{"id":140993,"date":"2024-11-04T22:20:23","date_gmt":"2024-11-04T16:50:23","guid":{"rendered":"https:\/\/pwonlyias.com\/stage\/?post_type=current-affairs&#038;p=140993"},"modified":"2024-11-06T12:22:17","modified_gmt":"2024-11-06T06:52:17","slug":"social-engineering-techniques-in-cyber-crime","status":"publish","type":"current-affairs","link":"https:\/\/pwonlyias.com\/stage\/current-affairs\/social-engineering-techniques-in-cyber-crime","title":{"rendered":"Social engineering Techniques in Cyber Crime"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Malicious <\/span><b>APKs (Android Package format) files <\/b><span style=\"font-weight: 400;\">are being used by cybercriminals<\/span><b> by using social engineering methods<\/b><span style=\"font-weight: 400;\"> as new means to scam users.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Example:<\/b><span style=\"font-weight: 400;\"> In a Recent case of cyber fraud, a woman claimed having lost upto Rs.1 lakh after she <\/span><b>downloaded an app on her iPhone via an APK file on WhatsApp<\/b><span style=\"font-weight: 400;\"> at the Bengaluru airport lounge.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><strong>S<\/strong><b>ocial Engineering Technique was used to download the malicious apps<\/b><span style=\"font-weight: 400;\"> by which the device was accessed and likely enabled call forwarding.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><span style=\"font-size: 18pt;\"><b>About Social engineering in Cyber Crime<\/b><\/span><\/h2>\n<ul>\n<li><span style=\"font-weight: 400;\">Social Engineering<\/span><b>\u00a0 is a cyber crime technique that uses psychological manipulation and deceiving human emotion<\/b><span style=\"font-weight: 400;\"> to trick users into<\/span><b> revealing sensitive information or making security mistakes.<\/b><\/li>\n<li aria-level=\"1\">\n<h3><span style=\"font-size: 16pt;\"><b>Common Techniques:\u00a0<\/b><\/span><\/h3>\n<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-141339 alignright\" src=\"https:\/\/pwonlyias.com\/stage\/wp-content\/uploads\/2024\/11\/67-672b10277e7d9.webp\" alt=\"Social engineering in Cyber Crime\" width=\"450\" height=\"277\" srcset=\"https:\/\/pwonlyias.com\/stage\/wp-content\/uploads\/2024\/11\/67-672b10277e7d9.webp 872w, https:\/\/pwonlyias.com\/stage\/wp-content\/uploads\/2024\/11\/67-672b10277e7d9-300x185.webp 300w, https:\/\/pwonlyias.com\/stage\/wp-content\/uploads\/2024\/11\/67-672b10277e7d9-768x473.webp 768w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Phishing: <\/b><span style=\"font-weight: 400;\">These are <\/span><b>email and text message campaigns which are aimed at creating a sense of urgency, or fear <\/b><span style=\"font-weight: 400;\">in victims prodding\u00a0 them into revealing sensitive information, clicking on links to malicious websites, or opening attachments that contain malware.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><b>Example:\u00a0 <\/b><span style=\"font-weight: 400;\">An email sent to users of an online service that alerts them of a policy violation requiring immediate action on their part, such as a required password change.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Baiting: <\/b><span style=\"font-weight: 400;\">A technique that<\/span><b> uses a false promise to lure victims into a trap that steals<\/b><span style=\"font-weight: 400;\"> their personal information or infects their systems with malware.\u00a0<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><b>Example: <\/b><span style=\"font-weight: 400;\">Baiting usually <\/span><b>uses physical media<\/b><span style=\"font-weight: 400;\"> to disperse malware (typically malware-infected flash drives) in areas where potential victims are certain to see them (e.g., bathrooms, elevators etc)<\/span><b>. Also\u00a0 Online forms of baiting consist of enticing ads that lead to malicious sites<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><b>Scareware: <\/b><span style=\"font-weight: 400;\">A technique that involves <\/span><b>bombarding victims with false alarms and threats to trick<\/b><span style=\"font-weight: 400;\"> them into installing software that is either malware or has no real benefit.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><span class=\"vc_button\"><a href=\"https:\/\/www.pw.live\/batches\/upsc\/pw-only-ias?utm_source=seo+upsc+batch&#038;utm_medium=seo+upsc&#038;utm_campaign=seo&#038;utm_id=upsc\" target=\"_blank\" rel=\"noopener\">Enroll now for UPSC Online Classes<\/a><\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td>\n<h3><b>Cybercrime in India<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>India ranked fifth globally<\/b><span style=\"font-weight: 400;\"> in the number of breached accounts in 2023, with 5.3 million leaked accounts and<\/span><b> citizens losing close to \u20b91.3 &#8211; \u20b91.5 lakh to cyber criminals every minute.<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">According to the<\/span> <b>National Cybercrime Reporting Portal (NCRP), <\/b><span style=\"font-weight: 400;\">at least \u20b910,319 crore was reported lost by <\/span><b>victims of digital financial fraud in 2023<\/b><span style=\"font-weight: 400;\"> with 5,252 suspect URLs reported so far.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A report by the I<\/span><b>ndian Cybercrime Coordination Centre (I4C)<\/b><span style=\"font-weight: 400;\"> says that digital financial frauds amounted to a staggerin<\/span><b>g \u20b91.25 lakh crore over the last three years.\u00a0\u00a0<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The Parliamentary Standing Committee on Finance\u2019s report on \u2018Cybersecurity and Rising Incidents of Cyber\/White Collar Crimes\u2018 n<\/b><span style=\"font-weight: 400;\">oted that domestic fraud reported by Supervising Entities (SE) in FY23 totalled \u20b92,537.35 crore.<\/span><\/li>\n<\/ul>\n<h3><b>Measures to Prevent Attacks<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Standardisation:<\/b><span style=\"font-weight: 400;\"> All the banks have been asked to <\/span><b>have \u2018160\u2019 in the beginning of their customer care numbers <\/b><span style=\"font-weight: 400;\">to identify as genuine.\u00a0<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The three-digit number will be a part of the 10-digit mobile number and any call without the number should not be picked up by the citizens.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>URL phishing fraud<\/b><span style=\"font-weight: 400;\">s: All banks in India will have <\/span><b>.bnk.in <\/b><span style=\"font-weight: 400;\">in their URL and financial institutions will have<\/span><b> .fin.in<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>White Listing:<\/b><span style=\"font-weight: 400;\"> All telecom operators will \u2018<\/span><b>white-list\u2019 links sent via messages <\/b><span style=\"font-weight: 400;\">(including SMS) to citizens. The Links which are not white-listed will be disposed of at the operator level and will not reach customers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Strengthen Know Your Customer (KYC) <\/b><span style=\"font-weight: 400;\">procedures, improve oversight and audit and ensure compliance to regulation<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><b>Example: <\/b><span style=\"font-weight: 400;\">A common example being the <\/span><b>popup banners appearing in browser while surfing the web<\/b><span style=\"font-weight: 400;\">, displaying such text such as, \u201cYour computer may be infected with harmful spyware programs.\u201d\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Pretexting: <\/b><span style=\"font-weight: 400;\">A technique that <\/span><b>involves gaining a victim&#8217;s trust through a series of lies,<\/b><span style=\"font-weight: 400;\"> often by pretending to need sensitive information to perform a critical task.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Quid pro quo: <\/b><span style=\"font-weight: 400;\">A technique that<\/span><b> exploits people&#8217;s tendency to reciprocate good gestures.<\/b>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><b>For example<\/b><span style=\"font-weight: 400;\">, an attacker may offer free technical support in exchange for the victim turning off their antivirus software.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Deep Fakes:<\/b><span style=\"font-weight: 400;\"> A technique that uses artificial intelligence (AI) to create realistic but fake audio, video, or images that impersonate real people.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Watering hole attacks:<\/b><span style=\"font-weight: 400;\"> A targeted technique that involves compromising a website that is likely to be visited by a particular group of people.\u00a0<\/span><\/li>\n<li aria-level=\"1\">\n<h3><span style=\"font-size: 16pt;\"><b>Reasons for its Prevalence:<\/b><\/span><\/h3>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Lack of Security Knowledge:<\/b><span style=\"font-weight: 400;\"> Many employees lack the knowledge to identify and defend themselves against these types of attacks as social engineering attacks are designed to exploit human weaknesses.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Social Media Presence: <\/b><span style=\"font-weight: 400;\">Social engineers use deception and manipulation to pose as friends or family members or pretend to be from a trusted organisation like a bank or government agency often targeting people with an active social media presence.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Appealing to Greed:<\/b><span style=\"font-weight: 400;\"> The <\/span><b>infamous Email Nigerian Prince scam of 2018<\/b><span style=\"font-weight: 400;\"> is an example of catering to the human nature of greed. In the scam,a Nigerian royal claims to offer a giant financial reward in exchange for the recipient\u2019s bank account information or a small advance fee.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Appealing to Generosity:<\/b><span style=\"font-weight: 400;\"> It can also appeal<\/span><b> to victims\u2019 better nature like to offer technical help to a friend or ask for participation in a survey, c<\/b><span style=\"font-weight: 400;\">laiming\u00a0 that the recipients\u2019 post has gone viral and providing\u00a0 a spoofed link to a fake website or malware download.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\">\n<h3><span style=\"font-size: 16pt;\"><b>Social Engineering Prevention:\u00a0<\/b><\/span><\/h3>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Double Check on the Information: <\/b><span style=\"font-weight: 400;\">Do not<\/span><b> open emails and attachments from suspicious or unknown sources. <\/b><span style=\"font-weight: 400;\">Also <\/span><b>always cross-check and confirm the news <\/b><span style=\"font-weight: 400;\">in an email from other sources, such as via telephone or directly from a service provider\u2019s site if suspicion arises.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Use Multifactor Authentication: <\/b><span style=\"font-weight: 400;\">Using multi factor authentication helps ensure your account\u2019s protection in the event of system compromise<\/span> <span style=\"font-weight: 400;\">as user credentials are one of the most valuable pieces of information seeked by attackers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Up to date Antivirus\/Antimalware Software:<\/b><span style=\"font-weight: 400;\"> Periodically check to make sure that the updates have been applied, and scan your system for possible infections.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Cyber Security Awareness: <\/b><span style=\"font-weight: 400;\">General Education on the multiple types of social engineering scams and use of\u00a0 free tools such as phishing simulators, training videos, and cyber security assessments to strengthen organisation and reduce human risk\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Training Modules: <\/b><span style=\"font-weight: 400;\">Social engineering awareness training model uses animated videos, interactive online training, managed security services, microlearning modules, and phishing simulations to provide continual support.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><span class=\"vc_button\"><a href=\"https:\/\/www.pw.live\/batches\/upsc\/pw-only-ias?utm_source=seo+upsc+batch&#038;utm_medium=seo+upsc&#038;utm_campaign=seo&#038;utm_id=upsc\" target=\"_blank\" rel=\"noopener\">Enroll now for UPSC Online Classes<\/a><\/span><\/p>\n<div class=\"vc_table_green\"><\/p>\n<table>\n<tbody>\n<tr>\n<td>\n<h3><b>About APKs (Android Package Format or Android Package Kit) Files<\/b><\/h3>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">APKs are in the<\/span><b> format of files that Android uses to distribute and install apps<\/b><span style=\"font-weight: 400;\">.\u00a0 An APK file <\/span><b>contains all the data an app needs, including all of the software program&#8217;s code, assets and resources.<\/b>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">All Android apps either downloaded from the Google Play Store or manually use the APK files<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Nature: An APK is an archive file <\/b><span style=\"font-weight: 400;\">(it contains multiple files, plus some metadata about them, eg: ZIP Files) and is a variant of the<\/span><b> JAR (Java Archive) file format<\/b>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>All APKs are ZIP files at their core, <\/b><span style=\"font-weight: 400;\">but they must contain additional information to properly function as an APK. So all APKs are ZIPs, but not all ZIPs are APKs.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"1\"><b>Components:\u00a0<\/b><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>DEX files: <\/b><span style=\"font-weight: 400;\">Compiled code that&#8217;s essential for running the app\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Resources: E<\/b><span style=\"font-weight: 400;\">xternal elements like images, strings, and XML files\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Manifest file: <\/b><span style=\"font-weight: 400;\">Declares the app&#8217;s permissions, features, and requirements\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"1\"><b>Way to open an Android Package Kit file:<\/b><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Android: <\/b><span style=\"font-weight: 400;\">Apps can be downloaded either through the Google Play Store on Android phones or manually\u00a0<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><b>Manually:<\/b><span style=\"font-weight: 400;\"> User will have to first enable downloads from unknown sources in the Android OS settings and then download it like they would any other file and open it upon request<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>Windows 11 and macOS :<\/b><span style=\"font-weight: 400;\"> Users can manually i<\/span><b>nstall APK files using Windows Subsystem for Android<\/b><span style=\"font-weight: 400;\"> enabling users to download Android applications available on the Amazon Appstore.\u00a0<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\">An<\/span><b> Android emulator, like BlueStacks, <\/b><span style=\"font-weight: 400;\">can also be used to open APK files on a Windows OS.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><b>iOS Devices: <\/b><span style=\"font-weight: 400;\">APK files usually <\/span><b>\u00a0cannot be installed on iOS devices<\/b><span style=\"font-weight: 400;\"> but iPhone users by enabling a <\/span><b>hidden setting within iOS allows users to test beta or unreleased versions <\/b><span style=\"font-weight: 400;\">of apps from developers.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><b>Apple\u2019s Swift SDK <\/b><span style=\"font-weight: 400;\">also allows screen sharing (both in-app and in the background)<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/div>\n<div class=\"vc_table_green\"><\/p>\n<table style=\"width: 100.043%;\">\n<tbody>\n<tr>\n<td style=\"width: 130.811%; text-align: center; border-style: solid; border-color: #000000;\" colspan=\"2\"><span style=\"font-size: 18pt;\"><b>Must Read<\/b><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50.5357%; text-align: center; border-style: solid; border-color: #000000;\"><a href=\"https:\/\/pwonlyias.com\/stage\/editorial-analysis\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">UPSC Daily Editorials<\/span><\/a><\/td>\n<td style=\"width: 80.2753%; text-align: center; border-style: solid; border-color: #000000;\"><a href=\"https:\/\/pwonlyias.com\/stage\/daily-current-affairs\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">UPSC Daily Current Affairs<\/span><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50.5357%; text-align: center; border-style: solid; border-color: #000000;\"><a href=\"https:\/\/store.pw.live\/govt-entrance-exams\/upsc-books\/upsc-textbooks?utm_source=SEO&#038;utm_medium=PW+Live&#038;utm_campaign=UPSC+Textbooks\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Check Out UPSC NCERT Textbooks From PW Store<\/span><\/a><\/td>\n<td style=\"width: 80.2753%; text-align: center; border-style: solid; border-color: #000000;\"><a href=\"https:\/\/store.pw.live\/govt-entrance-exams\/upsc-books\/upsc-modules?utm_source=SEO&#038;utm_medium=PW+Live&#038;utm_campaign=UPSC+Modules\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Check Out UPSC Modules From PW Store<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50.5357%; text-align: center; border-style: solid; border-color: #000000;\"><a href=\"https:\/\/store.pw.live\/govt-entrance-exams\/upsc-books\/upsc-previous-year-papers?utm_source=SEO&#038;utm_medium=PW+Live&#038;utm_campaign=UPSC+Previous+Year+Papers\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Check Out Previous Years Papers From PW Store<\/span><\/a><\/td>\n<td style=\"width: 80.2753%; text-align: center; border-style: solid; border-color: #000000;\"><a href=\"https:\/\/pwonlyias.com\/stage\/upsc-test-series-courses\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">UPSC Test Series 2024<\/span><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50.5357%; text-align: center; border-style: solid; border-color: #000000;\"><a href=\"https:\/\/pwonlyias.com\/stage\/quiz\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Daily Current Affairs Quiz<\/span><\/a><\/td>\n<td style=\"width: 80.2753%; text-align: center; border-style: solid; border-color: #000000;\"><a href=\"https:\/\/pwonlyias.com\/stage\/mains-answer-writing\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Daily Main Answer Writing<\/span><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 130.811%; text-align: center; border-style: solid; border-color: #000000;\" colspan=\"2\"><a href=\"https:\/\/store.pw.live\/govt-entrance-exams\/upsc-books?utm_source=SEO&#038;utm_medium=PW+Live&#038;utm_campaign=UPSC+CSE+Books\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Check Out UPSC CSE Books From PW Store<\/span><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Malicious APKs (Android Package format) files are being used by cybercriminals by using social engineering methods as new means to scam users.<\/p>\n","protected":false},"author":38,"featured_media":141059,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"tags":[],"paper-wise":[2089],"subject":[],"acf":[],"_links":{"self":[{"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/current-affairs\/140993"}],"collection":[{"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/current-affairs"}],"about":[{"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/types\/current-affairs"}],"author":[{"embeddable":true,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/comments?post=140993"}],"version-history":[{"count":7,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/current-affairs\/140993\/revisions"}],"predecessor-version":[{"id":141340,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/current-affairs\/140993\/revisions\/141340"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/media\/141059"}],"wp:attachment":[{"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/media?parent=140993"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/tags?post=140993"},{"taxonomy":"paper-wise","embeddable":true,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/paper-wise?post=140993"},{"taxonomy":"subject","embeddable":true,"href":"https:\/\/pwonlyias.com\/stage\/wp-json\/wp\/v2\/subject?post=140993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}