{"id":86577,"date":"2026-04-21T10:55:14","date_gmt":"2026-04-21T08:55:14","guid":{"rendered":"https:\/\/gulftech-news.com\/en\/?p=86577"},"modified":"2026-04-21T10:55:15","modified_gmt":"2026-04-21T08:55:15","slug":"group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud","status":"publish","type":"post","link":"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/","title":{"rendered":"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud"},"content":{"rendered":"\n<p><strong><a href=\"https:\/\/www.group-ib.com\/\">Group-IB<\/a><\/strong>, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, has released a new report exposing a sophisticated evolution in digital fraud: the rise of\u00a0Cloud Phones.<\/p>\n\n\n\n<p>The report traces the evolution of these remote-access Android devices from simple social media bots to a primary tool for creating untraceable &#8220;dropper&#8221; accounts for scams. These are false accounts created by fraudsters based on stolen credentials, specifically targeted to receive and transfer stolen funds.<\/p>\n\n\n\n<p> Once used primarily for harmless social media &#8220;likes,&#8221; this technology has now been weaponized into an industrial-scale financial threat that bypasses traditional bank security systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The &#8220;Invisible&#8221; Upgrade to Modern Fraud<\/strong><\/h2>\n\n\n\n<p>For years, banks have successfully blocked &#8220;emulators&#8221; &#8211; software that tries to mimic a phone on a computer. However, criminals have pivoted to&nbsp;Cloud Phones. These are physical mobile phone motherboards stored in data centers and rented out for as little as&nbsp;$0.10 per hour.<\/p>\n\n\n\n<p>Because these devices use genuine hardware, real serial numbers, and legitimate Android software, they appear &#8220;invisible&#8221;, bypassing traditional fraud detection. To a bank\u2019s security system, a hacker in a different country using a cloud phone looks exactly like a legitimate customer using a standard smartphone.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The research highlights several key discoveries:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Industrial Scale:<\/strong>\u00a0Cloud phone farms, vast networks of physical mobile devices housed in data centers, are facilitating the mass creation of dropper accounts, which are the critical final link in many Authorized Push Payment (APP) scams.<\/li>\n\n\n\n<li><strong>Invisibility<\/strong>:\u00a0By preserving consistent device telemetry, these accounts do not trigger the device-change detection mechanisms that banks rely on to flag account takeovers.<\/li>\n\n\n\n<li><strong>Accessibility:<\/strong>\u00a0It&#8217;s no longer just for experts.\u00a0Platforms like Redfinger, GeeLark, and LDCloud have democratized fraud, making sophisticated infrastructure available with minimal investment.<\/li>\n<\/ul>\n\n\n\n<p><strong>A New Business Model for Crime<\/strong><\/p>\n\n\n\n<p>Fraudsters are now selling these cloud phones pre-loaded with fully verified banking and virtual wallet accounts on darknet markets for as little as $50, creating a turnkey solution for money laundering.<\/p>\n\n\n\n<p>A buyer gets access to a pre-verified bank account that is already logged into a specific Cloud Phone. Because the account and the phone are sold together, the bank never sees a &#8220;new device&#8221; login.<\/p>\n\n\n\n<p>This highlights a dangerous shift in the &#8220;money mule&#8221; economy. APP fraud continues to lead industry losses. According to the UK Finance Annual Fraud Report 2023, APP fraud losses reached \u00a3485.2 million in 2023, with the dropper account fraud identified as the single most contributing incident of all. The problem continues to grow and spread in other regions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The New Rules of Detection<\/strong><\/h2>\n\n\n\n<p>For financial institutions, fraud detection must move beyond static device authenticity checks to multi-layered intelligence. These include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Device-Environment Correlation:<\/strong>\u00a0Identifying anomalies such as a device&#8217;s battery level always being at 100% or showing no motion during use.<\/li>\n\n\n\n<li><strong>Behavioral &amp; App Analysis:<\/strong>\u00a0Flagging devices with an unusually high number of financial apps, the presence of anonymization tools like VPNs, or a suspicious lack of standard, pre-installed applications.<\/li>\n\n\n\n<li><strong>Graph-Based Analytics:<\/strong>\u00a0Moving beyond single-device evaluation to identify clusters of accounts linked by shared infrastructure patterns.<\/li>\n<\/ul>\n\n\n\n<p>Financial institutions are urged to adopt multi-layer intelligence platforms that combine device fingerprinting with network intelligence and behavioral modeling. Group-IB\u2019s Fraud Protection platform has already begun deploying new detection rules to identify these remote environments, resulting in a drastic decrease in fraudulent logins for early adopters.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Staying Safe: Recommendations for End-Users<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Never complete account verification processes under third-party instruction. Keep in mind that banks and government institutions will not ask customers to authenticate accounts through unfamiliar apps or remote environments.<\/li>\n\n\n\n<li>Enable device-based security features. Use official mobile banking apps, biometric authentication, and strong device-level security settings.<\/li>\n\n\n\n<li>Be cautious of \u201ceasy income\u201d schemes involving bank accounts, such as fake job offers requiring you to \u201cverify\u201d bank accounts, government officials requesting account verification, or bank representatives asking you to move money to \u201csafe\u201d accounts.<\/li>\n\n\n\n<li>If you suspect that you have been targeted, contact your bank immediately. Update passwords and enable multi-factor authentication on all accounts.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, has released a new report exposing a sophisticated evolution in digital fraud: the rise of\u00a0Cloud Phones. The report traces the evolution of these remote-access Android devices from simple social media bots to a primary tool for creating untraceable &#8220;dropper&#8221; accounts for &hellip;<\/p>\n","protected":false},"author":2,"featured_media":86578,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-86577","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud - Gulf Tech News<\/title>\n<meta name=\"description\" content=\"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud - Gulf Tech News\" \/>\n<meta property=\"og:description\" content=\"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/\" \/>\n<meta property=\"og:site_name\" content=\"Gulf Tech News\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-21T08:55:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-21T08:55:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2026\/04\/\u062c\u0631\u0648\u0628-\u0622\u064a-\u0628\u064a_\u0627\u0644\u0647\u0648\u0627\u062a\u0641-\u0627\u0644\u0633\u062d\u0627\u0628\u064a\u0629-1024x605.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"605\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"bessan helmi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"bessan helmi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/\",\"url\":\"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/\",\"name\":\"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud - Gulf Tech News\",\"isPartOf\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2026\/04\/\u062c\u0631\u0648\u0628-\u0622\u064a-\u0628\u064a_\u0627\u0644\u0647\u0648\u0627\u062a\u0641-\u0627\u0644\u0633\u062d\u0627\u0628\u064a\u0629.png?v=1776761695\",\"datePublished\":\"2026-04-21T08:55:14+00:00\",\"dateModified\":\"2026-04-21T08:55:15+00:00\",\"author\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\"},\"description\":\"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud\",\"breadcrumb\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/#primaryimage\",\"url\":\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2026\/04\/\u062c\u0631\u0648\u0628-\u0622\u064a-\u0628\u064a_\u0627\u0644\u0647\u0648\u0627\u062a\u0641-\u0627\u0644\u0633\u062d\u0627\u0628\u064a\u0629.png?v=1776761695\",\"contentUrl\":\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2026\/04\/\u062c\u0631\u0648\u0628-\u0622\u064a-\u0628\u064a_\u0627\u0644\u0647\u0648\u0627\u062a\u0641-\u0627\u0644\u0633\u062d\u0627\u0628\u064a\u0629.png?v=1776761695\",\"width\":2520,\"height\":1490,\"caption\":\"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gulftech-news.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\",\"url\":\"https:\/\/gulftech-news.com\/en\/\",\"name\":\"Gulf Tech News\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gulftech-news.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\",\"name\":\"bessan helmi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"caption\":\"bessan helmi\"},\"url\":\"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud - Gulf Tech News","description":"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/","og_locale":"en_US","og_type":"article","og_title":"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud - Gulf Tech News","og_description":"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud","og_url":"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/","og_site_name":"Gulf Tech News","article_published_time":"2026-04-21T08:55:14+00:00","article_modified_time":"2026-04-21T08:55:15+00:00","og_image":[{"width":1024,"height":605,"url":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2026\/04\/\u062c\u0631\u0648\u0628-\u0622\u064a-\u0628\u064a_\u0627\u0644\u0647\u0648\u0627\u062a\u0641-\u0627\u0644\u0633\u062d\u0627\u0628\u064a\u0629-1024x605.png","type":"image\/png"}],"author":"bessan helmi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"bessan helmi","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/","url":"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/","name":"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud - Gulf Tech News","isPartOf":{"@id":"https:\/\/gulftech-news.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/#primaryimage"},"image":{"@id":"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2026\/04\/\u062c\u0631\u0648\u0628-\u0622\u064a-\u0628\u064a_\u0627\u0644\u0647\u0648\u0627\u062a\u0641-\u0627\u0644\u0633\u062d\u0627\u0628\u064a\u0629.png?v=1776761695","datePublished":"2026-04-21T08:55:14+00:00","dateModified":"2026-04-21T08:55:15+00:00","author":{"@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c"},"description":"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud","breadcrumb":{"@id":"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/#primaryimage","url":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2026\/04\/\u062c\u0631\u0648\u0628-\u0622\u064a-\u0628\u064a_\u0627\u0644\u0647\u0648\u0627\u062a\u0641-\u0627\u0644\u0633\u062d\u0627\u0628\u064a\u0629.png?v=1776761695","contentUrl":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2026\/04\/\u062c\u0631\u0648\u0628-\u0622\u064a-\u0628\u064a_\u0627\u0644\u0647\u0648\u0627\u062a\u0641-\u0627\u0644\u0633\u062d\u0627\u0628\u064a\u0629.png?v=1776761695","width":2520,"height":1490,"caption":"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud"},{"@type":"BreadcrumbList","@id":"https:\/\/gulftech-news.com\/en\/2026\/04\/21\/group-ib-report-reveals-invisible-threat-of-cloud-phones-as-a-key-tool-in-financial-fraud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gulftech-news.com\/en\/"},{"@type":"ListItem","position":2,"name":"Group-IB Report Reveals \u201cInvisible Threat\u201d of Cloud Phones as a Key Tool in Financial Fraud"}]},{"@type":"WebSite","@id":"https:\/\/gulftech-news.com\/en\/#website","url":"https:\/\/gulftech-news.com\/en\/","name":"Gulf Tech News","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gulftech-news.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c","name":"bessan helmi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","caption":"bessan helmi"},"url":"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/"}]}},"_links":{"self":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/86577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/comments?post=86577"}],"version-history":[{"count":1,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/86577\/revisions"}],"predecessor-version":[{"id":86579,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/86577\/revisions\/86579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/media\/86578"}],"wp:attachment":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/media?parent=86577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/categories?post=86577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/tags?post=86577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}