{"id":3377,"date":"2019-05-07T12:26:45","date_gmt":"2019-05-07T12:26:45","guid":{"rendered":"https:\/\/clickceasebiz.com\/blog\/?p=3377"},"modified":"2023-01-30T12:25:26","modified_gmt":"2023-01-30T12:25:26","slug":"what-is-click-fraud-malware","status":"publish","type":"post","link":"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/","title":{"rendered":"What is Click Fraud Malware"},"content":{"rendered":"<h2>You might be aware that click fraud is a growing problem that affects anyone running a PPC campaign. But what is click fraud malware, and should you be worried about it?<\/h2>\n<p>If you\u2019re reading this article, you might have stumbled upon it while researching common types of malware or <a href=\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud\/\">click fraud<\/a>. To get you up to speed quickly, click fraud is a practice where someone, or something, clicks on your PPC ad campaigns with the intention of diverting your advertising budget.<\/p>\n<p>Malware, as you might be aware, is dodgy software that manages to install itself on your computer, often with the intention of spreading a virus or being a portal for command and control (c&amp;c) attacks.<\/p>\n<p>So what is click fraud malware? Well, it\u2019s exactly what it sounds like. A Software that installs itself on your computer with the intention of using your machine to carry out click fraud.\u00a0<\/p>\n<p><iframe title=\"What is Click Fraud? | ClickCease Academy\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/Iw31cEBi72c?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<h2>The basics of click fraud malware<\/h2>\n<p>First things first, what is a trojan? You might have heard the story about the Greek soldiers who infiltrated the city of Troy by hiding in a wooden horse, given as a present to the Trojans. Once they were safely in the city, the soldiers jumped out and massacred the citizens, ending a ten-year war. Hence the phrase, beware of Greeks bearing gifts, although these days, they\u2019re more likely to be bringing some really nice olives or a bottle of raki.<\/p>\n<p>A trojan is a type of virus, normally designed to look like something interesting, that installs itself on your computer. Once installed, it can then perform an automated action or be used remotely to carry out more malicious attacks. Command and control (c&amp;c) attacks are where malware software can be accessed by a remote computer to carry out specific actions such as stealing information or running actions such as clicking on ads. These <a href=\"https:\/\/www.clickcease.com\/blog\/botnets-what-are-they-and-should-i-be-worried\/\">automated bots<\/a> can be coordinated into a network and used to devastating effect.<\/p>\n<p>Miuref and trojan.kovter are two versions of click fraud software that have been around for a few years now and are still widespread.<\/p>\n<p>One of the most famous cases of these trojans being used was as part of the 3ve botnet, which was shut down in November 2018. Miuref and kovter trojans were used to access around 1.7 million computers worldwide and falsify clicks on PPC campaigns to the tune of $29 million.<\/p>\n<h2>Click fraud malware in 2019<\/h2>\n<p>Although the 3ve botnet attacks are some of the most high profile PPC software malware that has been discovered, the technology has been growing hugely in recent years.<\/p>\n<p>Google\u2019s online app store has been discovered to be harbouring 8 apps, as of early 2019, that have been downloaded over 2 billion times. These apps are thought to have been responsible for millions of dollars worth of click fraud and have managed to bypass Google\u2019s Play Protect monitoring system.<\/p>\n<p>In 2018, Google noted the return of the Chamois family of malware apps. These were previously thought to have been completely eliminated in 2017, but were found to have been downloaded over 200 million times in 2018. Chamois based apps are capable of stealing information, and performing both click fraud and SMS fraud.<\/p>\n<p>Another Google based malware app is <a href=\"https:\/\/www.clickcease.com\/blog\/ad-fraud-hall-of-fame-drainerbot\/\">DrainerBot<\/a>, which is thought to have been picked up over 10 million times. Nicknamed due to its capacity for devouring huge amounts of data, DrainerBot is used by fraudsters to hijack devices to watch videos. So along with advertisers losing their advertising spend, DrainerBot also racks up huge bills for users who are most likely unaware that the app is running.<\/p>\n<h2>iOS Malware<\/h2>\n<p>With all this Google Play Store malware, Apple users might be feeling a bit smug, but hold on\u2026 Although the App store is more tightly monitored and controlled than Google, there have been some well known breaches in recent years.<\/p>\n<p>XCodeGhost was found to have infiltrated a number of popular apps in China, including WeChat, China\u2019s version of Whatsapp. Apple phones were also found to have been breached by the Exodus spyware which, although it isn\u2019t click fraud malware, has exposed the fact that Apple devices are open to malware attacks.<\/p>\n<h2>How does malware get on your device<\/h2>\n<p>The classic delivery for malware is as an attachment in an email, sometimes a word document or pdf, or an executable file. However, as more and more people have got wise to spam and dodgy attachments, so the malware distributors have had to find new ways to get you to download them.<\/p>\n<p>In 2019, these are some of the main ways that click fraud malware can get on your PC, Mac or mobile device.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">Cracked or free software from unverified sources<\/li>\n<li style=\"font-weight: 400;\">Through pop up adverts or landing pages, often saying \u2018you\u2019ve won\u2019, or by offering \u2018adult services\u2019<\/li>\n<li style=\"font-weight: 400;\">By downloading codecs to watch free films<\/li>\n<li style=\"font-weight: 400;\">By streaming films or videos on suspicious sites<\/li>\n<li style=\"font-weight: 400;\">Through suspicious apps, or apps with lots of advertising embedded in them<\/li>\n<li style=\"font-weight: 400;\">Or, sometimes through verified apps too!<\/li>\n<\/ul>\n<p>In short, malware normally comes from user actions which can be a result of carelessness, such as accidentally clicking an ad, or by seeking out software that seems too good to be true. Basically, aim to pay for your software and download it from a verified and trusted source.<\/p>\n<h2>Whos behind malware?<\/h2>\n<p>Although the image of coders and hackers is of some nerdy guy in his basement writing viruses to annoy people, the truth can be a little bit shadier. With a lot of money available to enterprising hackers, malware is increasingly built and run by criminal gangs. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Methbot\">Methbot<\/a> is one of the most famous ad fraud networks, estimated to be making around $3 million a day for Russian gangs.<\/p>\n<p>By building PPC software malware, these gangs get to expand their reach and stay ahead of any attempts to shut them down. After all, if you\u2019re making $3 million a day, you can afford to pay a few hackers to come up with some new malware software.<\/p>\n<p>Some supposedly \u2018legitimate businesses\u2019 have been found to have been behind click fraud malware too. In fact, criminals were found to have set up 28 fake ad agencies in 2017 and then used them to buy around 1 billion fake ad views.<\/p>\n<h2>How to protect yourself from malware<\/h2>\n<p>The best way to avoid click fraud malware is by being cautious about what you download. Only ever download attachments from trusted sources, and avoid clicking on dodgy pop up adverts. As well as being vigilant and not clicking on ads or suspicious attachments, these steps will help you avoid downloading malware.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">Keep your security software up to date<\/li>\n<li style=\"font-weight: 400;\">Use a firewall on your laptop or PC<\/li>\n<li style=\"font-weight: 400;\">Use complex passwords with mixtures of letters, characters and numbers and try to avoid using the same password for everything<\/li>\n<li style=\"font-weight: 400;\">Disable autoplay for downloads on your computer<\/li>\n<li style=\"font-weight: 400;\">Turn off or remove unnecessary software on your mobile or home devices<\/li>\n<li style=\"font-weight: 400;\">Turn off Bluetooth when not being used<\/li>\n<li style=\"font-weight: 400;\">Avoid suspicious sites that offer premium software or films for free, or ask you to exchange their codec or plugin<\/li>\n<li style=\"font-weight: 400;\">Choose the paid versions of apps, and avoid downloading imitation versions of popular apps<\/li>\n<\/ul>\n<h2>Advertiser worried about fraudulent malware clicks?<\/h2>\n<p>Click fraud malware is devastating for victims. It\u2019s also harmful for advertisers that lose control of their campaigns and have their entire ad budget spent up by fraudsters. If you\u2019re concerned about fraudulent clicks from click fraud malware, use <a href=\"https:\/\/www.clickcease.com\/\">ClickCease<\/a>.<\/p>\n<p>Our algorithms and smart software can protect advertisers just like you from infected computers. Even better is that we can protect your campaigns from suspicious computers that may be subject to malware. When talking about your ad budget, there\u2019s no reason not to do everything in your power to protect it.<\/p>\n\n\n\n\n\n\n<pre class=\"wp-block-code\"><code><\/code><\/pre>\n\n\n\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>You might be aware that click fraud is a growing problem that affects anyone running a PPC campaign. But what is click fraud malware, and should you be worried about it? If you\u2019re reading this article, you might have stumbled upon it while researching common types of malware or click fraud. To get you up [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3380,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[5],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Click Fraud Malware | ClickCease Blog<\/title>\n<meta name=\"description\" content=\"What is click fraud malware? That is exactly what it sounds like. A Software that installs itself on your computer with the intention of using your machine to carry out click fraud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Click Fraud Malware | ClickCease Blog\" \/>\n<meta property=\"og:description\" content=\"What is click fraud malware? That is exactly what it sounds like. A Software that installs itself on your computer with the intention of using your machine to carry out click fraud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"ClickCease Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ClickCease-484865984976254\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-07T12:26:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-30T12:25:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2019\/05\/png_transp.png\" \/>\n\t<meta property=\"og:image:width\" content=\"5000\" \/>\n\t<meta property=\"og:image:height\" content=\"5000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ilan Missulawin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@clickcease\" \/>\n<meta name=\"twitter:site\" content=\"@clickcease\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ilan Missulawin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/\"},\"author\":{\"name\":\"Ilan Missulawin\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/6647e32cbd954072ddaf6fd799a3fcaf\"},\"headline\":\"What is Click Fraud Malware\",\"datePublished\":\"2019-05-07T12:26:45+00:00\",\"dateModified\":\"2023-01-30T12:25:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/\"},\"wordCount\":1302,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/#organization\"},\"articleSection\":[\"Click Fraud\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/\",\"url\":\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/\",\"name\":\"What is Click Fraud Malware | ClickCease Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/#website\"},\"datePublished\":\"2019-05-07T12:26:45+00:00\",\"dateModified\":\"2023-01-30T12:25:26+00:00\",\"description\":\"What is click fraud malware? That is exactly what it sounds like. A Software that installs itself on your computer with the intention of using your machine to carry out click fraud.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.clickcease.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Click Fraud Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#website\",\"url\":\"https:\/\/www.clickcease.com\/blog\/\",\"name\":\"ClickCease Blog\",\"description\":\"How to protect your ppc campaigns from click fraud.\",\"publisher\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.clickcease.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#organization\",\"name\":\"ClickCease\",\"url\":\"https:\/\/www.clickcease.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/clickceaseblog.kinsta.cloud\/wp-content\/uploads\/2019\/02\/cc-logo-black.png\",\"contentUrl\":\"https:\/\/clickceaseblog.kinsta.cloud\/wp-content\/uploads\/2019\/02\/cc-logo-black.png\",\"width\":300,\"height\":70,\"caption\":\"ClickCease\"},\"image\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ClickCease-484865984976254\/\",\"https:\/\/twitter.com\/clickcease\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/6647e32cbd954072ddaf6fd799a3fcaf\",\"name\":\"Ilan Missulawin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1fd0d7b14a3b9f366e7238644fce5d6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1fd0d7b14a3b9f366e7238644fce5d6e?s=96&d=mm&r=g\",\"caption\":\"Ilan Missulawin\"},\"description\":\"Ilan is a co-founder and the CMO of ClickCease since 2015. When he isn't dreaming about click fraud you can find him writing about it. Two of his favorite things in life are: Peppa Pig and writing about himself in third person.\",\"url\":\"https:\/\/www.clickcease.com\/blog\/author\/ilan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Click Fraud Malware | ClickCease Blog","description":"What is click fraud malware? That is exactly what it sounds like. A Software that installs itself on your computer with the intention of using your machine to carry out click fraud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/","og_locale":"en_US","og_type":"article","og_title":"What is Click Fraud Malware | ClickCease Blog","og_description":"What is click fraud malware? That is exactly what it sounds like. A Software that installs itself on your computer with the intention of using your machine to carry out click fraud.","og_url":"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/","og_site_name":"ClickCease Blog","article_publisher":"https:\/\/www.facebook.com\/ClickCease-484865984976254\/","article_published_time":"2019-05-07T12:26:45+00:00","article_modified_time":"2023-01-30T12:25:26+00:00","og_image":[{"width":5000,"height":5000,"url":"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2019\/05\/png_transp.png","type":"image\/png"}],"author":"Ilan Missulawin","twitter_card":"summary_large_image","twitter_creator":"@clickcease","twitter_site":"@clickcease","twitter_misc":{"Written by":"Ilan Missulawin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/#article","isPartOf":{"@id":"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/"},"author":{"name":"Ilan Missulawin","@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/6647e32cbd954072ddaf6fd799a3fcaf"},"headline":"What is Click Fraud Malware","datePublished":"2019-05-07T12:26:45+00:00","dateModified":"2023-01-30T12:25:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/"},"wordCount":1302,"commentCount":0,"publisher":{"@id":"https:\/\/www.clickcease.com\/blog\/#organization"},"articleSection":["Click Fraud"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/","url":"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/","name":"What is Click Fraud Malware | ClickCease Blog","isPartOf":{"@id":"https:\/\/www.clickcease.com\/blog\/#website"},"datePublished":"2019-05-07T12:26:45+00:00","dateModified":"2023-01-30T12:25:26+00:00","description":"What is click fraud malware? That is exactly what it sounds like. A Software that installs itself on your computer with the intention of using your machine to carry out click fraud.","breadcrumb":{"@id":"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.clickcease.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Click Fraud Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.clickcease.com\/blog\/#website","url":"https:\/\/www.clickcease.com\/blog\/","name":"ClickCease Blog","description":"How to protect your ppc campaigns from click fraud.","publisher":{"@id":"https:\/\/www.clickcease.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.clickcease.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.clickcease.com\/blog\/#organization","name":"ClickCease","url":"https:\/\/www.clickcease.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/clickceaseblog.kinsta.cloud\/wp-content\/uploads\/2019\/02\/cc-logo-black.png","contentUrl":"https:\/\/clickceaseblog.kinsta.cloud\/wp-content\/uploads\/2019\/02\/cc-logo-black.png","width":300,"height":70,"caption":"ClickCease"},"image":{"@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ClickCease-484865984976254\/","https:\/\/twitter.com\/clickcease"]},{"@type":"Person","@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/6647e32cbd954072ddaf6fd799a3fcaf","name":"Ilan Missulawin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1fd0d7b14a3b9f366e7238644fce5d6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1fd0d7b14a3b9f366e7238644fce5d6e?s=96&d=mm&r=g","caption":"Ilan Missulawin"},"description":"Ilan is a co-founder and the CMO of ClickCease since 2015. When he isn't dreaming about click fraud you can find him writing about it. Two of his favorite things in life are: Peppa Pig and writing about himself in third person.","url":"https:\/\/www.clickcease.com\/blog\/author\/ilan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/posts\/3377"}],"collection":[{"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/comments?post=3377"}],"version-history":[{"count":17,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/posts\/3377\/revisions"}],"predecessor-version":[{"id":8113,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/posts\/3377\/revisions\/8113"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/media\/3380"}],"wp:attachment":[{"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/media?parent=3377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/categories?post=3377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/tags?post=3377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}