{"id":3579,"date":"2023-05-17T11:06:07","date_gmt":"2023-05-17T05:36:07","guid":{"rendered":"https:\/\/www.leadindia.law\/blog\/en\/?p=3579"},"modified":"2023-05-17T11:06:08","modified_gmt":"2023-05-17T05:36:08","slug":"what-is-cyber-extortion","status":"publish","type":"post","link":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/","title":{"rendered":"What is cyber extortion?"},"content":{"rendered":"\n<p>Cyber extortion means blackmail which is an illegal practice conducted by a person who holds or not so important personal, professional or commercial data in his possession. The person who commits this blackmailing is called a cyber extortionist. This blackmailing is done in order to extort ransom from the owner of the data. The data can be of&nbsp; any type ranging from photos, videos, trade secrets, upcoming projects or information related to any private matter.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How is it committed?<\/h3>\n\n\n\n<p>Cybercriminals generally carry out cyber extortion\/ blackmail by either blocking or reporting access to the sufferer\u2019s computer or overloading its network by running or introducing a large amount of traffic and due to this problem or heavy traffic, victim will not be able to operate his business since the network usually fails to load because of ongoing traffic. The owner of the data incurs significant expenditure on its restoration, which is also a lengthy process that drains the finances of the person.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignfull has-media-on-the-right is-stacked-on-mobile has-background\" style=\"background-color:#cbcbcb\"><div class=\"wp-block-media-text__content\">\n<h3 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#000000\"><strong>Need A Legal Advice<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-center has-extra-small-font-size\">The internet is not a lawyer and neither are you. Talk to a real lawyer about your legal issue<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.leadindia.law\/talk-to-lawyer\" target=\"_blank\" rel=\"noreferrer noopener\">Talk to a Lawyer<\/a><\/div>\n<\/div>\n<\/div><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.leadindia.law\/talk-to-lawyer\"><img decoding=\"async\" width=\"400\" height=\"200\" data-src=\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/09\/talk-to-lawyer-black-logo.png\" alt=\"\" class=\"wp-image-1667 size-full lazyload\" data-srcset=\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/09\/talk-to-lawyer-black-logo.png 400w, https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/09\/talk-to-lawyer-black-logo-300x150.png 300w\" data-sizes=\"(max-width: 400px) 100vw, 400px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 400px; --smush-placeholder-aspect-ratio: 400\/200;\" \/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The ransom is usually paid in monetary terms else he will be coerced&nbsp; that crucial data will be leaked to the public. Moreover, in such cases, the victim cannot contact the right authorities as there will always be a risk of sharing the private and personal information. As a result, it can be understood that cyber extortion or blackmail is another way of cruelty, which hinders and violates the very principle of privacy.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Types<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Cyber Blackmail<\/strong><\/li>\n<\/ol>\n\n\n\n<p>The hacker tries to uncover personal and sensitive data via online entertainment to family members and companions until you pay a payoff through digital blackmail. The guilty party may have something undesirable or upsetting to send. In various situations, they might have obtained private communications, instant messaging, images, or recordings through illegal ways.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Database Ransom Attacks:<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Guilty parties recognize and seize data sets that utilise weak links and on the name of leaking of personal data and information the defaulting party blackmails the sufferer or victim and demands ransom for the same.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Effects<\/h3>\n\n\n\n<p>Some unwanted outcomes of cyber extortion can include data breaches, business losses,&nbsp; damage to one\u2019s reputation, loss of customers, and monetary losses.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In a data breach, attackers may threaten to leak stolen data unless the victim pays up. If the victim can\u2019t meet the demand, it risks losing confidential and personal data. If the breach contains sensitive data, the offender may face legal action as well as harsh penalties from regulatory agencies enforcing cyber-extortion laws.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Protection<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identity Access Management (IAM)\/Privileged Account Management (PAM)<\/li>\n\n\n\n<li>Network segmentation\/segregation<\/li>\n\n\n\n<li>Configuration management practices \u2013 hardened baseline configurations<\/li>\n\n\n\n<li>Service account management<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cyber extortion means blackmail which is an illegal practice conducted by a person who holds or not so important personal, professional or commercial data in his possession. The person who commits this blackmailing is called a cyber extortionist. This blackmailing is done in order to extort ransom from the owner of the data. The data &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/\"> <span class=\"screen-reader-text\">What is cyber extortion?<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":4,"featured_media":3580,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[117],"tags":[1520,469,1402,1515,1516,1517,1518,1519],"class_list":["post-3579","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-criminal-issues","tag-blackmail","tag-blackmailing","tag-cyber-crime","tag-cyber-extortion","tag-extortion","tag-leaking-data","tag-private-and-personal-information","tag-sensitive-information"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is cyber extortion?<\/title>\n<meta name=\"description\" content=\"What is cyber extortion? Cyber extortion means blackmail which is an illegal practice conducted by a person\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is cyber extortion?\" \/>\n<meta property=\"og:description\" content=\"What is cyber extortion? Cyber extortion means blackmail which is an illegal practice conducted by a person\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/\" \/>\n<meta property=\"og:site_name\" content=\"Lead India\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/leadindialaw\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-17T05:36:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-17T05:36:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2023\/05\/What-is-cyber-extortion.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lead India\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@leadindialaw\" \/>\n<meta name=\"twitter:site\" content=\"@leadindialaw\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lead India\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/\"},\"author\":{\"name\":\"Lead India\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/person\/e677a0c2c0a5f14215100a0ab535009a\"},\"headline\":\"What is cyber extortion?\",\"datePublished\":\"2023-05-17T05:36:07+00:00\",\"dateModified\":\"2023-05-17T05:36:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/\"},\"wordCount\":440,\"publisher\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2023\/05\/What-is-cyber-extortion.jpg\",\"keywords\":[\"blackmail\",\"blackmailing\",\"cyber crime\",\"cyber extortion\",\"extortion\",\"leaking data\",\"private and personal information\",\"sensitive information\"],\"articleSection\":[\"Criminal Issues\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/\",\"url\":\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/\",\"name\":\"What is cyber extortion?\",\"isPartOf\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2023\/05\/What-is-cyber-extortion.jpg\",\"datePublished\":\"2023-05-17T05:36:07+00:00\",\"dateModified\":\"2023-05-17T05:36:08+00:00\",\"description\":\"What is cyber extortion? Cyber extortion means blackmail which is an illegal practice conducted by a person\",\"breadcrumb\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#primaryimage\",\"url\":\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2023\/05\/What-is-cyber-extortion.jpg\",\"contentUrl\":\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2023\/05\/What-is-cyber-extortion.jpg\",\"width\":1000,\"height\":400,\"caption\":\"What is cyber extortion\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.leadindia.law\/blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is cyber extortion?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#website\",\"url\":\"https:\/\/www.leadindia.law\/blog\/en\/\",\"name\":\"Lead India\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.leadindia.law\/blog\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#organization\",\"name\":\"Lead India Law Pvt. Ltd.\",\"url\":\"https:\/\/www.leadindia.law\/blog\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/04\/lead-india-logo.png\",\"contentUrl\":\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/04\/lead-india-logo.png\",\"width\":300,\"height\":300,\"caption\":\"Lead India Law Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/leadindialaw\",\"https:\/\/x.com\/leadindialaw\",\"https:\/\/www.instagram.com\/leadindialawofficial\/\",\"https:\/\/www.youtube.com\/channel\/UCbYxT2L1qFapgEHyqmruzXg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/person\/e677a0c2c0a5f14215100a0ab535009a\",\"name\":\"Lead India\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5334341d20f01b4e05e38926491f808dfcf50ad532dfcdd18f672b63663dafe0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5334341d20f01b4e05e38926491f808dfcf50ad532dfcdd18f672b63663dafe0?s=96&d=mm&r=g\",\"caption\":\"Lead India\"},\"sameAs\":[\"https:\/\/www.leadindia.law\"],\"url\":\"https:\/\/www.leadindia.law\/blog\/en\/author\/lilanisha\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is cyber extortion?","description":"What is cyber extortion? Cyber extortion means blackmail which is an illegal practice conducted by a person","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/","og_locale":"en_US","og_type":"article","og_title":"What is cyber extortion?","og_description":"What is cyber extortion? Cyber extortion means blackmail which is an illegal practice conducted by a person","og_url":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/","og_site_name":"Lead India","article_publisher":"https:\/\/www.facebook.com\/leadindialaw","article_published_time":"2023-05-17T05:36:07+00:00","article_modified_time":"2023-05-17T05:36:08+00:00","og_image":[{"width":1000,"height":400,"url":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2023\/05\/What-is-cyber-extortion.jpg","type":"image\/jpeg"}],"author":"Lead India","twitter_card":"summary_large_image","twitter_creator":"@leadindialaw","twitter_site":"@leadindialaw","twitter_misc":{"Written by":"Lead India","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#article","isPartOf":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/"},"author":{"name":"Lead India","@id":"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/person\/e677a0c2c0a5f14215100a0ab535009a"},"headline":"What is cyber extortion?","datePublished":"2023-05-17T05:36:07+00:00","dateModified":"2023-05-17T05:36:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/"},"wordCount":440,"publisher":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2023\/05\/What-is-cyber-extortion.jpg","keywords":["blackmail","blackmailing","cyber crime","cyber extortion","extortion","leaking data","private and personal information","sensitive information"],"articleSection":["Criminal Issues"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/","url":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/","name":"What is cyber extortion?","isPartOf":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#primaryimage"},"image":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2023\/05\/What-is-cyber-extortion.jpg","datePublished":"2023-05-17T05:36:07+00:00","dateModified":"2023-05-17T05:36:08+00:00","description":"What is cyber extortion? Cyber extortion means blackmail which is an illegal practice conducted by a person","breadcrumb":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#primaryimage","url":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2023\/05\/What-is-cyber-extortion.jpg","contentUrl":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2023\/05\/What-is-cyber-extortion.jpg","width":1000,"height":400,"caption":"What is cyber extortion"},{"@type":"BreadcrumbList","@id":"https:\/\/www.leadindia.law\/blog\/en\/what-is-cyber-extortion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.leadindia.law\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"What is cyber extortion?"}]},{"@type":"WebSite","@id":"https:\/\/www.leadindia.law\/blog\/en\/#website","url":"https:\/\/www.leadindia.law\/blog\/en\/","name":"Lead India","description":"","publisher":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.leadindia.law\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.leadindia.law\/blog\/en\/#organization","name":"Lead India Law Pvt. Ltd.","url":"https:\/\/www.leadindia.law\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/04\/lead-india-logo.png","contentUrl":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/04\/lead-india-logo.png","width":300,"height":300,"caption":"Lead India Law Pvt. Ltd."},"image":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/leadindialaw","https:\/\/x.com\/leadindialaw","https:\/\/www.instagram.com\/leadindialawofficial\/","https:\/\/www.youtube.com\/channel\/UCbYxT2L1qFapgEHyqmruzXg"]},{"@type":"Person","@id":"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/person\/e677a0c2c0a5f14215100a0ab535009a","name":"Lead India","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5334341d20f01b4e05e38926491f808dfcf50ad532dfcdd18f672b63663dafe0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5334341d20f01b4e05e38926491f808dfcf50ad532dfcdd18f672b63663dafe0?s=96&d=mm&r=g","caption":"Lead India"},"sameAs":["https:\/\/www.leadindia.law"],"url":"https:\/\/www.leadindia.law\/blog\/en\/author\/lilanisha\/"}]}},"_links":{"self":[{"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/posts\/3579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/comments?post=3579"}],"version-history":[{"count":1,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/posts\/3579\/revisions"}],"predecessor-version":[{"id":3581,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/posts\/3579\/revisions\/3581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/media\/3580"}],"wp:attachment":[{"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/media?parent=3579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/categories?post=3579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/tags?post=3579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}