{"id":14215,"date":"2025-04-09T17:32:26","date_gmt":"2025-04-09T17:32:26","guid":{"rendered":"https:\/\/www.cryptometer.io\/news\/?p=14215"},"modified":"2025-04-09T16:32:34","modified_gmt":"2025-04-09T16:32:34","slug":"hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions","status":"publish","type":"post","link":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/","title":{"rendered":"Hackers Hide Crypto-Stealing Malware in Fake Microsoft Office Extensions"},"content":{"rendered":"\n<p>Cybercriminals are targeting crypto users with malware disguised as Microsoft Office add-ins, using trusted platforms like SourceForge to distribute malicious files. According to an April 8 report by cybersecurity firm Kaspersky, the malware, known as ClipBanker, secretly replaces copied crypto wallet addresses with the attacker\u2019s address.<\/p>\n\n\n\n<p>The fake listing, called \u201cofficepackage,\u201d appears legitimate by including real Office extension files and polished UI elements, making it difficult for users to spot the scam.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-the-clipbanker-malware-works\">How the ClipBanker Malware Works<\/h3>\n\n\n\n<p>ClipBanker is designed to take advantage of a common behavior among crypto users\u2014copying and pasting wallet addresses. When a victim copies their crypto address, the malware silently swaps it with the attacker\u2019s, diverting funds during transactions.<\/p>\n\n\n\n<p>In addition to address swapping, the malware:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sends sensitive system information (IP address, location, usernames) to attackers via Telegram<\/li>\n\n\n\n<li>Scans for previous infections or antivirus tools and deletes itself if detected<\/li>\n\n\n\n<li>Uses unusually small files or padded junk files to mask its presence and appear like a genuine Office installer<\/li>\n<\/ul>\n\n\n\n<p>Kaspersky said the malware campaign was primarily observed on SourceForge, a widely used open-source software repository. The infected software mimics a legitimate developer tool, often appearing in search results.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-attackers-could-sell-access-to-infected-systems\">Attackers Could Sell Access to Infected Systems<\/h3>\n\n\n\n<p>Kaspersky warns that ClipBanker does more than just steal crypto. It may also:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Install crypto miners to exploit the victim\u2019s device resources<\/li>\n\n\n\n<li>Open backdoors that can be sold to other threat actors, expanding the risk beyond financial theft<\/li>\n<\/ul>\n\n\n\n<p>\u201cOur telemetry indicates that 90% of potential victims are in Russia, where 4,604 users encountered the scheme between early January and late March,\u201d Kaspersky said. The malware interface is in Russian, suggesting the campaign may target Russian-speaking users.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-protecting-yourself-from-crypto-malware\">Protecting Yourself from Crypto Malware<\/h3>\n\n\n\n<p>To reduce the risk of infection:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Only download software from official and trusted sources<\/li>\n\n\n\n<li>Avoid pirated or unofficial Office add-ins and extensions<\/li>\n\n\n\n<li>Use up-to-date antivirus tools and scan your system regularly<\/li>\n<\/ul>\n\n\n\n<p>Kaspersky emphasized that attackers are constantly refining their methods to trick users into downloading malware, especially those seeking software outside authorized platforms.<\/p>\n\n\n\n<p>Meanwhile, other cybersecurity firms are also raising the alarm. Threat Fabric recently reported a new malware strain that overlays fake login screens on Android devices, tricking users into handing over crypto seed phrases.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are targeting crypto users with malware disguised as Microsoft Office add-ins, using trusted platforms like SourceForge to distribute malicious files. According to an April 8 report by cybersecurity firm Kaspersky, the malware, known as ClipBanker, secretly replaces copied crypto wallet addresses with the attacker\u2019s address. The fake listing, called \u201cofficepackage,\u201d appears legitimate by including [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":3056,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[43],"tags":[],"class_list":{"0":"post-14215","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-general-news"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hackers Hide Crypto-Stealing Malware in Fake Microsoft Office Extensions<\/title>\n<meta name=\"description\" content=\"Cybercriminals are targeting crypto users with malware disguised as Microsoft Office add-ins, using trusted platforms like SourceForge to distribute\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Hide Crypto-Stealing Malware in Fake Microsoft Office Extensions\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals are targeting crypto users with malware disguised as Microsoft Office add-ins, using trusted platforms like SourceForge to distribute\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/\" \/>\n<meta property=\"og:site_name\" content=\"CryptoMeter.io\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-09T17:32:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/02\/KyberSwap-Hacker-e1708966708534.jpeg?fit=800%2C530&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ayushi Somani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CryptoMeterIO\" \/>\n<meta name=\"twitter:site\" content=\"@CryptoMeterIO\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ayushi Somani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/\"},\"author\":{\"name\":\"Ayushi Somani\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/#\/schema\/person\/c5a4aeb0d5007ab0f90c54fa632ed930\"},\"headline\":\"Hackers Hide Crypto-Stealing Malware in Fake Microsoft Office Extensions\",\"datePublished\":\"2025-04-09T17:32:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/\"},\"wordCount\":376,\"publisher\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/02\/KyberSwap-Hacker-e1708966708534.jpeg\",\"articleSection\":[\"General News\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/\",\"url\":\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/\",\"name\":\"Hackers Hide Crypto-Stealing Malware in Fake Microsoft Office Extensions\",\"isPartOf\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/02\/KyberSwap-Hacker-e1708966708534.jpeg\",\"datePublished\":\"2025-04-09T17:32:26+00:00\",\"description\":\"Cybercriminals are targeting crypto users with malware disguised as Microsoft Office add-ins, using trusted platforms like SourceForge to distribute\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#primaryimage\",\"url\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/02\/KyberSwap-Hacker-e1708966708534.jpeg\",\"contentUrl\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/02\/KyberSwap-Hacker-e1708966708534.jpeg\",\"width\":800,\"height\":530,\"caption\":\"KyberSwap Hacker\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cryptometer.io\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Hide Crypto-Stealing Malware in Fake Microsoft Office Extensions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/#website\",\"url\":\"https:\/\/www.cryptometer.io\/news\/\",\"name\":\"CryptoMeter.io\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/#organization\"},\"alternateName\":\"CryptoMeter.io\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cryptometer.io\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/#organization\",\"name\":\"CryptoMeter.io\",\"url\":\"https:\/\/www.cryptometer.io\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.cryptometer.io\/news\/wp-content\/uploads\/2023\/01\/cropped-favicon_large.png?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.cryptometer.io\/news\/wp-content\/uploads\/2023\/01\/cropped-favicon_large.png?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"CryptoMeter.io\"},\"image\":{\"@id\":\"https:\/\/www.cryptometer.io\/news\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CryptoMeterIO\"],\"publishingPrinciples\":\"https:\/\/www.cryptometer.io\/news\/about-us\/\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/#\/schema\/person\/c5a4aeb0d5007ab0f90c54fa632ed930\",\"name\":\"Ayushi Somani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/04\/cropped-aayushi-96x96.png\",\"url\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/04\/cropped-aayushi-96x96.png\",\"contentUrl\":\"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/04\/cropped-aayushi-96x96.png\",\"caption\":\"Ayushi Somani\"},\"description\":\"Ayushi Somani is an academically gifted individual who has a passion for blockchain technology. She is well-versed in the technology, having been an early adopter of cryptocurrency and investing in Bitcoin and several other digital currencies.\",\"url\":\"https:\/\/www.cryptometer.io\/news\/author\/ayushi\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hackers Hide Crypto-Stealing Malware in Fake Microsoft Office Extensions","description":"Cybercriminals are targeting crypto users with malware disguised as Microsoft Office add-ins, using trusted platforms like SourceForge to distribute","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Hide Crypto-Stealing Malware in Fake Microsoft Office Extensions","og_description":"Cybercriminals are targeting crypto users with malware disguised as Microsoft Office add-ins, using trusted platforms like SourceForge to distribute","og_url":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/","og_site_name":"CryptoMeter.io","article_published_time":"2025-04-09T17:32:26+00:00","og_image":[{"width":800,"height":530,"url":"https:\/\/i0.wp.com\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/02\/KyberSwap-Hacker-e1708966708534.jpeg?fit=800%2C530&ssl=1","type":"image\/jpeg"}],"author":"Ayushi Somani","twitter_card":"summary_large_image","twitter_creator":"@CryptoMeterIO","twitter_site":"@CryptoMeterIO","twitter_misc":{"Written by":"Ayushi Somani","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#article","isPartOf":{"@id":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/"},"author":{"name":"Ayushi Somani","@id":"https:\/\/www.cryptometer.io\/news\/#\/schema\/person\/c5a4aeb0d5007ab0f90c54fa632ed930"},"headline":"Hackers Hide Crypto-Stealing Malware in Fake Microsoft Office Extensions","datePublished":"2025-04-09T17:32:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/"},"wordCount":376,"publisher":{"@id":"https:\/\/www.cryptometer.io\/news\/#organization"},"image":{"@id":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/02\/KyberSwap-Hacker-e1708966708534.jpeg","articleSection":["General News"],"inLanguage":"en-US","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/www.cryptometer.io\/news\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/","url":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/","name":"Hackers Hide Crypto-Stealing Malware in Fake Microsoft Office Extensions","isPartOf":{"@id":"https:\/\/www.cryptometer.io\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#primaryimage"},"image":{"@id":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/02\/KyberSwap-Hacker-e1708966708534.jpeg","datePublished":"2025-04-09T17:32:26+00:00","description":"Cybercriminals are targeting crypto users with malware disguised as Microsoft Office add-ins, using trusted platforms like SourceForge to distribute","breadcrumb":{"@id":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#primaryimage","url":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/02\/KyberSwap-Hacker-e1708966708534.jpeg","contentUrl":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/02\/KyberSwap-Hacker-e1708966708534.jpeg","width":800,"height":530,"caption":"KyberSwap Hacker"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cryptometer.io\/news\/hackers-hide-crypto-stealing-malware-in-fake-microsoft-office-extensions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cryptometer.io\/news\/"},{"@type":"ListItem","position":2,"name":"Hackers Hide Crypto-Stealing Malware in Fake Microsoft Office Extensions"}]},{"@type":"WebSite","@id":"https:\/\/www.cryptometer.io\/news\/#website","url":"https:\/\/www.cryptometer.io\/news\/","name":"CryptoMeter.io","description":"","publisher":{"@id":"https:\/\/www.cryptometer.io\/news\/#organization"},"alternateName":"CryptoMeter.io","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cryptometer.io\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cryptometer.io\/news\/#organization","name":"CryptoMeter.io","url":"https:\/\/www.cryptometer.io\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cryptometer.io\/news\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.cryptometer.io\/news\/wp-content\/uploads\/2023\/01\/cropped-favicon_large.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.cryptometer.io\/news\/wp-content\/uploads\/2023\/01\/cropped-favicon_large.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"CryptoMeter.io"},"image":{"@id":"https:\/\/www.cryptometer.io\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CryptoMeterIO"],"publishingPrinciples":"https:\/\/www.cryptometer.io\/news\/about-us\/"},{"@type":"Person","@id":"https:\/\/www.cryptometer.io\/news\/#\/schema\/person\/c5a4aeb0d5007ab0f90c54fa632ed930","name":"Ayushi Somani","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/04\/cropped-aayushi-96x96.png","url":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/04\/cropped-aayushi-96x96.png","contentUrl":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/04\/cropped-aayushi-96x96.png","caption":"Ayushi Somani"},"description":"Ayushi Somani is an academically gifted individual who has a passion for blockchain technology. She is well-versed in the technology, having been an early adopter of cryptocurrency and investing in Bitcoin and several other digital currencies.","url":"https:\/\/www.cryptometer.io\/news\/author\/ayushi\/"}]}},"jetpack_featured_media_url":"https:\/\/www.cryptometer.io\/news\/wp-content\/uploads\/2024\/02\/KyberSwap-Hacker-e1708966708534.jpeg","_links":{"self":[{"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/posts\/14215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/comments?post=14215"}],"version-history":[{"count":1,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/posts\/14215\/revisions"}],"predecessor-version":[{"id":14217,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/posts\/14215\/revisions\/14217"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/media\/3056"}],"wp:attachment":[{"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/media?parent=14215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/categories?post=14215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cryptometer.io\/news\/wp-json\/wp\/v2\/tags?post=14215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}