{"id":255,"date":"2019-04-06T19:33:17","date_gmt":"2019-04-06T19:33:17","guid":{"rendered":"http:\/\/www.syyhoaxanalyzer.com\/?p=255"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-29T17:00:00","slug":"'I-a\u00e2\u20ac\u0152m-the\u00e2\u20ac\u0152-Hacker-who\u00e2\u20ac\u0152-Cracked-yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r-Email'-Fake-Blackmail-Sextortion-Scam","status":"publish","type":"post","link":"https:\/\/www.syyhoaxanalyzer.com\/?p=255","title":{"rendered":"&#8216;I a\u00e2\u20ac\u0152m the\u00e2\u20ac\u0152 Hacker who\u00e2\u20ac\u0152 Cracked yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r Email&#8217; Fake Blackmail Sextortion Scam"},"content":{"rendered":"<div>\n<p>This message claims to be from a hacker who cracked your email and device a few months back. \u00a0 <\/p>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Top Content Responsive --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"4870821038\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p>Supposedly, the hacker created screenshots of you while you were &#8220;having fun on web-sites of personal content&#8221; (porn sites) and also installed malware that harvested all of your contacts.<\/p>\n<p>The &#8220;hacker&#8221; threatens to send these compromising screenshots to all of your contacts unless you send him $900 in bitcoin within 48 hours. He also claims that the malware that he installed will lock up your computer&#8217;s files if you don&#8217;t pay up.<\/p>\n<p>In an effort to prove that he has really hacked your system, the sender has included a password that he claims is associated with your email address.<\/p>\n<p>If you send the money as instructed, he promises to delete the compromising photographs and remove the malware from your computer.<\/p>\n<p>However, the sender has not really captured compromising images of you nor has he harvested all of your contacts as claimed.<\/p>\n<p>Instead, the email is just one version of an <a href=\"https:\/\/www.hoax-slayer.net\/tag\/sextortion\/\">increasingly common scam<\/a> designed to panic recipients into sending their money to online criminals.<\/p>\n<p>The scammers send out thousands of identical emails in the hope that they will trick at least a few recipients into paying the fee demanded.<\/p>\n<p>So, what about the password the scammers have included in the email? \u00a0 As I \u00a0<a href=\"https:\/\/www.hoax-slayer.net\/fake-blackmail-sextortion-scam-emails-using-real-passwords\/\">discuss in more detail in a separate report<\/a>, \u00a0 the scammers are collecting the passwords and the associated email addresses from old data breaches. Many commentators have indicated that the passwords in the emails are very old and no longer being used.<\/p>\n<p>The scammers are most likely using an automated system that checks the breached data and inserts the password associated with a particular email address into each scam message at the time of sending. \u00a0<\/p>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block; text-align:center;\"\n     data-ad-format=\"fluid\"\n     data-ad-layout=\"in-article\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"9162856233\"><\/ins><br \/>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p> Do not reply or respond to these messages if you receive one. \u00a0 Just hit the delete key.<\/p>\n<p>However, if the email includes a valid password that you currently use, you should change the password immediately. \u00a0 You can check if an account has been compromised in a data breach by entering the associated email address into Troy Hunt&#8217;s excellent \u00a0 \u00e2\u20ac\u0153<a href=\"https:\/\/haveibeenpwned.com\/\">have i been pwned<\/a>&#8221; service.<\/p>\n<h2>An example of the scam email:<\/h2>\n<div class=\"example\">\nHey the\u00e2\u20ac\u0152re\u00e2\u20ac\u0152<\/p>\n<p>I a\u00e2\u20ac\u0152m the\u00e2\u20ac\u0152 hacker who\u00e2\u20ac\u0152 cracked yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r e\u00e2\u20ac\u0152ma\u00e2\u20ac\u0152i\u00e2\u20ac\u0152l a\u00e2\u20ac\u0152nd de\u00e2\u20ac\u0152vi\u00e2\u20ac\u0152ce\u00e2\u20ac\u0152 a\u00e2\u20ac\u0152 fe\u00e2\u20ac\u0152w months a\u00e2\u20ac\u0152go\u00e2\u20ac\u0152.Yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152 entered yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r password o\u00e2\u20ac\u0152n o\u00e2\u20ac\u0152ne\u00e2\u20ac\u0152 o\u00e2\u20ac\u0152f the\u00e2\u20ac\u0152 we\u00e2\u20ac\u0152bsi\u00e2\u20ac\u0152te\u00e2\u20ac\u0152s yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152 vi\u00e2\u20ac\u0152si\u00e2\u20ac\u0152te\u00e2\u20ac\u0152d, a\u00e2\u20ac\u0152nd I intercepted thi\u00e2\u20ac\u0152s.<br \/>\nHe\u00e2\u20ac\u0152re\u00e2\u20ac\u0152&#8217;s yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r password fro\u00e2\u20ac\u0152m [email address removed] o\u00e2\u20ac\u0152n ti\u00e2\u20ac\u0152me\u00e2\u20ac\u0152 o\u00e2\u20ac\u0152f hack:[password removed]<\/p>\n<p>Obvi\u00e2\u20ac\u0152o\u00e2\u20ac\u0152u\u00e2\u20ac\u0152sly yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152 ca\u00e2\u20ac\u0152n will change i\u00e2\u20ac\u0152t, or perhaps already changed i\u00e2\u20ac\u0152t.<\/p>\n<p>Sti\u00e2\u20ac\u0152ll thi\u00e2\u20ac\u0152s wo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152ld no\u00e2\u20ac\u0152t ma\u00e2\u20ac\u0152tte\u00e2\u20ac\u0152r mu\u00e2\u20ac\u0152ch, my ma\u00e2\u20ac\u0152lwa\u00e2\u20ac\u0152re\u00e2\u20ac\u0152 u\u00e2\u20ac\u0152pda\u00e2\u20ac\u0152te\u00e2\u20ac\u0152d i\u00e2\u20ac\u0152t e\u00e2\u20ac\u0152ve\u00e2\u20ac\u0152ry ti\u00e2\u20ac\u0152me\u00e2\u20ac\u0152. Do\u00e2\u20ac\u0152 no\u00e2\u20ac\u0152t consider to\u00e2\u20ac\u0152 ge\u00e2\u20ac\u0152t i\u00e2\u20ac\u0152n to\u00e2\u20ac\u0152u\u00e2\u20ac\u0152ch with me\u00e2\u20ac\u0152 personally o\u00e2\u20ac\u0152r fi\u00e2\u20ac\u0152nd me\u00e2\u20ac\u0152, i\u00e2\u20ac\u0152t i\u00e2\u20ac\u0152s impossible, since I sent thi\u00e2\u20ac\u0152s ma\u00e2\u20ac\u0152i\u00e2\u20ac\u0152l fro\u00e2\u20ac\u0152m yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r e\u00e2\u20ac\u0152ma\u00e2\u20ac\u0152i\u00e2\u20ac\u0152l account.<br \/>\nBy wa\u00e2\u20ac\u0152y o\u00e2\u20ac\u0152f yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r own e\u00e2\u20ac\u0152 ma\u00e2\u20ac\u0152i\u00e2\u20ac\u0152l, I u\u00e2\u20ac\u0152plo\u00e2\u20ac\u0152a\u00e2\u20ac\u0152de\u00e2\u20ac\u0152d ma\u00e2\u20ac\u0152li\u00e2\u20ac\u0152ci\u00e2\u20ac\u0152o\u00e2\u20ac\u0152u\u00e2\u20ac\u0152s pro\u00e2\u20ac\u0152gra\u00e2\u20ac\u0152m co\u00e2\u20ac\u0152de\u00e2\u20ac\u0152 to\u00e2\u20ac\u0152 yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r Ope\u00e2\u20ac\u0152ra\u00e2\u20ac\u0152ti\u00e2\u20ac\u0152o\u00e2\u20ac\u0152n System.<br \/>\nI saved all yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r contacts with friends, co\u00e2\u20ac\u0152-workers, loved ones plu\u00e2\u20ac\u0152s the\u00e2\u20ac\u0152 to\u00e2\u20ac\u0152ta\u00e2\u20ac\u0152l re\u00e2\u20ac\u0152co\u00e2\u20ac\u0152rd o\u00e2\u20ac\u0152f visits to\u00e2\u20ac\u0152 the\u00e2\u20ac\u0152 World wi\u00e2\u20ac\u0152de\u00e2\u20ac\u0152 we\u00e2\u20ac\u0152b resources.<\/p>\n<p>Furthermore I se\u00e2\u20ac\u0152t u\u00e2\u20ac\u0152p a\u00e2\u20ac\u0152 Ma\u00e2\u20ac\u0152lwa\u00e2\u20ac\u0152re\u00e2\u20ac\u0152 o\u00e2\u20ac\u0152n yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r de\u00e2\u20ac\u0152vi\u00e2\u20ac\u0152ce\u00e2\u20ac\u0152.<\/p>\n<p>Yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152&#8217;re\u00e2\u20ac\u0152 no\u00e2\u20ac\u0152t my only victim, I usually lock persoanl computers and ask fo\u00e2\u20ac\u0152r a\u00e2\u20ac\u0152 ransom.<\/p>\n<p>However I was hi\u00e2\u20ac\u0152t by the\u00e2\u20ac\u0152 web-sites o\u00e2\u20ac\u0152f persoanl content that yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152 normally stop by.<\/p>\n<p>I a\u00e2\u20ac\u0152m i\u00e2\u20ac\u0152n surprise o\u00e2\u20ac\u0152f yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r own fa\u00e2\u20ac\u0152nta\u00e2\u20ac\u0152si\u00e2\u20ac\u0152e\u00e2\u20ac\u0152s! I ha\u00e2\u20ac\u0152ve\u00e2\u20ac\u0152 ne\u00e2\u20ac\u0152ve\u00e2\u20ac\u0152r no\u00e2\u20ac\u0152ti\u00e2\u20ac\u0152ce\u00e2\u20ac\u0152d anything li\u00e2\u20ac\u0152ke\u00e2\u20ac\u0152 thi\u00e2\u20ac\u0152s!<\/p>\n<p>The\u00e2\u20ac\u0152re\u00e2\u20ac\u0152fo\u00e2\u20ac\u0152re\u00e2\u20ac\u0152, when yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152 ha\u00e2\u20ac\u0152d fu\u00e2\u20ac\u0152n o\u00e2\u20ac\u0152n piquant sites (yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152 know wha\u00e2\u20ac\u0152t I a\u00e2\u20ac\u0152m talking a\u00e2\u20ac\u0152bo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152t!) I created screenshot with utilising my program through yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r ca\u00e2\u20ac\u0152me\u00e2\u20ac\u0152ra\u00e2\u20ac\u0152 o\u00e2\u20ac\u0152f yours system.<\/p>\n<p>After that, I combined the\u00e2\u20ac\u0152m to\u00e2\u20ac\u0152 the\u00e2\u20ac\u0152 content o\u00e2\u20ac\u0152f the\u00e2\u20ac\u0152 currently se\u00e2\u20ac\u0152e\u00e2\u20ac\u0152n site.<\/p>\n<p>No\u00e2\u20ac\u0152w the\u00e2\u20ac\u0152re\u00e2\u20ac\u0152 will certainly be\u00e2\u20ac\u0152 giggling when I send the\u00e2\u20ac\u0152se\u00e2\u20ac\u0152 pho\u00e2\u20ac\u0152to\u00e2\u20ac\u0152s to\u00e2\u20ac\u0152 yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r friends!<\/p>\n<p>Nevertheless I be\u00e2\u20ac\u0152li\u00e2\u20ac\u0152e\u00e2\u20ac\u0152ve\u00e2\u20ac\u0152 yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152 wo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152ld not li\u00e2\u20ac\u0152ke\u00e2\u20ac\u0152 i\u00e2\u20ac\u0152t.<\/p>\n<p>Fo\u00e2\u20ac\u0152r that re\u00e2\u20ac\u0152a\u00e2\u20ac\u0152so\u00e2\u20ac\u0152n, I expect payment fro\u00e2\u20ac\u0152m yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152 with regard to\u00e2\u20ac\u0152 my silence.<\/p>\n<p>I fe\u00e2\u20ac\u0152e\u00e2\u20ac\u0152l $900 i\u00e2\u20ac\u0152s a\u00e2\u20ac\u0152n a\u00e2\u20ac\u0152de\u00e2\u20ac\u0152qu\u00e2\u20ac\u0152a\u00e2\u20ac\u0152te\u00e2\u20ac\u0152 pri\u00e2\u20ac\u0152ce\u00e2\u20ac\u0152 re\u00e2\u20ac\u0152ga\u00e2\u20ac\u0152rdi\u00e2\u20ac\u0152ng thi\u00e2\u20ac\u0152s!<\/p>\n<p>Pa\u00e2\u20ac\u0152y with Bitcoins.<\/p>\n<p>My BTC wa\u00e2\u20ac\u0152lle\u00e2\u20ac\u0152t: [Removed]<\/p>\n<p>If yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152 do\u00e2\u20ac\u0152 no\u00e2\u20ac\u0152t kno\u00e2\u20ac\u0152w ho\u00e2\u20ac\u0152w to\u00e2\u20ac\u0152 do\u00e2\u20ac\u0152 thi\u00e2\u20ac\u0152s &#8211; type\u00e2\u20ac\u0152 i\u00e2\u20ac\u0152nto\u00e2\u20ac\u0152 Google &#8216;ho\u00e2\u20ac\u0152w to\u00e2\u20ac\u0152 se\u00e2\u20ac\u0152nd mo\u00e2\u20ac\u0152ne\u00e2\u20ac\u0152y to\u00e2\u20ac\u0152 a\u00e2\u20ac\u0152 bitcoin wa\u00e2\u20ac\u0152lle\u00e2\u20ac\u0152t&#8217;. It i\u00e2\u20ac\u0152s e\u00e2\u20ac\u0152a\u00e2\u20ac\u0152sy.<\/p>\n<p>Following getting the\u00e2\u20ac\u0152 given amount, all yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r files will be\u00e2\u20ac\u0152 instantly eliminated automatically. My computer vi\u00e2\u20ac\u0152ru\u00e2\u20ac\u0152s will also clear away itself fro\u00e2\u20ac\u0152m yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r computer.<\/p>\n<p>My Tro\u00e2\u20ac\u0152ja\u00e2\u20ac\u0152n vi\u00e2\u20ac\u0152ru\u00e2\u20ac\u0152se\u00e2\u20ac\u0152s ha\u00e2\u20ac\u0152ve\u00e2\u20ac\u0152 a\u00e2\u20ac\u0152u\u00e2\u20ac\u0152to\u00e2\u20ac\u0152 a\u00e2\u20ac\u0152le\u00e2\u20ac\u0152rt, so\u00e2\u20ac\u0152 I kno\u00e2\u20ac\u0152w when thi\u00e2\u20ac\u0152s e\u00e2\u20ac\u0152ma\u00e2\u20ac\u0152i\u00e2\u20ac\u0152l i\u00e2\u20ac\u0152s o\u00e2\u20ac\u0152pe\u00e2\u20ac\u0152ne\u00e2\u20ac\u0152d.<\/p>\n<p>I give yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152 two\u00e2\u20ac\u0152 da\u00e2\u20ac\u0152ys (forty eight hrs) to\u00e2\u20ac\u0152 make the\u00e2\u20ac\u0152 payment.<\/p>\n<p>If thi\u00e2\u20ac\u0152s do\u00e2\u20ac\u0152e\u00e2\u20ac\u0152s no\u00e2\u20ac\u0152t ha\u00e2\u20ac\u0152ppe\u00e2\u20ac\u0152n &#8211; a\u00e2\u20ac\u0152ll yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r friends wi\u00e2\u20ac\u0152ll certainly ge\u00e2\u20ac\u0152t o\u00e2\u20ac\u0152u\u00e2\u20ac\u0152tra\u00e2\u20ac\u0152ge\u00e2\u20ac\u0152o\u00e2\u20ac\u0152u\u00e2\u20ac\u0152s pho\u00e2\u20ac\u0152to\u00e2\u20ac\u0152s fro\u00e2\u20ac\u0152m yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r darkish secret li\u00e2\u20ac\u0152fe\u00e2\u20ac\u0152 a\u00e2\u20ac\u0152nd yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r system wi\u00e2\u20ac\u0152ll be\u00e2\u20ac\u0152 blocked a\u00e2\u20ac\u0152s we\u00e2\u20ac\u0152ll a\u00e2\u20ac\u0152fte\u00e2\u20ac\u0152r 48 ho\u00e2\u20ac\u0152u\u00e2\u20ac\u0152rs.<\/p>\n<p>Do\u00e2\u20ac\u0152n&#8217;t be\u00e2\u20ac\u0152 fo\u00e2\u20ac\u0152o\u00e2\u20ac\u0152li\u00e2\u20ac\u0152sh!<\/p>\n<p>Co\u00e2\u20ac\u0152ps o\u00e2\u20ac\u0152r friends wo\u00e2\u20ac\u0152n&#8217;t a\u00e2\u20ac\u0152i\u00e2\u20ac\u0152d yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152 fo\u00e2\u20ac\u0152r ce\u00e2\u20ac\u0152rta\u00e2\u20ac\u0152i\u00e2\u20ac\u0152n &#8230;<\/p>\n<p>P.S I ca\u00e2\u20ac\u0152n pre\u00e2\u20ac\u0152sent yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152 with re\u00e2\u20ac\u0152co\u00e2\u20ac\u0152mme\u00e2\u20ac\u0152nda\u00e2\u20ac\u0152ti\u00e2\u20ac\u0152o\u00e2\u20ac\u0152n with re\u00e2\u20ac\u0152ga\u00e2\u20ac\u0152rd to\u00e2\u20ac\u0152 the\u00e2\u20ac\u0152 fu\u00e2\u20ac\u0152tu\u00e2\u20ac\u0152re\u00e2\u20ac\u0152. Ne\u00e2\u20ac\u0152ve\u00e2\u20ac\u0152r enter yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r se\u00e2\u20ac\u0152cu\u00e2\u20ac\u0152ri\u00e2\u20ac\u0152ty passwords o\u00e2\u20ac\u0152n ri\u00e2\u20ac\u0152sky internet si\u00e2\u20ac\u0152te\u00e2\u20ac\u0152s.<\/p>\n<p>I ho\u00e2\u20ac\u0152pe\u00e2\u20ac\u0152 fo\u00e2\u20ac\u0152r yo\u00e2\u20ac\u0152u\u00e2\u20ac\u0152r discretion.<\/p>\n<p>Go\u00e2\u20ac\u0152o\u00e2\u20ac\u0152d-bye\u00e2\u20ac\u0152.<\/p>\n<\/div>\n<p> &nbsp;<\/p>\n<div class=\"example\"><\/div>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- Third Content Ad Responsive --><br \/>\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-0355887770822260\"\n     data-ad-slot=\"1909104632\"\n     data-ad-format=\"auto\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<div align=\"center\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<!-- HS Net Bottom AdLinks --><br \/>\n<ins class=\"adsbygoogle\" style=\"display: block;\" data-ad-client=\"ca-pub-0355887770822260\" data-ad-slot=\"1358951439\" data-ad-format=\"link\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/div>\n<p><\/br><\/br> Original Source : <a href=\"https:\/\/www.hoax-slayer.net\/hacker-email-sextortion-scam\/\" target=\"_blank\">https:\/\/www.hoax-slayer.net\/hacker-email-sextortion-scam\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This message claims to be from a hacker who cracked your email and device a few months back. \u00a0 Supposedly, the hacker created screenshots of you while you were &#8220;having fun on web-sites of personal content&#8221; (porn sites) and also installed malware that harvested all of your contacts. The &#8220;hacker&#8221; threatens to send these compromising [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6890,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-255","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hoax-inggris"],"_links":{"self":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/255"}],"collection":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=255"}],"version-history":[{"count":0,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/posts\/255\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=\/wp\/v2\/media\/6890"}],"wp:attachment":[{"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syyhoaxanalyzer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}