{"id":14111,"date":"2025-04-03T05:15:28","date_gmt":"2025-04-03T05:15:28","guid":{"rendered":"https:\/\/www.cryptometer.io\/news\/?p=14111"},"modified":"2025-04-03T05:15:31","modified_gmt":"2025-04-03T05:15:31","slug":"hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware","status":"publish","type":"post","link":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/","title":{"rendered":"Hackers Sell Fake Android Phones Loaded with Crypto-Stealing Malware"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"h-counterfeit-phones-pose-new-threat-to-cryptocurrency-holders\">Counterfeit Phones Pose New Threat to Cryptocurrency Holders<\/h3>\n\n\n\n<p>Cybersecurity researchers have issued a stark warning: hackers are flooding the market with fake Android smartphones pre-installed with malware engineered to steal cryptocurrency and personal data. These fraudulent devices, typically sold online at low prices, are embedded with the Triada Trojan\u2014a powerful piece of malware that allows attackers full control over infected phones.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-triada-trojan-how-it-works\">Triada Trojan: How It Works<\/h3>\n\n\n\n<p>According to Kaspersky Labs, the Triada Trojan infiltrates the phone\u2019s system at a fundamental level. Once activated, it:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Compromises every running app and service on the phone<\/li>\n\n\n\n<li>Deletes and intercepts messages without user knowledge<\/li>\n\n\n\n<li>Takes over messaging apps to extract sensitive data<\/li>\n\n\n\n<li>Monitors browsing activity for potential exploits<\/li>\n\n\n\n<li>Swaps out cryptocurrency wallet addresses with those of the attackers, diverting funds during transactions<\/li>\n<\/ul>\n\n\n\n<p>So far, cybercriminals have stolen approximately $270,000 worth of cryptocurrency through these tactics. However, experts warn the true figure could be higher due to anonymous currencies like Monero, which are difficult to trace.<\/p>\n\n\n\n<p>The malware isn\u2019t introduced after purchase\u2014it\u2019s baked into the phone during manufacturing. This points to a deeper supply chain breach, meaning even well-known online retailers could unknowingly be selling compromised devices. Kaspersky confirmed over 2,600 infections globally, with the highest number reported in Russia.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-crocodilus-a-new-android-threat-on-the-rise\">Crocodilus: A New Android Threat on the Rise<\/h3>\n\n\n\n<p>In a separate yet equally concerning development, a new Android banking trojan called Crocodilus is targeting users in Spain and Turkey. Masquerading as legitimate apps, this malware abuses Android\u2019s accessibility features to seize control of the device.<\/p>\n\n\n\n<p>Crocodilus can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Display fake login screens over real banking or crypto wallet apps<\/li>\n\n\n\n<li>Trick users into entering passwords, seed phrases, or personal details<\/li>\n\n\n\n<li>Gain access to and empty cryptocurrency wallets once this data is obtained<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-to-stay-safe-from-mobile-malware\">How to Stay Safe from Mobile Malware<\/h3>\n\n\n\n<p>To avoid falling victim to these growing threats, users should take the following precautions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Buy smartphones only from verified, reputable retailers<\/li>\n\n\n\n<li>Install a trusted mobile security app as soon as the device is activated<\/li>\n\n\n\n<li>Be skeptical of unsolicited prompts or permission requests<\/li>\n\n\n\n<li>Keep the device\u2019s operating system and apps updated regularly<\/li>\n\n\n\n<li>Avoid granting apps unnecessary permissions, especially those related to accessibility services<\/li>\n<\/ul>\n\n\n\n<p>These evolving attacks highlight just how important it is to remain cautious, especially when managing sensitive information like crypto wallets and banking credentials.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Counterfeit Phones Pose New Threat to Cryptocurrency Holders Cybersecurity researchers have issued a stark warning: hackers are flooding the market with fake Android smartphones pre-installed with malware engineered to steal cryptocurrency and personal data. These fraudulent devices, typically sold online at low prices, are embedded with the Triada Trojan\u2014a powerful piece of malware that allows [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":4284,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,43],"tags":[],"class_list":{"0":"post-14111","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-featured","8":"category-general-news"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hackers Sell Fake Android Phones Loaded with Crypto-Stealing Malware<\/title>\n<meta name=\"description\" content=\"Counterfeit Phones Pose New Threat to Cryptocurrency Holders Cybersecurity researchers have issued a stark warning: hackers are flooding the market with\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Sell Fake Android Phones Loaded with Crypto-Stealing Malware\" \/>\n<meta property=\"og:description\" content=\"Counterfeit Phones Pose New Threat to Cryptocurrency Holders Cybersecurity researchers have issued a stark warning: hackers are flooding the market with\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"CryptoMeter.io\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-03T05:15:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T05:15:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/03\/IMG_1511.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Adam L\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CryptoMeterIO\" \/>\n<meta name=\"twitter:site\" content=\"@CryptoMeterIO\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam L\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/\"},\"author\":{\"name\":\"Adam L\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/#\/schema\/person\/d05d4ef65ae9752036cc2b5e044592f9\"},\"headline\":\"Hackers Sell Fake Android Phones Loaded with Crypto-Stealing Malware\",\"datePublished\":\"2025-04-03T05:15:28+00:00\",\"dateModified\":\"2025-04-03T05:15:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/\"},\"wordCount\":391,\"publisher\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/03\/IMG_1511.webp\",\"articleSection\":[\"Featured\",\"General News\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/\",\"url\":\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/\",\"name\":\"Hackers Sell Fake Android Phones Loaded with Crypto-Stealing Malware\",\"isPartOf\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/03\/IMG_1511.webp\",\"datePublished\":\"2025-04-03T05:15:28+00:00\",\"dateModified\":\"2025-04-03T05:15:31+00:00\",\"description\":\"Counterfeit Phones Pose New Threat to Cryptocurrency Holders Cybersecurity researchers have issued a stark warning: hackers are flooding the market with\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#primaryimage\",\"url\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/03\/IMG_1511.webp\",\"contentUrl\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/03\/IMG_1511.webp\",\"width\":800,\"height\":500,\"caption\":\"Ether nft hack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cryptometer.io\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Sell Fake Android Phones Loaded with Crypto-Stealing Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/#website\",\"url\":\"https:\/\/www.cryptometer.io\/news\/\",\"name\":\"CryptoMeter.io\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/#organization\"},\"alternateName\":\"CryptoMeter.io\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cryptometer.io\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/#organization\",\"name\":\"CryptoMeter.io\",\"url\":\"https:\/\/www.cryptometer.io\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.cryptometer.io\/news\/wp-content\/uploads\/2023\/01\/cropped-favicon_large.png?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.cryptometer.io\/news\/wp-content\/uploads\/2023\/01\/cropped-favicon_large.png?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"CryptoMeter.io\"},\"image\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CryptoMeterIO\"],\"publishingPrinciples\":\"https:\/\/www.cryptometer.io\/news\/about-us\/\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/#\/schema\/person\/d05d4ef65ae9752036cc2b5e044592f9\",\"name\":\"Adam L\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/04\/cropped-3-96x96.png\",\"url\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/04\/cropped-3-96x96.png\",\"contentUrl\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/04\/cropped-3-96x96.png\",\"caption\":\"Adam L\"},\"description\":\"In the world of blockchain and cryptocurrencies, I have a great deal of passion and interest. My interest in blockchain and cryptocurrencies has led me to explore these technologies in greater depth, as I am interested in the potential implications they could have on the global economy.\",\"url\":\"https:\/\/www.cryptometer.io\/news\/author\/adam\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hackers Sell Fake Android Phones Loaded with Crypto-Stealing Malware","description":"Counterfeit Phones Pose New Threat to Cryptocurrency Holders Cybersecurity researchers have issued a stark warning: hackers are flooding the market with","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Sell Fake Android Phones Loaded with Crypto-Stealing Malware","og_description":"Counterfeit Phones Pose New Threat to Cryptocurrency Holders Cybersecurity researchers have issued a stark warning: hackers are flooding the market with","og_url":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/","og_site_name":"CryptoMeter.io","article_published_time":"2025-04-03T05:15:28+00:00","article_modified_time":"2025-04-03T05:15:31+00:00","og_image":[{"width":800,"height":500,"url":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/03\/IMG_1511.webp","type":"image\/webp"}],"author":"Adam L","twitter_card":"summary_large_image","twitter_creator":"@CryptoMeterIO","twitter_site":"@CryptoMeterIO","twitter_misc":{"Written by":"Adam L","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#article","isPartOf":{"@id":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/"},"author":{"name":"Adam L","@id":"https:\/\/www.cryptometer.io\/news\/#\/schema\/person\/d05d4ef65ae9752036cc2b5e044592f9"},"headline":"Hackers Sell Fake Android Phones Loaded with Crypto-Stealing Malware","datePublished":"2025-04-03T05:15:28+00:00","dateModified":"2025-04-03T05:15:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/"},"wordCount":391,"publisher":{"@id":"https:\/\/www.cryptometer.io\/news\/#organization"},"image":{"@id":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/03\/IMG_1511.webp","articleSection":["Featured","General News"],"inLanguage":"en-US","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/www.cryptometer.io\/news\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/","url":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/","name":"Hackers Sell Fake Android Phones Loaded with Crypto-Stealing Malware","isPartOf":{"@id":"https:\/\/www.cryptometer.io\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/03\/IMG_1511.webp","datePublished":"2025-04-03T05:15:28+00:00","dateModified":"2025-04-03T05:15:31+00:00","description":"Counterfeit Phones Pose New Threat to Cryptocurrency Holders Cybersecurity researchers have issued a stark warning: hackers are flooding the market with","breadcrumb":{"@id":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#primaryimage","url":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/03\/IMG_1511.webp","contentUrl":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/03\/IMG_1511.webp","width":800,"height":500,"caption":"Ether nft hack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cryptometer.io\/news\/hackers-sell-fake-android-phones-loaded-with-crypto-stealing-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cryptometer.io\/news\/"},{"@type":"ListItem","position":2,"name":"Hackers Sell Fake Android Phones Loaded with Crypto-Stealing Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.cryptometer.io\/news\/#website","url":"https:\/\/www.cryptometer.io\/news\/","name":"CryptoMeter.io","description":"","publisher":{"@id":"https:\/\/www.cryptometer.io\/news\/#organization"},"alternateName":"CryptoMeter.io","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cryptometer.io\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cryptometer.io\/news\/#organization","name":"CryptoMeter.io","url":"https:\/\/www.cryptometer.io\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cryptometer.io\/news\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.cryptometer.io\/news\/wp-content\/uploads\/2023\/01\/cropped-favicon_large.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.cryptometer.io\/news\/wp-content\/uploads\/2023\/01\/cropped-favicon_large.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"CryptoMeter.io"},"image":{"@id":"https:\/\/www.cryptometer.io\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CryptoMeterIO"],"publishingPrinciples":"https:\/\/www.cryptometer.io\/news\/about-us\/"},{"@type":"Person","@id":"https:\/\/www.cryptometer.io\/news\/#\/schema\/person\/d05d4ef65ae9752036cc2b5e044592f9","name":"Adam L","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/04\/cropped-3-96x96.png","url":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/04\/cropped-3-96x96.png","contentUrl":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/04\/cropped-3-96x96.png","caption":"Adam L"},"description":"In the world of blockchain and cryptocurrencies, I have a great deal of passion and interest. My interest in blockchain and cryptocurrencies has led me to explore these technologies in greater depth, as I am interested in the potential implications they could have on the global economy.","url":"https:\/\/www.cryptometer.io\/news\/author\/adam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/03\/IMG_1511.webp","_links":{"self":[{"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/posts\/14111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/comments?post=14111"}],"version-history":[{"count":1,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/posts\/14111\/revisions"}],"predecessor-version":[{"id":14113,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/posts\/14111\/revisions\/14113"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/media\/4284"}],"wp:attachment":[{"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/media?parent=14111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/categories?post=14111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/tags?post=14111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}