{"id":41385,"date":"2025-05-02T20:30:27","date_gmt":"2025-05-02T17:30:27","guid":{"rendered":"https:\/\/coinengineer.net\/blog\/?p=41385"},"modified":"2025-05-02T17:33:43","modified_gmt":"2025-05-02T14:33:43","slug":"north-korean-hacker-tried-to-infiltrate-kraken","status":"publish","type":"post","link":"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/","title":{"rendered":"North Korean Hacker Tried to Infiltrate Kraken Exchange!"},"content":{"rendered":"<p class=\"\" data-start=\"62\" data-end=\"360\">According to the company\u2019s <a href=\"https:\/\/blog.kraken.com\/news\/how-we-identified-a-north-korean-hacker\" target=\"_blank\" rel=\"noopener\">blog post<\/a>, a <strong data-start=\"102\" data-end=\"131\"><a href=\"https:\/\/coinengineer.net\/blog\/north-korean-hackers-target-crypto-devs\/\" target=\"_blank\" rel=\"noopener\">North Korea<\/a>-linked hacker<\/strong> recently attempted to infiltrate <strong data-start=\"165\" data-end=\"175\">Kraken<\/strong>\u2019s internal systems by applying for a job. However, Kraken\u2019s <strong data-start=\"236\" data-end=\"248\">security<\/strong> and <strong data-start=\"253\" data-end=\"274\">recruitment teams<\/strong> detected the attempt early and turned the process into an <strong data-start=\"333\" data-end=\"359\">intelligence operation<\/strong>.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_71 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/#From_Recruitment_to_Espionage_Detection_at_Kraken\" title=\"From Recruitment to Espionage Detection at Kraken\">From Recruitment to Espionage Detection at Kraken<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/#The_Hackers_Downfall\" title=\"The Hacker\u2019s Downfall\">The Hacker\u2019s Downfall<\/a><\/li><\/ul><\/nav><\/div>\n<h3 class=\"\" data-start=\"362\" data-end=\"415\"><span class=\"ez-toc-section\" id=\"From_Recruitment_to_Espionage_Detection_at_Kraken\"><\/span>From Recruitment to Espionage Detection at Kraken<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"\" data-start=\"417\" data-end=\"832\">The incident began with a seemingly routine application for an <strong data-start=\"480\" data-end=\"504\">engineering position<\/strong>. But the candidate\u2019s behavior quickly raised red flags. In the <strong data-start=\"568\" data-end=\"587\">first interview<\/strong>, the applicant joined under a different name than the one listed on their <strong data-start=\"662\" data-end=\"672\">resume<\/strong>, then quickly changed it. Additionally, they occasionally used different voice tones, suggesting they were being <strong data-start=\"786\" data-end=\"810\">coached in real time<\/strong> during the interview.<\/p>\n<p class=\"\" data-start=\"834\" data-end=\"1170\">Kraken had already received <strong data-start=\"862\" data-end=\"897\">warnings from industry partners<\/strong> that <strong data-start=\"903\" data-end=\"933\">North Korean hacker groups<\/strong> were actively applying for jobs at crypto companies. When one of the email addresses used by the applicant <strong data-start=\"1041\" data-end=\"1073\">matched a suspicious address<\/strong> from these warnings, Kraken\u2019s <strong data-start=\"1104\" data-end=\"1116\">Red Team<\/strong> (penetration testing unit) launched an investigation.<\/p>\n<p><iframe loading=\"lazy\" title=\"We Caught a North Korean Hacker Applying to Kraken!\" width=\"1020\" height=\"574\" src=\"https:\/\/www.youtube.com\/embed\/2vXHlnjKbBI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p class=\"\" data-start=\"1172\" data-end=\"1528\">Using <strong data-start=\"1178\" data-end=\"1214\">Open-Source Intelligence (OSINT)<\/strong> methods, Kraken\u2019s team researched the applicant. They found that the <strong data-start=\"1284\" data-end=\"1301\">email address<\/strong> had been leaked in a past <strong data-start=\"1328\" data-end=\"1343\">data breach<\/strong> and was linked to <strong data-start=\"1362\" data-end=\"1390\">multiple fake identities<\/strong>. Some of these identities had even been <strong data-start=\"1431\" data-end=\"1455\">hired by other firms<\/strong>, and one of them belonged to a <strong data-start=\"1487\" data-end=\"1527\">foreign agent listed under sanctions<\/strong>.<\/p>\n<p class=\"\" data-start=\"1530\" data-end=\"1863\">The candidate was also hiding their location using a <strong data-start=\"1583\" data-end=\"1590\">VPN<\/strong> and accessing <strong data-start=\"1605\" data-end=\"1628\">remote Mac desktops<\/strong>. The <strong data-start=\"1634\" data-end=\"1652\">GitHub profile<\/strong> listed on their resume was tied to a previously exposed email. The <strong data-start=\"1720\" data-end=\"1747\">identification document<\/strong> provided appeared to be fake and likely created using <strong data-start=\"1802\" data-end=\"1824\">information stolen<\/strong> during a <strong data-start=\"1834\" data-end=\"1857\">2019 identity theft<\/strong> case.<\/p>\n<h3 class=\"\" data-start=\"1865\" data-end=\"1890\"><span class=\"ez-toc-section\" id=\"The_Hackers_Downfall\"><\/span>The Hacker\u2019s Downfall<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p class=\"\" data-start=\"1892\" data-end=\"2263\">Rather than cutting off contact, Kraken advanced the applicant through the <strong data-start=\"1967\" data-end=\"1985\">hiring process<\/strong> \u2014 not to hire them, but to study their <strong data-start=\"2025\" data-end=\"2036\">tactics<\/strong>. The candidate was subjected to several <strong data-start=\"2077\" data-end=\"2106\">cybersecurity assessments<\/strong> and <strong data-start=\"2111\" data-end=\"2142\">identity verification tasks<\/strong>. The final round? A \u201ccasual\u201d interview with <strong data-start=\"2187\" data-end=\"2239\">Kraken Chief Security Officer (CSO) Nick Percoco<\/strong> and other team members.<\/p>\n<p class=\"\" data-start=\"2265\" data-end=\"2716\">During this meeting, the applicant faced <strong data-start=\"2306\" data-end=\"2342\">real-time verification questions<\/strong>: confirming their <strong data-start=\"2361\" data-end=\"2373\">location<\/strong>, showing a <strong data-start=\"2385\" data-end=\"2409\">government-issued ID<\/strong>, and even recommending some <strong data-start=\"2438\" data-end=\"2459\">local restaurants<\/strong> in the city they claimed to live in. The hacker became visibly <strong data-start=\"2523\" data-end=\"2548\">nervous and flustered<\/strong>, unable to answer the basic questions. It was now clear: this was not a legitimate job seeker, but a <strong data-start=\"2650\" data-end=\"2678\">state-sponsored attacker<\/strong> attempting to infiltrate the company.<\/p>\n<p class=\"\" data-start=\"2718\" data-end=\"2769\">Kraken CSO <strong data-start=\"2729\" data-end=\"2745\">Nick Percoco<\/strong> commented on the event:<\/p>\n<blockquote data-start=\"2771\" data-end=\"3040\">\n<p class=\"\" data-start=\"2773\" data-end=\"3040\"><strong data-start=\"2774\" data-end=\"2798\">Don\u2019t trust, verify.<\/strong> That\u2019s a core principle of the crypto world and even more critical in the digital age. <strong data-start=\"2886\" data-end=\"2913\">State-sponsored attacks<\/strong> aren\u2019t just an American issue \u2014 they\u2019re a <strong data-start=\"2956\" data-end=\"2973\">global threat<\/strong>. Any person or business managing value is a <strong data-start=\"3018\" data-end=\"3038\">potential target<\/strong>.<\/p>\n<\/blockquote>\n<p class=\"\" data-start=\"2904\" data-end=\"3110\"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don\u2019t forget to follow us on our\u00a0<a href=\"https:\/\/t.me\/coinengineernews\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>Telegram,\u00a0<\/strong><\/a><a href=\"https:\/\/www.youtube.com\/@CoinEngineer\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>YouTube<\/strong><\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/coinengineers\" target=\"_blank\" rel=\"nofollow noopener\"><strong>Twitter<\/strong><\/a>\u00a0channels for the latest\u00a0<a title=\"News\" href=\"https:\/\/coinengineer.net\/blog\/news\/\" data-internallinksmanager029f6b8e52c=\"7\">news<\/a> and updates<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the company\u2019s blog post, a North Korea-linked hacker recently attempted to infiltrate Kraken\u2019s internal systems by applying for a job. However, Kraken\u2019s security and recruitment teams detected the attempt early and turned the process into an intelligence operation. From Recruitment to Espionage Detection at Kraken The incident began with a seemingly routine application<\/p>\n","protected":false},"author":1,"featured_media":41387,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,2],"tags":[1201,2656,1564,9623,971],"class_list":["post-41385","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crypto-news","category-news","tag-hack","tag-hacker","tag-kraken","tag-north-korea","tag-scam"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>North Korean Hacker Tried to Infiltrate Kraken Exchange! - Coin Engineer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"North Korean Hacker Tried to Infiltrate Kraken Exchange! - Coin Engineer\" \/>\n<meta property=\"og:description\" content=\"According to the company\u2019s blog post, a North Korea-linked hacker recently attempted to infiltrate Kraken\u2019s internal systems by applying for a job. However, Kraken\u2019s security and recruitment teams detected the attempt early and turned the process into an intelligence operation. From Recruitment to Espionage Detection at Kraken The incident began with a seemingly routine application\" \/>\n<meta property=\"og:url\" content=\"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/\" \/>\n<meta property=\"og:site_name\" content=\"Coin Engineer\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-02T17:30:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-02T14:33:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2025\/05\/Coinmukendisi-14-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/\",\"url\":\"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/\",\"name\":\"North Korean Hacker Tried to Infiltrate Kraken Exchange! - Coin Engineer\",\"isPartOf\":{\"@id\":\"https:\/\/coinengineer.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2025\/05\/Coinmukendisi-14.png\",\"datePublished\":\"2025-05-02T17:30:27+00:00\",\"dateModified\":\"2025-05-02T14:33:43+00:00\",\"author\":{\"@id\":\"https:\/\/coinengineer.net\/blog\/#\/schema\/person\/70674da64ef7457ff399f5f51be296e2\"},\"breadcrumb\":{\"@id\":\"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/#primaryimage\",\"url\":\"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2025\/05\/Coinmukendisi-14.png\",\"contentUrl\":\"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2025\/05\/Coinmukendisi-14.png\",\"width\":1920,\"height\":1080,\"caption\":\"Aerodrome Finance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/coinengineer.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"North Korean Hacker Tried to Infiltrate Kraken Exchange!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/coinengineer.net\/blog\/#website\",\"url\":\"https:\/\/coinengineer.net\/blog\/\",\"name\":\"Coin Engineer\",\"description\":\"Btc, Coins, Pre-Sale, DeFi, NFT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/coinengineer.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/coinengineer.net\/blog\/#\/schema\/person\/70674da64ef7457ff399f5f51be296e2\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/coinengineer.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/47d8a8204de9104b7e21c9124ecff87e02940cf67e2cf7122f4a02f1445ae66b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/47d8a8204de9104b7e21c9124ecff87e02940cf67e2cf7122f4a02f1445ae66b?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/coinengineer.net\/\"],\"url\":\"https:\/\/coinengineer.net\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"North Korean Hacker Tried to Infiltrate Kraken Exchange! - Coin Engineer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/","og_locale":"en_US","og_type":"article","og_title":"North Korean Hacker Tried to Infiltrate Kraken Exchange! - Coin Engineer","og_description":"According to the company\u2019s blog post, a North Korea-linked hacker recently attempted to infiltrate Kraken\u2019s internal systems by applying for a job. However, Kraken\u2019s security and recruitment teams detected the attempt early and turned the process into an intelligence operation. From Recruitment to Espionage Detection at Kraken The incident began with a seemingly routine application","og_url":"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/","og_site_name":"Coin Engineer","article_published_time":"2025-05-02T17:30:27+00:00","article_modified_time":"2025-05-02T14:33:43+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2025\/05\/Coinmukendisi-14-1024x576.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/","url":"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/","name":"North Korean Hacker Tried to Infiltrate Kraken Exchange! - Coin Engineer","isPartOf":{"@id":"https:\/\/coinengineer.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/#primaryimage"},"image":{"@id":"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/#primaryimage"},"thumbnailUrl":"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2025\/05\/Coinmukendisi-14.png","datePublished":"2025-05-02T17:30:27+00:00","dateModified":"2025-05-02T14:33:43+00:00","author":{"@id":"https:\/\/coinengineer.net\/blog\/#\/schema\/person\/70674da64ef7457ff399f5f51be296e2"},"breadcrumb":{"@id":"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/#primaryimage","url":"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2025\/05\/Coinmukendisi-14.png","contentUrl":"https:\/\/coinengineer.net\/blog\/wp-content\/uploads\/2025\/05\/Coinmukendisi-14.png","width":1920,"height":1080,"caption":"Aerodrome Finance"},{"@type":"BreadcrumbList","@id":"https:\/\/coinengineer.net\/blog\/north-korean-hacker-tried-to-infiltrate-kraken\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/coinengineer.net\/blog\/"},{"@type":"ListItem","position":2,"name":"North Korean Hacker Tried to Infiltrate Kraken Exchange!"}]},{"@type":"WebSite","@id":"https:\/\/coinengineer.net\/blog\/#website","url":"https:\/\/coinengineer.net\/blog\/","name":"Coin Engineer","description":"Btc, Coins, Pre-Sale, DeFi, NFT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/coinengineer.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/coinengineer.net\/blog\/#\/schema\/person\/70674da64ef7457ff399f5f51be296e2","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/coinengineer.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47d8a8204de9104b7e21c9124ecff87e02940cf67e2cf7122f4a02f1445ae66b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47d8a8204de9104b7e21c9124ecff87e02940cf67e2cf7122f4a02f1445ae66b?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/coinengineer.net\/"],"url":"https:\/\/coinengineer.net\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/posts\/41385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/comments?post=41385"}],"version-history":[{"count":1,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/posts\/41385\/revisions"}],"predecessor-version":[{"id":41388,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/posts\/41385\/revisions\/41388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/media\/41387"}],"wp:attachment":[{"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/media?parent=41385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/categories?post=41385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinengineer.net\/blog\/wp-json\/wp\/v2\/tags?post=41385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}