li class=\"whitespace-normal break-words\"><strong>Continuous improvement<\/strong> based on measured results rather than assumptions about what should work.<\/li>\n<\/ul>\n<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\">Ready for Strategic Security Assessment?<\/h2>\n<p class=\"whitespace-normal break-words\">Understanding how AI-powered threats like SpamGPT impact your specific business environment requires comprehensive evaluation of your current security posture, user awareness levels, and incident response capabilities.<\/p>\n<p class=\"whitespace-normal break-words\">Our complimentary IT Partnership Health Check includes detailed cybersecurity assessment using frameworks specifically designed to address emerging AI-powered threats. This assessment identifies gaps between your current protections and the sophisticated attacks your business now faces.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For years, we&#8217;ve told businesses to watch for telltale phishing signs: poor grammar, suspicious sender addresses, generic greetings. But what happens when cybercriminals have access to the same sophisticated AI tools your marketing team uses\u2014except weaponised specifically to bypass your defenses? Meet SpamGPT, the latest evolution in cybercrime that should concern all of us. This [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":15434,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[7,4,5],"tags":[],"class_list":["post-15424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/15424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15424"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/15424\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}