{"id":11411,"date":"2025-08-21T02:14:53","date_gmt":"2025-08-21T02:14:53","guid":{"rendered":"https:\/\/blog.clickpanda.com\/?p=11411"},"modified":"2025-08-21T02:15:56","modified_gmt":"2025-08-21T02:15:56","slug":"ransomware-as-a-service-como-funciona-y-como-protegerte","status":"publish","type":"post","link":"https:\/\/blog.clickpanda.com\/en\/security\/ransomware-as-a-service-how-it-works-and-how-to-protect-yourself\/","title":{"rendered":"Ransomware-as-a-Service: how it works and how to protect yourself"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"11411\" class=\"elementor elementor-11411\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7dd3da4 e-flex e-con-boxed e-con e-parent\" data-id=\"7dd3da4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bbb582a elementor-widget elementor-widget-heading\" data-id=\"bbb582a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Introduction<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d420cd0 elementor-widget elementor-widget-text-editor\" data-id=\"d420cd0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"599\" data-end=\"1074\">Ransomware is one of the most destructive threats in the world of cybersecurity. This type of attack has evolved, and today, the business model behind ransomware attacks is becoming increasingly accessible to criminals through a model known as <strong data-start=\"876\" data-end=\"903\">Ransomware-as-a-Service<\/strong> (RaaS). This model allows even people without technical skills to launch ransomware attacks in a cost-effective manner, making it an even greater threat.<\/p><p data-start=\"1076\" data-end=\"1412\">In this article, we will explore what is <strong data-start=\"1114\" data-end=\"1148\">Ransomware-as-a-Service (RaaS)<\/strong>You will learn how this criminal business model works and what steps you can take to protect yourself from these attacks. You will learn how cybercriminals use this service as a way to make money and how you can prevent yourself from becoming a victim of these destructive attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed2dbc9 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-global elementor-global-10394 elementor-widget-table-of-contents\" data-id=\"ed2dbc9\" data-element_type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h2&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__ed2dbc9\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__ed2dbc9\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/div>\n\t\t\t\t\t<\/div>\n\t\t<div id=\"elementor-toc__ed2dbc9\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<svg class=\"elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading\" aria-hidden=\"true\" viewbox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb5a01d elementor-widget elementor-widget-text-editor\" data-id=\"bb5a01d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"1419\" data-end=\"1469\"><strong data-start=\"1423\" data-end=\"1469\">What is Ransomware-as-a-Service (RaaS)?<\/strong><\/h2><p data-start=\"1471\" data-end=\"1831\"><strong data-start=\"1471\" data-end=\"1486\">Definition:<\/strong><br data-start=\"1486\" data-end=\"1489\" \/>The model <strong data-start=\"1499\" data-end=\"1533\">Ransomware-as-a-Service (RaaS)<\/strong> is a service offered by cybercriminals that allows others, even without technical expertise, to launch ransomware attacks. RaaS \"providers\" create and distribute the ransomware software, while affiliates use it to infect devices and demand ransom.<\/p><p data-start=\"1833\" data-end=\"2102\"><strong data-start=\"1833\" data-end=\"1851\">How it works:<\/strong><br data-start=\"1851\" data-end=\"1854\" \/>The RaaS provider provides a toolkit or malware that attackers can customize and use. In return, the provider receives a percentage of the ransom paid, while the attacker keeps most of the money.<\/p><p data-start=\"2104\" data-end=\"2333\"><strong data-start=\"2104\" data-end=\"2116\">Example:<\/strong><br data-start=\"2116\" data-end=\"2119\" \/>A low-level criminal with no technical skills can subscribe to a RaaS service, customize the ransomware software for their targets, and launch the attack in exchange for a share of the ransom collected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b53132 elementor-widget elementor-widget-text-editor\" data-id=\"8b53132\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2340\" data-end=\"2386\"><strong data-start=\"2344\" data-end=\"2386\"> The business model behind RaaS<\/strong><\/h2><p data-start=\"2388\" data-end=\"2671\"><strong data-start=\"2388\" data-end=\"2417\">Accessibility for all:<\/strong><br data-start=\"2417\" data-end=\"2420\" \/>What makes RaaS so dangerous is its accessibility. Affiliates don't need technical expertise to carry out the attack. They simply pay a fee or subscription to use the software and start launching ransomware attacks.<\/p><p data-start=\"2673\" data-end=\"2938\"><strong data-start=\"2673\" data-end=\"2690\">Profitability:<\/strong><br data-start=\"2690\" data-end=\"2693\" \/>For RaaS providers, it is a highly profitable model, as they earn a commission from each ransom paid. Meanwhile, attackers can launch large-scale attacks, which increases the likelihood of financial gain.<\/p><p data-start=\"2940\" data-end=\"3111\"><strong data-start=\"2940\" data-end=\"2952\">Example:<\/strong><br data-start=\"2952\" data-end=\"2955\" \/>The ransomware <strong data-start=\"2969\" data-end=\"2978\">REvil<\/strong>one of the most notorious groups using the RaaS model, has generated millions of dollars through attacks on companies and governments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df9868b elementor-widget elementor-widget-text-editor\" data-id=\"df9868b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"3118\" data-end=\"3172\"><strong data-start=\"3122\" data-end=\"3172\">How are RaaS attacks carried out?<\/strong><\/h2><p data-start=\"3174\" data-end=\"3197\"><strong data-start=\"3174\" data-end=\"3197\">Attack process:<\/strong><\/p><ul data-start=\"3199\" data-end=\"3901\"><li data-start=\"3199\" data-end=\"3345\"><p data-start=\"3201\" data-end=\"3345\"><strong data-start=\"3201\" data-end=\"3228\">Target selection:<\/strong> Attackers select targets, which can be companies, government institutions or individual users.<\/p><\/li><li data-start=\"3346\" data-end=\"3560\"><p data-start=\"3348\" data-end=\"3560\"><strong data-start=\"3348\" data-end=\"3380\">Ransomware distribution:<\/strong> Using methods such as phishing or exploits of vulnerabilities, ransomware is distributed through emails, malicious attachments or compromised websites.<\/p><\/li><li data-start=\"3561\" data-end=\"3749\"><p data-start=\"3563\" data-end=\"3749\"><strong data-start=\"3563\" data-end=\"3587\">File encryption:<\/strong> Once the ransomware is installed, it encrypts the target's important files, making access to them impossible without a decryption key.<\/p><\/li><li data-start=\"3750\" data-end=\"3901\"><p data-start=\"3752\" data-end=\"3901\"><strong data-start=\"3752\" data-end=\"3777\">Ransom demand:<\/strong> The attacker demands the payment of a ransom (usually in cryptocurrencies) in exchange for the key to unlock the files.<\/p><\/li><\/ul><p data-start=\"3903\" data-end=\"4082\"><strong data-start=\"3903\" data-end=\"3915\">Example:<\/strong><br data-start=\"3915\" data-end=\"3918\" \/>The attack <strong data-start=\"3928\" data-end=\"3940\">WannaCry<\/strong> is one of the best known examples of ransomware, which spread rapidly affecting hundreds of thousands of devices worldwide.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae0edb2 elementor-widget elementor-widget-image\" data-id=\"ae0edb2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/clickpanda.com\/es-co\/certificados-ssl?utm_source=blog&#038;utm_medium=text&#038;utm_campaign=blog&#038;utm_term=blog&#038;utm_content=inline_link\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/wordpress-blogs.s3.us-east-2.amazonaws.com\/wp-content\/uploads\/2024\/07\/04214733\/CTA-BLOG-SSL.gif\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b98ccd elementor-widget elementor-widget-text-editor\" data-id=\"4b98ccd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"4089\" data-end=\"4129\"><strong data-start=\"4093\" data-end=\"4129\">RaaS risks for companies.<\/strong><\/h2><ul data-start=\"4131\" data-end=\"4603\"><li data-start=\"4131\" data-end=\"4401\"><p data-start=\"4133\" data-end=\"4401\"><strong data-start=\"4133\" data-end=\"4155\">Economic impact:<\/strong><br data-start=\"4155\" data-end=\"4158\" \/>RaaS attacks can result in millions of dollars in losses due to operational downtime, data loss and damaged reputation. Companies may be forced to pay the ransom or face worse consequences, such as losing valuable data.<\/p><\/li><li data-start=\"4403\" data-end=\"4603\"><p data-start=\"4405\" data-end=\"4603\"><strong data-start=\"4405\" data-end=\"4428\">Additional costs:<\/strong><br data-start=\"4428\" data-end=\"4431\" \/>In addition to ransom payments, companies also face recovery costs, legal bonds and compliance costs if sensitive data is compromised.<\/p><\/li><\/ul><p data-start=\"4605\" data-end=\"4814\"><strong data-start=\"4605\" data-end=\"4617\">Example:<\/strong><br data-start=\"4617\" data-end=\"4620\" \/>Companies such as <strong data-start=\"4634\" data-end=\"4643\">Honda<\/strong> y <strong data-start=\"4646\" data-end=\"4656\">Garmin<\/strong> were victims of major ransomware attacks, resulting in significant financial losses and disruption to their operations for weeks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e767619 elementor-widget elementor-widget-text-editor\" data-id=\"e767619\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"4821\" data-end=\"4887\"><strong data-start=\"4825\" data-end=\"4887\">How to protect yourself from RaaS and other ransomware attacks?<\/strong><\/h2><ul data-start=\"4889\" data-end=\"5738\"><li data-start=\"4889\" data-end=\"5176\"><p data-start=\"4891\" data-end=\"5176\"><strong data-start=\"4891\" data-end=\"4921\">Awareness and training:<\/strong><br data-start=\"4921\" data-end=\"4924\" \/>Employee education and training is key to preventing employees from falling for phishing tactics. Make sure your employees recognize suspicious emails and do not click on links or attachments from unknown sources.<\/p><\/li><li data-start=\"5178\" data-end=\"5345\"><p data-start=\"5180\" data-end=\"5345\"><strong data-start=\"5180\" data-end=\"5210\">Software update:<\/strong><br data-start=\"5210\" data-end=\"5213\" \/>Keep all systems and applications up to date to protect against vulnerability exploits that attackers can use.<\/p><\/li><li data-start=\"5347\" data-end=\"5544\"><p data-start=\"5349\" data-end=\"5544\"><strong data-start=\"5349\" data-end=\"5377\">Backup and recovery:<\/strong><br data-start=\"5377\" data-end=\"5380\" \/>Implement a policy of regular backups and make sure they are isolated from the rest of the network to prevent them from also being encrypted by ransomware.<\/p><\/li><li data-start=\"5546\" data-end=\"5738\"><p data-start=\"5548\" data-end=\"5738\"><strong data-start=\"5548\" data-end=\"5588\">Advanced security tools:<\/strong><br data-start=\"5588\" data-end=\"5591\" \/>Use antivirus software and next-generation firewalls that can detect and block malicious files before they are installed on your network.<\/p><\/li><\/ul><p data-start=\"5740\" data-end=\"5901\"><strong data-start=\"5740\" data-end=\"5752\">Example:<\/strong><br data-start=\"5752\" data-end=\"5755\" \/>If you are a small business, use automatic backup solutions and ransomware detection software such as <strong data-start=\"5866\" data-end=\"5882\">Malwarebytes<\/strong> o <strong data-start=\"5885\" data-end=\"5900\">Bitdefender<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49dfdd4 elementor-widget elementor-widget-text-editor\" data-id=\"49dfdd4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"296\" data-end=\"389\"><strong data-start=\"300\" data-end=\"389\">Emerging Threats and the Convergence of Artificial Intelligence in Cybersecurity<\/strong><\/h2><p data-start=\"391\" data-end=\"819\">Cybersecurity is constantly evolving, and threats such as <strong data-start=\"471\" data-end=\"505\">Ransomware-as-a-Service (RaaS)<\/strong> are not the only ones we should be concerned about. As the <strong data-start=\"573\" data-end=\"600\">artificial intelligence<\/strong> (AI) is continuing to develop, new types of attacks and vulnerabilities are emerging, including the <strong data-start=\"705\" data-end=\"715\">AI PCs<\/strong>. These AI-based devices present additional risks that companies need to be aware of.<\/p><p data-start=\"821\" data-end=\"945\"><strong data-start=\"821\" data-end=\"945\"><a class=\"decorated-link\" href=\"https:\/\/blog.clickpanda.com\/en\/ia\/security-risks-ai-pcs\/\" target=\"_new\" rel=\"noopener\" data-start=\"823\" data-end=\"943\">Learn more about the risks of AI PCs and how to protect yourself<\/a><\/strong><\/p><p data-start=\"947\" data-end=\"1139\">This article delves deeper into the emerging risks related to the <strong data-start=\"1019\" data-end=\"1029\">AI PCs<\/strong>which could compromise your infrastructure, especially when combined with ransomware attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85afdb0 elementor-widget elementor-widget-text-editor\" data-id=\"85afdb0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"93\" data-end=\"187\"><strong data-start=\"97\" data-end=\"187\">Case Studies: How companies overcame Ransomware-as-a-Service (RaaS) attacks<\/strong><\/h2><p data-start=\"189\" data-end=\"486\">In this section, we share stories of companies that faced Ransomware-as-a-Service (RaaS) attacks and how they managed to protect themselves or overcome the threat. These testimonials will allow you to better understand how these attacks work and what measures can be taken to avoid falling victim to them.<\/p><h4 data-start=\"488\" data-end=\"555\"><strong data-start=\"493\" data-end=\"555\">Case Study 1: Garmin's recovery from a RaaS attack<\/strong><\/h4><p data-start=\"556\" data-end=\"630\"><strong data-start=\"556\" data-end=\"630\">\"How Garmin avoided a million-dollar meltdown after a ransomware attack.\"<\/strong><\/p><p data-start=\"632\" data-end=\"955\">In 2020, Garmin suffered a ransomware attack that severely impacted its global operations. The attack affected its navigation and fitness services, and although the attackers initially demanded a ransom of millions of dollars, Garmin was able to mitigate the impact through a rapid response and a robust backup strategy.<\/p><ul data-start=\"957\" data-end=\"1418\"><li data-start=\"957\" data-end=\"1418\"><p data-start=\"959\" data-end=\"1172\"><strong data-start=\"959\" data-end=\"980\">Actions taken:<\/strong><br data-start=\"980\" data-end=\"983\" \/>Garmin quickly restored their systems from securely stored backups, allowing them to minimize downtime and avoid total data loss.<\/p><ul data-start=\"1178\" data-end=\"1418\"><li data-start=\"1178\" data-end=\"1418\"><p data-start=\"1180\" data-end=\"1207\"><strong data-start=\"1180\" data-end=\"1205\">Lessons learned:<\/strong><\/p><ul data-start=\"1212\" data-end=\"1418\"><li data-start=\"1212\" data-end=\"1296\"><p data-start=\"1214\" data-end=\"1296\"><strong data-start=\"1214\" data-end=\"1229\">Prevention:<\/strong> Maintain a policy of regular and isolated backups.<\/p><\/li><li data-start=\"1301\" data-end=\"1413\"><p data-start=\"1303\" data-end=\"1413\"><strong data-start=\"1303\" data-end=\"1324\">Quick response:<\/strong> Have a team ready to respond immediately to cybersecurity incidents.<\/p><\/li><\/ul><\/li><\/ul><\/li><\/ul><h4 data-start=\"1494\" data-end=\"1569\"><strong data-start=\"1499\" data-end=\"1569\">Case Study 2: Honda and the loss of production due to ransomware<\/strong><\/h4><p data-start=\"1570\" data-end=\"1636\"><strong data-start=\"1570\" data-end=\"1636\">\"Honda fights back against a RaaS attack that crippled its production.\"<\/strong><\/p><p data-start=\"1638\" data-end=\"2014\">In 2020, Honda was also the victim of a ransomware attack. This attack affected its infrastructure, paralyzing several production plants and compromising the confidentiality of sensitive data. Although Honda suffered significant financial losses, its ability to restore critical systems from its most recent backups enabled it to reduce the consequences.<\/p><ul data-start=\"2016\" data-end=\"2454\"><li data-start=\"2016\" data-end=\"2454\"><p data-start=\"2018\" data-end=\"2179\"><strong data-start=\"2018\" data-end=\"2039\">Actions taken:<\/strong><br \/>Honda implemented security patches and strengthened its defenses against future attacks, in addition to improving its backup system.<\/p><ul data-start=\"2185\" data-end=\"2454\"><li data-start=\"2185\" data-end=\"2454\"><p data-start=\"2187\" data-end=\"2212\"><strong data-start=\"2187\" data-end=\"2212\">Lessons learned:<\/strong><\/p><ul data-start=\"2217\" data-end=\"2454\"><li data-start=\"2217\" data-end=\"2336\"><p data-start=\"2219\" data-end=\"2336\"><strong data-start=\"2219\" data-end=\"2243\">Proactive security:<\/strong> Keep all systems up to date and apply security patches immediately.<\/p><\/li><li data-start=\"2341\" data-end=\"2454\"><p data-start=\"2343\" data-end=\"2454\"><strong data-start=\"2343\" data-end=\"2382\">Strengthen internal communication:<\/strong> Interdepartmental coordination was key to responding to the attack.<\/p><\/li><\/ul><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab5efdd elementor-widget elementor-widget-text-editor\" data-id=\"ab5efdd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"5943\" data-end=\"6170\"><strong data-start=\"5943\" data-end=\"6027\">Are you ready to protect your business against Ransomware-as-a-Service attacks?<\/strong><br data-start=\"6027\" data-end=\"6030\" \/>With ClickPanda, you can get advanced solutions to strengthen your company's cybersecurity and prevent ransomware attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d11a73 elementor-widget elementor-widget-button\" data-id=\"3d11a73\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/clickpanda.com\/es-co\/certificados-ssl?utm_source=blog&#038;utm_medium=text&#038;utm_campaign=blog&#038;utm_term=blog&#038;utm_content=inline_link\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-circle-right\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8c137 0 248 111 248 248S393 504 256 504 8 393 8 256 119 8 256 8zm-28.9 143.6l75.5 72.4H120c-13.3 0-24 10.7-24 24v16c0 13.3 10.7 24 24 24h182.6l-75.5 72.4c-9.7 9.3-9.9 24.8-.4 34.3l11 10.9c9.4 9.4 24.6 9.4 33.9 0L404.3 273c9.4-9.4 9.4-24.6 0-33.9L271.6 106.3c-9.4-9.4-24.6-9.4-33.9 0l-11 10.9c-9.5 9.6-9.3 25.1.4 34.4z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Strengthen your security with ClickPanda today<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eaccab elementor-widget elementor-widget-text-editor\" data-id=\"1eaccab\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"6247\" data-end=\"6265\"><strong data-start=\"6251\" data-end=\"6265\">Conclusion<\/strong><\/h3><p data-start=\"6267\" data-end=\"6772\">The business model of <strong data-start=\"6291\" data-end=\"6325\">Ransomware-as-a-Service (RaaS)<\/strong> has transformed the ransomware threat, allowing even technically inexperienced cybercriminals to launch devastating attacks. With the right education, security tools and recovery policies, you can protect your business from these attacks and reduce the risks associated with them. Don't underestimate the impact of ransomware attacks, and be prepared to defend your infrastructure against this growing threat.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ebbe47 elementor-widget elementor-widget-image\" data-id=\"0ebbe47\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/clickpanda.com\/certificados-ssl?utm_source=blog&#038;utm_medium=banner&#038;utm_campaign=hosting_ssd&#038;utm_term=superior&#038;utm_content=banner2\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/wordpress-blogs.s3.us-east-2.amazonaws.com\/wp-content\/uploads\/2024\/07\/05221012\/CTA-BLOG-SSL-2.gif\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Introduction Ransomware is one of the most destructive threats in the world of cybersecurity. This type of attack has evolved, and today, the business model behind ransomware attacks is increasingly accessible to criminals through a model known as Ransomware-as-a-Service (RaaS). This model [...]<\/p>","protected":false},"author":2,"featured_media":11416,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[],"class_list":["post-11411","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware-as-a-Service: c\u00f3mo funciona y c\u00f3mo protegerte - ClickPanda Blog<\/title>\n<meta name=\"description\" content=\"Entiende el modelo de negocio criminal del Ransomware-as-a-Service (RaaS) y c\u00f3mo protegerte de estos ataques cada vez m\u00e1s comunes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.clickpanda.com\/en\/security\/ransomware-as-a-service-how-it-works-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware-as-a-Service: c\u00f3mo funciona y c\u00f3mo protegerte - ClickPanda Blog\" \/>\n<meta property=\"og:description\" content=\"Entiende el modelo de negocio criminal del Ransomware-as-a-Service (RaaS) y c\u00f3mo protegerte de estos ataques cada vez m\u00e1s comunes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.clickpanda.com\/en\/security\/ransomware-as-a-service-how-it-works-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"ClickPanda Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-21T02:14:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-21T02:15:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-20-ago-2025-21_11_26-1024x683.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Carolina Mateus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carolina Mateus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/\"},\"author\":{\"name\":\"Carolina Mateus\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/8cb66bfdb79789d5c6389547da69f37e\"},\"headline\":\"Ransomware-as-a-Service: c\u00f3mo funciona y c\u00f3mo protegerte\",\"datePublished\":\"2025-08-21T02:14:53+00:00\",\"dateModified\":\"2025-08-21T02:15:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/\"},\"wordCount\":1390,\"publisher\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-20-ago-2025-21_11_26.png\",\"articleSection\":[\"Seguridad\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/\",\"url\":\"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/\",\"name\":\"Ransomware-as-a-Service: c\u00f3mo funciona y c\u00f3mo protegerte - ClickPanda Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-20-ago-2025-21_11_26.png\",\"datePublished\":\"2025-08-21T02:14:53+00:00\",\"dateModified\":\"2025-08-21T02:15:56+00:00\",\"description\":\"Entiende el modelo de negocio criminal del Ransomware-as-a-Service (RaaS) y c\u00f3mo protegerte de estos ataques cada vez m\u00e1s comunes.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#primaryimage\",\"url\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-20-ago-2025-21_11_26.png\",\"contentUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-20-ago-2025-21_11_26.png\",\"width\":1536,\"height\":1024,\"caption\":\"Imagen que ilustra el impacto de Ransomware-as-a-Service (RaaS) en las empresas, mostrando un candado roto y cadenas digitales.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.clickpanda.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware-as-a-Service: c\u00f3mo funciona y c\u00f3mo protegerte\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#website\",\"url\":\"https:\/\/blog.clickpanda.com\/en\/\",\"name\":\"ClickPanda Blog\",\"description\":\"Noticias y novedades del mundo digital con ClickPanda\",\"publisher\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.clickpanda.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#organization\",\"name\":\"ClickPanda Blog\",\"url\":\"https:\/\/blog.clickpanda.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg\",\"contentUrl\":\"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg\",\"width\":1000,\"height\":541,\"caption\":\"ClickPanda Blog\"},\"image\":{\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/8cb66bfdb79789d5c6389547da69f37e\",\"name\":\"Carolina Mateus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9e2e0c914609c946433305574384a83699d137285a345888008d58e95aee450?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9e2e0c914609c946433305574384a83699d137285a345888008d58e95aee450?s=96&d=mm&r=g\",\"caption\":\"Carolina Mateus\"},\"url\":\"https:\/\/blog.clickpanda.com\/en\/author\/carolina-mateus\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware-as-a-Service: c\u00f3mo funciona y c\u00f3mo protegerte - ClickPanda Blog","description":"Entiende el modelo de negocio criminal del Ransomware-as-a-Service (RaaS) y c\u00f3mo protegerte de estos ataques cada vez m\u00e1s comunes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.clickpanda.com\/en\/security\/ransomware-as-a-service-how-it-works-and-how-to-protect-yourself\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware-as-a-Service: c\u00f3mo funciona y c\u00f3mo protegerte - ClickPanda Blog","og_description":"Entiende el modelo de negocio criminal del Ransomware-as-a-Service (RaaS) y c\u00f3mo protegerte de estos ataques cada vez m\u00e1s comunes.","og_url":"https:\/\/blog.clickpanda.com\/en\/security\/ransomware-as-a-service-how-it-works-and-how-to-protect-yourself\/","og_site_name":"ClickPanda Blog","article_published_time":"2025-08-21T02:14:53+00:00","article_modified_time":"2025-08-21T02:15:56+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-20-ago-2025-21_11_26-1024x683.png","type":"image\/png"}],"author":"Carolina Mateus","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Carolina Mateus","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#article","isPartOf":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/"},"author":{"name":"Carolina Mateus","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/8cb66bfdb79789d5c6389547da69f37e"},"headline":"Ransomware-as-a-Service: c\u00f3mo funciona y c\u00f3mo protegerte","datePublished":"2025-08-21T02:14:53+00:00","dateModified":"2025-08-21T02:15:56+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/"},"wordCount":1390,"publisher":{"@id":"https:\/\/blog.clickpanda.com\/en\/#organization"},"image":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-20-ago-2025-21_11_26.png","articleSection":["Seguridad"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/","url":"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/","name":"Ransomware-as-a-Service: c\u00f3mo funciona y c\u00f3mo protegerte - ClickPanda Blog","isPartOf":{"@id":"https:\/\/blog.clickpanda.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#primaryimage"},"image":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-20-ago-2025-21_11_26.png","datePublished":"2025-08-21T02:14:53+00:00","dateModified":"2025-08-21T02:15:56+00:00","description":"Entiende el modelo de negocio criminal del Ransomware-as-a-Service (RaaS) y c\u00f3mo protegerte de estos ataques cada vez m\u00e1s comunes.","breadcrumb":{"@id":"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#primaryimage","url":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-20-ago-2025-21_11_26.png","contentUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2025\/08\/ChatGPT-Image-20-ago-2025-21_11_26.png","width":1536,"height":1024,"caption":"Imagen que ilustra el impacto de Ransomware-as-a-Service (RaaS) en las empresas, mostrando un candado roto y cadenas digitales."},{"@type":"BreadcrumbList","@id":"https:\/\/blog.clickpanda.com\/seguridad\/ransomware-as-a-service-como-funciona-y-como-protegerte\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.clickpanda.com\/"},{"@type":"ListItem","position":2,"name":"Ransomware-as-a-Service: c\u00f3mo funciona y c\u00f3mo protegerte"}]},{"@type":"WebSite","@id":"https:\/\/blog.clickpanda.com\/en\/#website","url":"https:\/\/blog.clickpanda.com\/en\/","name":"ClickPanda Blog","description":"Noticias y novedades del mundo digital con ClickPanda","publisher":{"@id":"https:\/\/blog.clickpanda.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.clickpanda.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.clickpanda.com\/en\/#organization","name":"ClickPanda Blog","url":"https:\/\/blog.clickpanda.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg","contentUrl":"https:\/\/blog.clickpanda.com\/wp-content\/uploads\/2018\/10\/correo.jpg","width":1000,"height":541,"caption":"ClickPanda Blog"},"image":{"@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/8cb66bfdb79789d5c6389547da69f37e","name":"Carolina Mateus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.clickpanda.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9e2e0c914609c946433305574384a83699d137285a345888008d58e95aee450?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9e2e0c914609c946433305574384a83699d137285a345888008d58e95aee450?s=96&d=mm&r=g","caption":"Carolina Mateus"},"url":"https:\/\/blog.clickpanda.com\/en\/author\/carolina-mateus\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts\/11411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/comments?post=11411"}],"version-history":[{"count":13,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts\/11411\/revisions"}],"predecessor-version":[{"id":11425,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/posts\/11411\/revisions\/11425"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/media\/11416"}],"wp:attachment":[{"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/media?parent=11411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/categories?post=11411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.clickpanda.com\/en\/wp-json\/wp\/v2\/tags?post=11411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}