{"id":47203,"date":"2026-04-25T03:41:16","date_gmt":"2026-04-24T19:41:16","guid":{"rendered":"https:\/\/sgbuzz.com\/?p=47203"},"modified":"2026-04-25T03:41:16","modified_gmt":"2026-04-24T19:41:16","slug":"ai-scams-are-getting-smarter-what-businesses-need-to-do","status":"publish","type":"post","link":"https:\/\/sgbuzz.com\/?p=47203","title":{"rendered":"AI scams are getting smarter: what businesses need to do"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div xmlns:default=\"http:\/\/www.w3.org\/2000\/svg\">\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">Singapore\u2019s scam landscape looked better on paper in 2025 than it had in years. <u>Total scam and cybercrime cases<\/u> fell by 24.8% to 41,974 in 2025, and funds lost dropped from <b>S$1.1 billion in 2024 to S$913.1 million<\/b>. But beneath that headline figure, a more concerning trend was visible, where the median loss per case rose from <b>S$1,389 in 2024<\/b> to <b>S$1,644 in 2025<\/b>.\u00a0<\/p>\n<section class=\"_expanded_lwxdk_22\"><button class=\"_title_lwxdk_1\"><\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">Table of contents<\/p>\n<p><default:svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"18\" height=\"9\" fill=\"none\" stroke=\"currentColor\"><default:path d=\"M1 1L9 8L17 1\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/default:svg><\/button><\/p>\n<ol class=\"_list_lwxdk_28\">\n<li class=\"_listItem_lwxdk_71\">1. <!-- -->Phishing remains a key entry point, but AI enhances its effectiveness.<\/li>\n<li class=\"_listItem_lwxdk_71\">2. <!-- -->AI-powered scam campaigns are scaling and becoming harder to contain.<\/li>\n<li class=\"_listItem_lwxdk_71\">3. <!-- -->PromptLock: A proof of concept with real consequences<\/li>\n<li class=\"_listItem_lwxdk_71\">4. <!-- -->ESET\u2019s upcoming AI defence\u00a0<\/li>\n<li class=\"_listItem_lwxdk_71\">5. <!-- -->The human element: AI tools are not a replacement<\/li>\n<li class=\"_listItem_lwxdk_71\">6. <!-- -->Practical Steps for Singapore Businesses<\/li>\n<\/ol>\n<\/section>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">For Pamela Ong, Country Manager of Singapore and Asia at ESET, that divergence between volume and severity was not a contradiction. It was a signal.<\/p>\n<div class=\"_embedContainer_wioo3_16\" style=\"max-width:350px\">\n<div class=\"_container_1stzb_1\"><picture><source srcset=\"https:\/\/i.ytimg.com\/vi_webp\/gepAkfYLtYI\/sddefault.webp\" type=\"image\/webp\"\/><source srcset=\"https:\/\/i.ytimg.com\/vi\/gepAkfYLtYI\/hqdefault.jpg\" type=\"image\/jpeg\"\/><img decoding=\"async\" class=\"_facade_1stzb_5\" src=\"https:\/\/i.ytimg.com\/vi\/gepAkfYLtYI\/hqdefault.jpg\" style=\"aspect-ratio:0.5625\" alt=\"\" loading=\"lazy\"\/><\/picture><button class=\"_playButton_1stzb_12\" type=\"button\"><span class=\"_playButtonText_1stzb_39\">Play<\/span><\/button><\/div>\n<\/div>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">\u201cWhat we\u2019re seeing is not necessarily a reduction in attacker activity, but a change in approach,\u201d Ong said in an email interview with HardwareZone on the sidelines of Gitex AI Asia 2026. \u201cInstead of relying purely on volume, attackers are focusing more on precision. They are using better reconnaissance, more convincing impersonation, and increasingly AI-generated content to target victims more likely to yield higher returns.\u201d<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">Her comments came as ESET showcased its upcoming AI protection capabilities at Gitex AI Asia 2026, held in April in Singapore. The new features, first demonstrated at RSAC 2026 and set to launch later this year, were designed to address a threat landscape that Ong described as evolving faster than most organisations were prepared for.\u00a0<\/p>\n<h2 id=\"phishing-remains-a-key-entry-point-but-ai-enhances-its-effectiveness-\" class=\"_subHeading1_1k87u_111 _base_1k87u_1\">Phishing remains a key entry point, but AI enhances its effectiveness.<\/h2>\n<figure class=\"_figure_wioo3_1\"><img decoding=\"async\" class=\"_base_12j3k_1\" alt=\"Pamela Ong, Country Manager of Singapore and Asia at ESET\" loading=\"lazy\" sizes=\"auto\" width=\"2000\" height=\"1125\" srcset=\"https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/0f1687c440e6bd9481fbc5d6d348589133c5d83f4491a72caad1c577f2a314c6?w=500&amp;q=85 500w,https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/0f1687c440e6bd9481fbc5d6d348589133c5d83f4491a72caad1c577f2a314c6?w=800&amp;q=85 800w,https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/0f1687c440e6bd9481fbc5d6d348589133c5d83f4491a72caad1c577f2a314c6?w=1000&amp;q=85 1000w,https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/0f1687c440e6bd9481fbc5d6d348589133c5d83f4491a72caad1c577f2a314c6?w=2000&amp;q=85 2000w\" src=\"https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/0f1687c440e6bd9481fbc5d6d348589133c5d83f4491a72caad1c577f2a314c6?w=1000&amp;q=85\" style=\"--custom-aspect-ratio:1.7777777777777777;contain-intrinsic-size:2000px 1125px\"\/><figcaption class=\"_figureCaptions_wioo3_158\">\n<p class=\"_imageCaption_wioo3_165\">Pamela Ong, Country Manager of Singapore and Asia at ESET<\/p>\n<p>Photo: HWZ<\/p>\n<\/figcaption><\/figure>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">Ong was careful to point out that the fundamentals of the threat landscape had not changed as dramatically as some of the technology headlines might suggest. \u201cMost successful breaches still begin with socially engineered emails and malicious links,\u201d she said. ESET\u2019s own data showed that phishing remained the leading cause of corporate breaches in Singapore, accounting for close to a third of detected threats. \u201cThis tells us attackers are still relying on familiar entry points but are executing them more effectively.\u201d<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">What had changed substantially was the quality of those attacks, and AI was the reason. In the first five months of 2025,<b> a third of phishing emails were found to contain high volumes of text<\/b>, indicative of large language model generation. Ong said the implication for how people assess whether a message was legitimate was significant and largely uncomfortable.<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">\u201cLarge language models have made it much easier for attackers to produce well-written, coherent, and contextually relevant messages at scale. As a result, many phishing emails today look professional and credible, which removes one of the most obvious warning signs that people previously depended on.\u201d<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">The practical advice she offered was a shift from visual assessment to behavioural interrogation. \u201cInstead of focusing on how a message looks, it\u2019s more important to focus on what it is asking you to do. Is it creating urgency? Is it asking you to click a link, download an attachment, or share sensitive information? Does the request match the sender\u2019s usual behaviour?\u201d Verification, she said, was now the more reliable defence, not grammar or formatting.<\/p>\n<h2 id=\"ai-powered-scam-campaigns-are-scaling-and-becoming-harder-to-contain-\" class=\"_subHeading1_1k87u_111 _base_1k87u_1\">AI-powered scam campaigns are scaling and becoming harder to contain.<\/h2>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\"><u>ESET\u2019s H2 2025 Threat Report<\/u> had flagged a range of AI-assisted threats, including the Nomani scam network, which used AI-generated videos to spread fraudulent content across multiple platforms simultaneously. Ong described the scale of automation behind these campaigns as one of the more striking findings in recent threat intelligence.<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">\u201cWhat is notable about campaigns like Nomani is not just the use of AI-generated content, but how it allows attackers to scale distribution across multiple platforms quickly, making scams harder to contain and more persistent,\u201d she said. ESET observed over 159,000 detections tied to a single phishing domain, usrpubtrk[.]com, which Ong said signalled that attackers were relying on highly automated infrastructure to deploy and rotate campaigns at speed.<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">On whether defenders were keeping pace, her assessment was measured rather than reassuring. \u201cAttackers are able to iterate very quickly. The organisations that are keeping up are those who added some form of AI on the defensive side as well, for example, through behavioural detection and threat intelligence. Those relying only on traditional indicators or manual processes will find it increasingly difficult to keep up.<\/p>\n<h2 id=\"promptlock-a-proof-of-concept-with-real-consequences\" class=\"_subHeading1_1k87u_111 _base_1k87u_1\">PromptLock: A proof of concept with real consequences<\/h2>\n<figure class=\"_figure_wioo3_1\"><img decoding=\"async\" class=\"_base_12j3k_1\" alt=\"Some of the crowd at ESET\u2019s booth at Gitex Asia 2026\" loading=\"lazy\" sizes=\"auto\" width=\"2000\" height=\"1125\" srcset=\"https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/a91193cc09a78f71818f0a5092f7c13d05d580d5a14def2867952c953edddf4a?w=500&amp;q=85 500w,https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/a91193cc09a78f71818f0a5092f7c13d05d580d5a14def2867952c953edddf4a?w=800&amp;q=85 800w,https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/a91193cc09a78f71818f0a5092f7c13d05d580d5a14def2867952c953edddf4a?w=1000&amp;q=85 1000w,https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/a91193cc09a78f71818f0a5092f7c13d05d580d5a14def2867952c953edddf4a?w=2000&amp;q=85 2000w\" src=\"https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/a91193cc09a78f71818f0a5092f7c13d05d580d5a14def2867952c953edddf4a?w=1000&amp;q=85\" style=\"--custom-aspect-ratio:1.7777777777777777;contain-intrinsic-size:2000px 1125px\"\/><figcaption class=\"_figureCaptions_wioo3_158\">\n<p class=\"_imageCaption_wioo3_165\">Some of the crowd at ESET\u2019s booth at Gitex Asia 2026<\/p>\n<p>Phto: ESET<\/p>\n<\/figcaption><\/figure>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">One of the more significant findings from ESET\u2019s H2 2025 Threat Report was the identification of PromptLock, described as the first known ransomware strain to leverage AI in its attack process, capable of encrypting, exfiltrating or destroying data. Ong carefully placed the discovery in context.<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">\u201cPromptLock highlights where this is heading: towards greater automation across different stages of an attack, from identifying targets, to evading detection, and potentially adapting in real time,\u201d she said. \u201cThis could make attacks faster and give defenders less time to respond.\u201d<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">She was equally careful not to overstate the immediate threat. <\/p>\n<div class=\"_nested_1lq60_1\">\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">\u201cMost successful attacks today still rely on more established methods like phishing and credential theft. These remain the primary ways attackers get into organisations.\u201d<\/p>\n<\/div>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">But on the trajectory the discovery represented, she was unambiguous. \u201cWhile ESET considers PromptLock a proof of concept, the threat it represents is very real. It is a clear sign that attacks are becoming more automated and more adaptive, and organisations need to be prepared for that shift.<\/p>\n<h2 id=\"eset-s-upcoming-ai-defence\" class=\"_subHeading1_1k87u_111 _base_1k87u_1\">ESET\u2019s upcoming AI defence\u00a0<\/h2>\n<figure class=\"_figure_wioo3_1\"><img decoding=\"async\" class=\"_base_12j3k_1\" alt=\"A demo of ESET\u2019s upcoming security platform for AI agents\" loading=\"lazy\" sizes=\"auto\" width=\"2000\" height=\"1125\" srcset=\"https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/27c5b8478e1710bc6d1151e7c93c07ac2a599eb94e072ae9b1f376a2c6e8c780?w=500&amp;q=85 500w,https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/27c5b8478e1710bc6d1151e7c93c07ac2a599eb94e072ae9b1f376a2c6e8c780?w=800&amp;q=85 800w,https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/27c5b8478e1710bc6d1151e7c93c07ac2a599eb94e072ae9b1f376a2c6e8c780?w=1000&amp;q=85 1000w,https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/27c5b8478e1710bc6d1151e7c93c07ac2a599eb94e072ae9b1f376a2c6e8c780?w=2000&amp;q=85 2000w\" src=\"https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/27c5b8478e1710bc6d1151e7c93c07ac2a599eb94e072ae9b1f376a2c6e8c780?w=1000&amp;q=85\" style=\"--custom-aspect-ratio:1.7777777777777777;contain-intrinsic-size:2000px 1125px\"\/><figcaption class=\"_figureCaptions_wioo3_158\">\n<p class=\"_imageCaption_wioo3_165\">A demo of ESET\u2019s upcoming security platform for AI agents<\/p>\n<p>Photo: ESET<\/p>\n<\/figcaption><\/figure>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">Against that backdrop, the features ESET showcased at GITEX AI ASIA 2026 were designed to address risks that had emerged specifically from the rapid integration of AI tools into everyday business workflows. The new capabilities, set to expand the ESET PROTECT Platform, was centred on three areas.<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">The first was a secure browser technology that intercepted AI interactions and analysed both prompts and responses in real time. As AI tools became embedded in everyday workflows, many employees were using open cloud chatbots without IT oversight, creating what ESET described as \u201cshadow AI\u201d risks, and inadvertently exposing sensitive data, including internal documents, API keys and credentials. The new feature would flag malicious URLs submitted through:\u00a0<\/p>\n<ul class=\"_listElement_wioo3_107\">\n<li class=\"_listItem_wioo3_112\">chatbot prompts,\u00a0<\/li>\n<li class=\"_listItem_wioo3_112\">detect prompt injection attempts\u00a0<\/li>\n<li class=\"_listItem_wioo3_112\">block or monitor the upload of sensitive data in accordance with an organisation\u2019s policies.<\/li>\n<\/ul>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">The second area was endpoint security capabilities designed to detect AI supply chain attacks. Ong explained in plain language what these attacks involved. \u201cAn AI supply chain attack happens when attackers compromise the building blocks behind an AI system, such as third-party models, plug-ins, or agent frameworks, rather than targeting the organisation directly. If one of these components is tampered with, that risk is effectively passed on to every organisation using it.\u201d<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">ESET had already identified cases involving trojanised components in widely used AI libraries, specifically naming LiteLLM as an example, as well as autonomous agents like OpenClaw that could execute actions on a system with limited oversight. \u201cThis is becoming more relevant as organisations adopt AI tools quickly and often integrate external components into their workflows,\u201d Ong said. <\/p>\n<div class=\"_nested_1lq60_1\">\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">\u201cIn many cases, these tools are introduced faster than they can be fully assessed, which creates gaps in visibility and control.\u201d<\/p>\n<\/div>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">For Singapore businesses in particular, where AI adoption was accelerating across productivity, customer engagement and automation, she framed the message directly: \u201cAI needs to be treated as part of their broader supply chain risk.\u201d<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">The third element was the ESET AI Skills Checker, already available as a free public tool open to non-ESET customers. Built on the same technology as ESET\u2019s endpoint security products and ESET LiveGuard, the checker analysed AI skills and agents for hidden instructions, malicious code and risky behaviour using multilayered inspection and cloud-based sandboxing. It was currently also available as a built-in feature for existing ESET Endpoint users.<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">Ong was asked whether there was a risk that organisations over-relied on AI security tools at the expense of human expertise and security culture. She said it was a concern she was already seeing manifest in the market.<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">\u201cWhile AI is extremely valuable in helping security teams manage scale, reduce noise, and detect threats earlier, it is a complement to human expertise, not a replacement for it,\u201d she said, adding: <\/p>\n<div class=\"_nested_1lq60_1\">\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">\u201c\u201cMany successful attacks still come down to very fundamental issues, such as phishing, compromised credentials, or gaps in processes, rather than failures in advanced tools.\u201d\u201d<\/p>\n<\/div>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">The approach she recommended was explicit about the balance required. \u201cThis involves investing in people and processes, including training, awareness, and incident response, while at the same time incorporating AI tools to strengthen detection and reduce response times. Organisations that rely too heavily on either side risk creating gaps in their overall security posture.\u201d<\/p>\n<h2 id=\"practical-steps-for-singapore-businesses\" class=\"_subHeading1_1k87u_111 _base_1k87u_1\">Practical Steps for Singapore Businesses<\/h2>\n<figure class=\"_figure_wioo3_1\"><img decoding=\"async\" class=\"_base_12j3k_1\" alt=\"Gitex Asia saw companies showcasing AR solution, robotics and a lot of AI\" loading=\"lazy\" sizes=\"auto\" width=\"2000\" height=\"1125\" srcset=\"https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/9e78367bd9de1737f41603380dee58ff3c306b6023a336b9aaa118f0083c1dad?w=500&amp;q=85 500w,https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/9e78367bd9de1737f41603380dee58ff3c306b6023a336b9aaa118f0083c1dad?w=800&amp;q=85 800w,https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/9e78367bd9de1737f41603380dee58ff3c306b6023a336b9aaa118f0083c1dad?w=1000&amp;q=85 1000w,https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/9e78367bd9de1737f41603380dee58ff3c306b6023a336b9aaa118f0083c1dad?w=2000&amp;q=85 2000w\" src=\"https:\/\/cassette.sphdigital.com.sg\/image\/hardwarezone\/9e78367bd9de1737f41603380dee58ff3c306b6023a336b9aaa118f0083c1dad?w=1000&amp;q=85\" style=\"--custom-aspect-ratio:1.7777777777777777;contain-intrinsic-size:2000px 1125px\"\/><figcaption class=\"_figureCaptions_wioo3_158\">\n<p class=\"_imageCaption_wioo3_165\">Gitex Asia saw companies showcasing AR solution, robotics and a lot of AI <\/p>\n<p>Photo: HWZ<\/p>\n<\/figcaption><\/figure>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">For businesses in Singapore looking to act on the risks Ong described, she outlined a clear sequence. The starting point was visibility: gaining a clear picture of how AI tools were being used across the business, including those introduced without IT oversight. \u201cFrom there, it\u2019s important to apply controls around how data is shared through these tools, particularly in prompts, responses, and links, and thereafter monitor for unusual or high-risk behaviour across AI-driven workflows.\u201d<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">The underlying goal, she said, was straightforward even if the execution required effort. \u201cAs AI becomes more embedded in everyday operations, organisations need to maintain visibility and control over how it is being used, rather than introducing new risks unintentionally.\u201d<\/p>\n<p class=\"_base_1s8rd_1 _default_1s8rd_12\">ESET\u2019s new AI security features are set to launch later in 2026. More information on ESET\u2019s <u>enterprise solutions are available here<\/u>.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.hardwarezone.com.sg\/lifestyle\/ai\/interview-eset-ai-security-chatbot-workflows\" target=\"_blank\" rel=\"noopener\">Read Full Article At Source <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Singapore\u2019s scam landscape looked better on paper in 2025 than it had in years. Total scam and cybercrime cases fell by 24.8% to 41,974 in&#8230;<\/p>\n","protected":false},"author":1,"featured_media":47204,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","footnotes":""},"categories":[32],"tags":[6385,4880,2679],"class_list":["post-47203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-gadgets-reviews","tag-businesses","tag-scams","tag-smarter","wpcat-32-id"],"_links":{"self":[{"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/posts\/47203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=47203"}],"version-history":[{"count":0,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/posts\/47203\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=\/wp\/v2\/media\/47204"}],"wp:attachment":[{"href":"https:\/\/sgbuzz.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=47203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=47203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sgbuzz.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=47203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}