{"id":1190,"date":"2025-12-28T11:29:29","date_gmt":"2025-12-28T03:29:29","guid":{"rendered":"https:\/\/chainvestigate.com\/?p=1190"},"modified":"2025-12-28T11:29:31","modified_gmt":"2025-12-28T03:29:31","slug":"what-is-crypto-drainer-scam-howto-recover-asset-en","status":"publish","type":"post","link":"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/","title":{"rendered":"What Are Crypto Drainers? A Complete Guide to Prevention, Scam Support, and Asset Recovery"},"content":{"rendered":"<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>\u3010Key Takeaways\u3011<\/strong><\/p>\n\n\n\n<p>Crypto Drainers are currently the most destructive mechanism in the crypto scam landscape. Unlike traditional hacks, attackers do not need to steal your private key; instead, they trick you into signing a &#8220;malicious approval,&#8221; allowing them to instantly drain your wallet. Between 2024 and 2025, notorious groups like Angel, Inferno, and the newly emerged Vanilla Drainer have looted hundreds of millions of dollars.<\/p>\n\n\n\n<p>If you&#8217;ve been hit, time is of the essence. Your immediate <strong>scam support<\/strong> plan should be:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Stop the bleeding:<\/strong> Use <strong>Revoke.cash<\/strong> to cancel active approvals immediately.<\/li>\n\n\n\n<li><strong>Trace the funds:<\/strong> Leverage professional on-chain analysis to track stolen assets and file a report with law enforcement.<\/li>\n<\/ol>\n\n\n\n<p>This guide covers everything you need to know about how these drainers work, how to use prevention tools like <strong>Scam Sniffer<\/strong>, and the exact steps for <strong>crypto scam<\/strong> recovery.<\/p>\n<\/blockquote>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>As the crypto market heats up, scam tactics have evolved. We&#8217;ve moved past simple &#8220;investment group&#8221; schemes into highly technical, invisible on-chain attacks. Many seasoned investors haven&#8217;t lost their funds to leaked seed phrases, but to a single, fatal click on a &#8220;malicious approval.&#8221; This article dives deep into the silent killer of Web3: the <strong>Crypto Drainer<\/strong>.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#1_What_is_a_Crypto_Drainer\" >1. What is a Crypto Drainer?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#Why_Are_These_%E2%80%9CCrypto_Scams%E2%80%9D_So_Rampant\" >Why Are These &#8220;Crypto Scams&#8221; So Rampant?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#2_How_It_Works_How_Hackers_Bypass_Your_Defenses\" >2. How It Works: How Hackers Bypass Your Defenses<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#1_ERC-20_Approve_Malicious_Authorization\" >1. ERC-20 Approve (Malicious Authorization)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#2_Permit_Permit2_Signatures_Gasless_Phishing\" >2. Permit \/ Permit2 Signatures (Gasless Phishing)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#3_EIP-7702_Delegation_Hijacking_The_2025_Threat\" >3. EIP-7702 Delegation Hijacking (The 2025 Threat)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#3_Prevention_How_to_Bulletproof_Your_Assets\" >3. Prevention: How to Bulletproof Your Assets<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#1_Install_Web3_Anti-Scam_Extensions_Scam_Sniffer\" >1. Install Web3 Anti-Scam Extensions: Scam Sniffer<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#2_Adopt_a_%E2%80%9CZero_Trust%E2%80%9D_Mindset\" >2. Adopt a &#8220;Zero Trust&#8221; Mindset<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#4_Self-Help_Step_1_Emergency_Triage_Revokecash\" >4. Self-Help Step 1: Emergency Triage (Revoke.cash)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#Use_Revokecash_to_Sever_the_Connection\" >Use Revoke.cash to Sever the Connection<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#5_Self-Help_Step_2_Investigation_and_Reporting\" >5. Self-Help Step 2: Investigation and Reporting<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#1_Conduct_On-Chain_Analysis\" >1. Conduct On-Chain Analysis<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#2_Seek_Professional_Scam_Support\" >2. Seek Professional Scam Support<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/chainvestigate.com\/en\/what-is-crypto-drainer-scam-howto-recover-asset-en\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_What_is_a_Crypto_Drainer\"><\/span><strong>1. What is a Crypto Drainer?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A <strong>Crypto Drainer<\/strong> is an automated malicious script or smart contract designed to siphon cryptocurrency assets (like ETH, USDT, and NFTs) from a victim&#8217;s wallet with terrifying speed.<\/p>\n\n\n\n<p>Unlike traditional hacking, a Crypto Drainer doesn&#8217;t try to &#8220;brute force&#8221; your password. It exploits the blockchain&#8217;s approval features (Approve \/ Permit). Attackers lure you to a phishing site where you unwittingly click &#8220;Confirm.&#8221; By doing so, you are legally signing a transaction that grants the hacker permission to move your funds. Once authorized, their automated bots act like a vacuum, emptying your wallet instantly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_Are_These_%E2%80%9CCrypto_Scams%E2%80%9D_So_Rampant\"><\/span><strong>Why Are These &#8220;Crypto Scams&#8221; So Rampant?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This attack vector has industrialized into &#8220;Drainer-as-a-Service&#8221; (DaaS). Developers rent these toolkits to thousands of lower-level scammers who then hunt for victims via Google Ads, fake X (Twitter) accounts, Discord DMs, or phishing Airdrop sites.<\/p>\n\n\n\n<p>According to recent data from late 2024 to early 2025, <strong>crypto scams<\/strong> utilizing drainers have resulted in over $500 million in losses. Groups like <strong>Angel Drainer<\/strong>, <strong>Inferno Drainer<\/strong>, and the rising <strong>Vanilla Drainer<\/strong> currently dominate this illicit market.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_How_It_Works_How_Hackers_Bypass_Your_Defenses\"><\/span><strong>2. How It Works: How Hackers Bypass Your Defenses<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>To effectively prevent a <strong>crypto scam<\/strong>, you need to understand the mechanics under the hood. Hackers typically rely on three specific attack vectors:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_ERC-20_Approve_Malicious_Authorization\"><\/span><strong>1. ERC-20 Approve (Malicious Authorization)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This is the classic method. When you trade on a DEX (Decentralized Exchange), you normally have to authorize the smart contract to spend your tokens.<\/p>\n\n\n\n<p>Scam sites mimic this process. They disguise themselves as &#8220;Airdrop Claims&#8221; or &#8220;NFT Mints&#8221; and pop up a signature request. While it looks normal, you are actually signing a transaction that grants the hacker &#8220;Unlimited Allowance&#8221; for your USDT or other tokens. Once confirmed, they don&#8217;t need your private key\u2014they can transfer your authorized funds anytime.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Permit_Permit2_Signatures_Gasless_Phishing\"><\/span><strong>2. Permit \/ Permit2 Signatures (Gasless Phishing)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>To improve user experience, protocols like Uniswap introduced the Permit2 mechanism, allowing users to authorize transactions via an &#8220;offline signature&#8221; without paying gas fees upfront.<\/p>\n\n\n\n<p>Crypto Drainers exploit this to lower your guard. Since the signature doesn&#8217;t cost gas, many users mistake it for a harmless &#8220;Login&#8221; or &#8220;Verify Identity&#8221; request. In reality, that signature file contains a valid permission slip for asset transfer. The hacker simply takes your signature, pays the gas fee themselves, and executes the theft on-chain.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_EIP-7702_Delegation_Hijacking_The_2025_Threat\"><\/span><strong>3. EIP-7702 Delegation Hijacking (The 2025 Threat)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Following recent Ethereum upgrades, EIP-7702 allows standard wallets (EOAs) to temporarily delegate execution rights to smart contracts.<\/p>\n\n\n\n<p>Newer generations of Crypto Drainers are now tricking users into signing these delegation requests. This effectively hands over control of your account&#8217;s behavior to the attacker. This vector is particularly dangerous because it is often harder for traditional wallet interfaces to flag, representing a major challenge in crypto scam prevention.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Prevention_How_to_Bulletproof_Your_Assets\"><\/span><strong>3. Prevention: How to Bulletproof Your Assets<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In a forest full of digital traps, &#8220;being careful&#8221; isn&#8217;t enough. You need to weaponize your browser with the right tools.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Install_Web3_Anti-Scam_Extensions_Scam_Sniffer\"><\/span><strong>1. Install Web3 Anti-Scam Extensions: Scam Sniffer<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>We strongly recommend installing browser extensions like <strong><a href=\"https:\/\/www.scamsniffer.io\/\" target=\"_blank\" rel=\"noopener\">Scam Sniffer<\/a><\/strong>. Think of it as an antivirus for Web3:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Real-time Blocking:<\/strong> It automatically blocks access to known phishing domains and malicious <strong>Crypto Drainer<\/strong> URLs.<\/li>\n\n\n\n<li><strong>Transaction Simulation:<\/strong> Before you click &#8220;Confirm&#8221; in your wallet, it simulates the transaction and shows you the outcome. If the simulation says, &#8220;You are about to lose 10,000 USDT&#8221; while you think you&#8217;re claiming a free NFT, that is your final warning to abort.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Adopt_a_%E2%80%9CZero_Trust%E2%80%9D_Mindset\"><\/span><strong>2. Adopt a &#8220;Zero Trust&#8221; Mindset<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Inspect URLs Rigorously:<\/strong> Scammers buy Google Ads to place fake sites (like unlswap.com) at the top of search results. Always verify the domain.<\/li>\n\n\n\n<li><strong>Don&#8217;t Blindly Sign:<\/strong> If you see a random Permit request, or a site asks for your password\/seed phrase, close it immediately.<\/li>\n\n\n\n<li><strong>Wallet Segmentation:<\/strong> Keep your life savings in a Cold Wallet that never interacts with random DApps. Use a &#8220;Burner Wallet&#8221; with minimal funds for daily interactions and airdrops.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Self-Help_Step_1_Emergency_Triage_Revokecash\"><\/span><strong>4. Self-Help Step 1: Emergency Triage (Revoke.cash)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you notice an unauthorized transfer or suspect you just signed a malicious contract, stay calm. The speed of your <strong>scam support<\/strong> response determines if you can save what&#8217;s left.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Use_Revokecash_to_Sever_the_Connection\"><\/span><strong>Use Revoke.cash to Sever the Connection<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Crypto Drainer attacks are often persistent. The hacker may still hold a valid allowance to drain any remaining funds or future deposits.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Go to <a href=\"https:\/\/revoke.cash\/\" target=\"_blank\" rel=\"noopener\">Revoke.cash<\/a>:<\/strong> This is the industry standard for allowance management.<\/li>\n\n\n\n<li><strong>Connect Your Wallet:<\/strong> Connect the affected address.<\/li>\n\n\n\n<li><strong>Audit Approvals:<\/strong> Filter for &#8220;Unlimited&#8221; allowances. Look specifically for unknown contracts or approvals granted recently.<\/li>\n\n\n\n<li><strong>Execute Revoke:<\/strong> Click the &#8220;Revoke&#8221; button for any suspicious items. You will need to pay a small gas fee to update the blockchain state. This action cuts the cord, preventing the hacker from moving that specific token again.<\/li>\n<\/ol>\n\n\n\n<p><strong>Warning:<\/strong> If your ETH (needed for gas) is instantly being transferred out the moment it hits your wallet, you are likely facing a &#8220;Sweeper Bot.&#8221; This implies your private key is compromised, not just an approval. In this case, you need advanced technical assistance immediately.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Self-Help_Step_2_Investigation_and_Reporting\"><\/span><strong>5. Self-Help Step 2: Investigation and Reporting<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Revoking approvals stops future bleeding, but recovering stolen <strong>crypto scam<\/strong> funds requires professional forensics.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Conduct_On-Chain_Analysis\"><\/span><strong>1. Conduct On-Chain Analysis<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Everything on the blockchain leaves a footprint. While hackers use mixers (like Tornado Cash) or cross-chain bridges to launder money, professional on-chain analysis can often trace the flow of funds.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The Goal:<\/strong> Trace the funds until they hit a Centralized Exchange (CEX).<\/li>\n\n\n\n<li><strong>The Why:<\/strong> Exchanges like Binance, Coinbase, or OKX require KYC (Identity Verification). Identifying which exchange the hacker used to cash out is often the only way law enforcement can identify the suspect or freeze the assets.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Seek_Professional_Scam_Support\"><\/span><strong>2. Seek Professional Scam Support<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>For most individuals, tracing funds through complex transactions is impossible. It is highly advisable to seek help from professional blockchain investigation firms. They can help you map the flow of funds and prepare a detailed intelligence report.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><strong>Crypto Drainers<\/strong> represent a sophisticated, technical crime wave. <strong>Crypto scam<\/strong> prevention is always better than the cure. Make it a habit to use tools like Scam Sniffer and regularly clean up your permissions with Revoke.cash.If you do fall victim, do not trust random accounts on social media claiming they can &#8220;hack the hackers&#8221;\u2014these are almost always secondary scams. Stick to legitimate <strong>scam support<\/strong> channels, utilize professional on-chain analysis, and work through proper legal routes to fight for your assets.<\/p>","protected":false},"excerpt":{"rendered":"<p>Crypto drainers exploit malicious wallet approvals to steal funds without private keys, representing the most destructive threat in the current crypto scam landscape. This guide provides essential prevention strategies and immediate scam support protocols, detailing how to use Revoke.cash and on-chain forensics for asset recovery.<\/p>","protected":false},"author":2,"featured_media":1191,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gspb_post_css":"","footnotes":""},"categories":[23,25],"tags":[33,28],"class_list":["post-1190","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expert-insights","category-resources","tag-expert-insights","tag-hacks-exploits"],"blocksy_meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/chainvestigate.com\/en\/wp-json\/wp\/v2\/posts\/1190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chainvestigate.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chainvestigate.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chainvestigate.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/chainvestigate.com\/en\/wp-json\/wp\/v2\/comments?post=1190"}],"version-history":[{"count":0,"href":"https:\/\/chainvestigate.com\/en\/wp-json\/wp\/v2\/posts\/1190\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chainvestigate.com\/en\/wp-json\/wp\/v2\/media\/1191"}],"wp:attachment":[{"href":"https:\/\/chainvestigate.com\/en\/wp-json\/wp\/v2\/media?parent=1190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chainvestigate.com\/en\/wp-json\/wp\/v2\/categories?post=1190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chainvestigate.com\/en\/wp-json\/wp\/v2\/tags?post=1190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}