{"id":102527,"date":"2022-02-07T19:04:57","date_gmt":"2022-02-07T19:04:57","guid":{"rendered":"https:\/\/feedzai.com\/?p=102527"},"modified":"2024-04-09T09:17:47","modified_gmt":"2024-04-09T09:17:47","slug":"5-ways-banks-can-tackle-social-engineering-fraud","status":"publish","type":"post","link":"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/","title":{"rendered":"5 Ways Banks Can Tackle Social Engineering Fraud"},"content":{"rendered":"

[vc_row row_height_percent=”0″ override_padding=”yes” h_padding=”2″ top_padding=”1″ bottom_padding=”2″ overlay_alpha=”50″ gutter_size=”3″ column_width_percent=”100″ shift_y=”0″ z_index=”0″][vc_column width=”1\/1″][vc_row_inner][vc_column_inner width=”1\/12″][\/vc_column_inner][vc_column_inner width=”10\/12″][vc_single_image media=”102540″ media_width_percent=”100″ uncode_shortcode_id=”128042″][\/vc_column_inner][vc_column_inner width=”1\/12″][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner column_width_percent=”100″ gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_visibility=”yes” mobile_width=”0″ width=”2\/12″][\/vc_column_inner][vc_column_inner width=”8\/12″][vc_custom_heading heading_semantic=”h3″ text_size=”h3″ text_weight=”400″ uncode_shortcode_id=”808316″]Just as sharks are drawn to blood or bees are drawn to pollen, fraudsters are drawn to money-making opportunities. As <\/span>account takeover (ATO)<\/span><\/a> attacks become more difficult, fraudsters increasingly shift to social engineering fraud scams – and coerce legitimate customers into doing their dirty work in the process.\u00a0<\/span>[\/vc_custom_heading][vc_column_text uncode_shortcode_id=”831775″]<\/p>\n

What is Social Engineering Fraud?<\/span><\/h3>\n

Social engineering fraud is a broad term that refers to scams that exploit a victim\u2019s trust to trick them into providing confidential information that the fraudster uses to commit fraud or convince the victim to give them money under false pretenses. Fraudsters pull off social engineering frauds by studying their targets\u2019 patterns and social media profiles, such as their jobs, where they shop, or other personal details. They can also go door to door pretending to be a legitimate actor like a census taker and collect sensitive information. Another approach uses phishing messages that trick victims into revealing their personal details like bank accounts, credit card numbers, or passwords.<\/span><\/p>\n

Armed with these insights, fraudsters reach out to victims using a variety of tactics (including email, text message, or on social media) and tailor a convincing narrative that their victim is more inclined to believe. In other words, they will <\/span>engineer<\/span><\/i> a fraud based on a victim\u2019s <\/span>social<\/span><\/i> profile.<\/span><\/p>\n

How Does Social Engineering Fraud Work?<\/span><\/h3>\n

Fraudsters can use social engineering to commit a variety of fraud scams. For example, they could commit <\/span>authorized push payment (APP)<\/span><\/a> fraud by convincing their victim that they have an outstanding balance on a utility that they need to pay immediately. Once they receive the fake balance, they disappear with the victim\u2019s money. They can also use business email compromise (BEC) to convince a company employee to facilitate CEO or invoice fraud. Or they can also lure victims into <\/span>romance scams<\/span><\/a>.\u00a0<\/span><\/p>\n

Fraudsters often pull off convincing scams by studying their targets\u2019 lifestyles. And they\u2019re persistent. If a fraudster\u2019s initial attempt to trick a victim doesn\u2019t work, they\u2019ll tweak it over and over again until they find a strategy that pays off.<\/span><\/p>\n

What\u2019s Fueling Social Engineering Fraud?<\/span><\/h3>\n

There are two key factors driving fraudsters\u2019 move to social engineering. The first is access to money. The second is access to customers.<\/span><\/p>\n

On the first point, fraudsters know to follow the money. When the pandemic began unfolding, governments around the world issued <\/span>emergency loans<\/span><\/a> to help struggling businesses stay afloat. Many fraudsters focused their efforts on these government relief efforts. With these programs now leveling off, bad actors are shifting back to social engineering fraud.<\/span><\/p>\n

As for the second point, there\u2019s an old saying, if you can\u2019t beat them, join them. In the case of fraudsters, the thinking is more akin to, if you can\u2019t breach them, manipulate them. It\u2019s gotten much harder for fraudsters to commit ATO attacks using compromised credentials. Hence, fraudsters realize it\u2019s both easier and more lucrative to coerce consumers to facilitate transactions on their behalf. If they are successful, some banks may be reluctant to quantify it as a fraudulent event since the customer approved the transaction.<\/span><\/p>\n

Why Social Engineering Fraud is Hard to Measure<\/span><\/h3>\n

The trouble with social engineering fraud is that it\u2019s very difficult to measure. The digital banking landscape enables fraudsters to fail fast – and move on undeterred. This means fraudsters can easily scale their scams, launching 1,000 social engineering attempts before they even have breakfast. Even if 80% of attacks are prevented, it means they were successful 200 times, making a profit with minimal effort. And there\u2019s plenty of time to launch more attacks.<\/span><\/p>\n

Meanwhile, most failed social engineering attempts go unreported. Fraudsters might reach customers via email or text message, and a large share will dismiss their communications and forget them. There\u2019s little incentive for a customer to report the encounter since nothing came of it. However, each failed social engineering effort that goes unreported means banks miss an opportunity to gauge the broader problem accurately.<\/span><\/p>\n

Successful social engineering fraud can also be difficult to measure. Many customers feel embarrassed for believing a fraudster\u2019s trick and losing money. As such, they are unwilling to admit they were deceived – let alone report the incident to their bank or to law enforcement. Some victims will be skeptical if they will get a refund or if reporting the incident will hurt their standing with their bank.<\/span><\/p>\n

5 Things Banks Can Do About Social Engineering Fraud<\/span><\/h3>\n

As fraudsters develop social engineering tactics, banks must help their customers before, during, and after they are impacted by social engineering fraud. Here\u2019s a few things banks can do.<\/span><\/p>\n

1. Banks Should Work Together to Stop Social Engineering Fraud<\/span><\/h4>\n

The effectiveness of social engineering and its related crimes (APP fraud, invoice fraud, romance scams, etc.) require banks to pool their collective intelligence and agree on best practices for the industry, including who pays for these losses. Banks and financial institutions (FIs) should update their refund policies to offer customers some layer of protection if they fall victim to a social engineering scam. Listening to other banks and sharing experiences can help FIs determine the most appropriate ways to assist customers who fall prey to scams.<\/span><\/p>\n

2. Update Customer Messaging Regarding Fraud<\/span><\/h4>\n

As fraudsters update their tactics, so too must banks update their customer-facing communications. If a bank\u2019s messaging on fraud remains static, customers will treat it like wallpaper and just ignore it. Study the social engineering problem carefully and craft new messaging to keep your customers vigilant and prepared. Refresh the messaging regularly so that your customers aren\u2019t tempted to overlook it.<\/span><\/p>\n

3. Prioritize Prevention<\/span><\/h4>\n

The social engineering fraud threat requires banks to think hard about how they communicate with customers both before and after an event. Before an attack, prevention should be the priority. By understanding their customers\u2019 typical patterns, banks can intervene if they suspect their customers are at risk of getting defrauded. This could be as simple as sending a text message or a pop-up banner asking if they are certain they wish to proceed with a transaction. Revamped messaging should also encourage customers to report suspected fraud attempts – even if they don\u2019t fall for them.<\/span><\/p>\n

4. Think Like a Fraudster<\/span><\/h4>\n

Fraudsters think like banks by anticipating the safety measures that make ATO attacks more difficult. Banks should think like fraudsters in response. That\u2019s why it\u2019s so important to be able to speak with customers who have been defrauded and empower them to open up about their experiences. This knowledge and insight allow banks to understand how scams were engineered and enables organizations to develop new protocols to protect customers from new attacks.<\/span><\/p>\n

5. Treat Defrauded Customers Gently<\/span><\/h4>\n

After a social engineering fraud event occurs, a different conversation – and tone is required. Bank customers will likely feel angry, vulnerable, and embarrassed if they lose money to a social engineering scam. Their trust is damaged. Bank staff should be trained to speak with customers with empathy and respect, help them understand they are not alone, and gently ask them about how the fraudster approached them.<\/span><\/p>\n

Banks need a better picture of the scope of the social engineering problem. Listening to customers who have been victimized and understanding how fraudsters pulled off their deception is a critical step to stopping more fraud and allowing customers to rebuild trust.\u00a0<\/span><\/p>\n

How do banks know how to choose the right fraud prevention solution? Download our eBook <\/span><\/i>6 Crucial Capabilities to Protect the Online Banking Journey<\/span><\/i><\/a> to learn how to protect online onboarding processes from bad actors.<\/span><\/i>[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=”100″ gutter_size=”3″ overlay_alpha=”50″ shift_x=”0″ shift_y=”0″ shift_y_down=”0″ z_index=”0″ medium_width=”0″ mobile_visibility=”yes” mobile_width=”0″ width=”2\/12″][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"

Just as sharks are drawn to blood or bees are drawn to pollen, fraudsters are drawn to money-making opportunities. As account takeover (ATO) attacks become more difficult, fraudsters increasingly shift to social engineering fraud scams – and coerce legitimate customers into doing their dirty work in the process.<\/p>\n","protected":false},"author":8,"featured_media":102543,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[76],"tags":[151,77,393,394],"acf":[],"yoast_head":"\n5 Ways Banks Can Tackle Social Engineering Fraud | Feedzai<\/title>\n<meta name=\"description\" content=\"As ATO attacks become more difficult, fraudsters are using social engineering fraud to coerce legitimate customers into their scams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Ways Banks Can Tackle Social Engineering Fraud | Feedzai\" \/>\n<meta property=\"og:description\" content=\"As ATO attacks become more difficult, fraudsters are using social engineering fraud to coerce legitimate customers into their scams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/\" \/>\n<meta property=\"og:site_name\" content=\"Feedzai\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-07T19:04:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-09T09:17:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_social-engineering_linkedin.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2501\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andy Renshaw\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_social-engineering_Twitter.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Renshaw\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/\"},\"author\":{\"name\":\"Andy Renshaw\",\"@id\":\"https:\/\/feedzai.com\/#\/schema\/person\/fc762a4cbc20c77c8fd40957a667fac7\"},\"headline\":\"5 Ways Banks Can Tackle Social Engineering Fraud\",\"datePublished\":\"2022-02-07T19:04:57+00:00\",\"dateModified\":\"2024-04-09T09:17:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/\"},\"wordCount\":1432,\"publisher\":{\"@id\":\"https:\/\/feedzai.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_social-engineering_Thumb-768x432-1.png\",\"keywords\":[\"Fraud\",\"popular\",\"social engineering\",\"social engineering fraud\"],\"articleSection\":[\"Fraud\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/\",\"url\":\"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/\",\"name\":\"5 Ways Banks Can Tackle Social Engineering Fraud | Feedzai\",\"isPartOf\":{\"@id\":\"https:\/\/feedzai.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_social-engineering_Thumb-768x432-1.png\",\"datePublished\":\"2022-02-07T19:04:57+00:00\",\"dateModified\":\"2024-04-09T09:17:47+00:00\",\"description\":\"As ATO attacks become more difficult, fraudsters are using social engineering fraud to coerce legitimate customers into their scams.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/#primaryimage\",\"url\":\"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_social-engineering_Thumb-768x432-1.png\",\"contentUrl\":\"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_social-engineering_Thumb-768x432-1.png\",\"width\":768,\"height\":432},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/feedzai.com\/#website\",\"url\":\"https:\/\/feedzai.com\/\",\"name\":\"Feedzai\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/feedzai.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/feedzai.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/feedzai.com\/#organization\",\"name\":\"Feedzai\",\"url\":\"https:\/\/feedzai.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/feedzai.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/feedzai.com\/aptopees\/2020\/08\/feedzai_color.svg\",\"contentUrl\":\"https:\/\/feedzai.com\/aptopees\/2020\/08\/feedzai_color.svg\",\"width\":129,\"height\":41,\"caption\":\"Feedzai\"},\"image\":{\"@id\":\"https:\/\/feedzai.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/feedzai.com\/#\/schema\/person\/fc762a4cbc20c77c8fd40957a667fac7\",\"name\":\"Andy Renshaw\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/feedzai.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/feedzai.com\/aptopees\/2020\/09\/Andy-Renshaw-Feedzai.jpg\",\"contentUrl\":\"https:\/\/feedzai.com\/aptopees\/2020\/09\/Andy-Renshaw-Feedzai.jpg\",\"caption\":\"Andy Renshaw\"},\"url\":\"https:\/\/feedzai.com\/author\/andy-renshaw\/\"}]}<\/script>\n","yoast_head_json":{"title":"5 Ways Banks Can Tackle Social Engineering Fraud | Feedzai","description":"As ATO attacks become more difficult, fraudsters are using social engineering fraud to coerce legitimate customers into their scams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/","og_locale":"en_US","og_type":"article","og_title":"5 Ways Banks Can Tackle Social Engineering Fraud | Feedzai","og_description":"As ATO attacks become more difficult, fraudsters are using social engineering fraud to coerce legitimate customers into their scams.","og_url":"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/","og_site_name":"Feedzai","article_published_time":"2022-02-07T19:04:57+00:00","article_modified_time":"2024-04-09T09:17:47+00:00","og_image":[{"width":2501,"height":1309,"url":"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_social-engineering_linkedin.png","type":"image\/png"}],"author":"Andy Renshaw","twitter_card":"summary_large_image","twitter_image":"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_social-engineering_Twitter.png","twitter_misc":{"Written by":"Andy Renshaw","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/#article","isPartOf":{"@id":"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/"},"author":{"name":"Andy Renshaw","@id":"https:\/\/feedzai.com\/#\/schema\/person\/fc762a4cbc20c77c8fd40957a667fac7"},"headline":"5 Ways Banks Can Tackle Social Engineering Fraud","datePublished":"2022-02-07T19:04:57+00:00","dateModified":"2024-04-09T09:17:47+00:00","mainEntityOfPage":{"@id":"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/"},"wordCount":1432,"publisher":{"@id":"https:\/\/feedzai.com\/#organization"},"image":{"@id":"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_social-engineering_Thumb-768x432-1.png","keywords":["Fraud","popular","social engineering","social engineering fraud"],"articleSection":["Fraud"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/","url":"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/","name":"5 Ways Banks Can Tackle Social Engineering Fraud | Feedzai","isPartOf":{"@id":"https:\/\/feedzai.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/#primaryimage"},"image":{"@id":"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_social-engineering_Thumb-768x432-1.png","datePublished":"2022-02-07T19:04:57+00:00","dateModified":"2024-04-09T09:17:47+00:00","description":"As ATO attacks become more difficult, fraudsters are using social engineering fraud to coerce legitimate customers into their scams.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/feedzai.com\/blog\/5-ways-banks-can-tackle-social-engineering-fraud\/#primaryimage","url":"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_social-engineering_Thumb-768x432-1.png","contentUrl":"https:\/\/feedzai.com\/aptopees\/2022\/02\/Feedzai_social-engineering_Thumb-768x432-1.png","width":768,"height":432},{"@type":"WebSite","@id":"https:\/\/feedzai.com\/#website","url":"https:\/\/feedzai.com\/","name":"Feedzai","description":"","publisher":{"@id":"https:\/\/feedzai.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/feedzai.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/feedzai.com\/#organization","name":"Feedzai","url":"https:\/\/feedzai.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/feedzai.com\/#\/schema\/logo\/image\/","url":"https:\/\/feedzai.com\/aptopees\/2020\/08\/feedzai_color.svg","contentUrl":"https:\/\/feedzai.com\/aptopees\/2020\/08\/feedzai_color.svg","width":129,"height":41,"caption":"Feedzai"},"image":{"@id":"https:\/\/feedzai.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/feedzai.com\/#\/schema\/person\/fc762a4cbc20c77c8fd40957a667fac7","name":"Andy Renshaw","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/feedzai.com\/#\/schema\/person\/image\/","url":"https:\/\/feedzai.com\/aptopees\/2020\/09\/Andy-Renshaw-Feedzai.jpg","contentUrl":"https:\/\/feedzai.com\/aptopees\/2020\/09\/Andy-Renshaw-Feedzai.jpg","caption":"Andy Renshaw"},"url":"https:\/\/feedzai.com\/author\/andy-renshaw\/"}]}},"_links":{"self":[{"href":"https:\/\/feedzai.com\/wp-json\/wp\/v2\/posts\/102527"}],"collection":[{"href":"https:\/\/feedzai.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/feedzai.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/feedzai.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/feedzai.com\/wp-json\/wp\/v2\/comments?post=102527"}],"version-history":[{"count":1,"href":"https:\/\/feedzai.com\/wp-json\/wp\/v2\/posts\/102527\/revisions"}],"predecessor-version":[{"id":102552,"href":"https:\/\/feedzai.com\/wp-json\/wp\/v2\/posts\/102527\/revisions\/102552"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/feedzai.com\/wp-json\/wp\/v2\/media\/102543"}],"wp:attachment":[{"href":"https:\/\/feedzai.com\/wp-json\/wp\/v2\/media?parent=102527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/feedzai.com\/wp-json\/wp\/v2\/categories?post=102527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/feedzai.com\/wp-json\/wp\/v2\/tags?post=102527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}