{"id":473,"date":"2026-05-13T12:28:13","date_gmt":"2026-05-13T02:28:13","guid":{"rendered":"https:\/\/nexiant.ai\/resources\/blogs\/?p=473"},"modified":"2026-05-14T14:11:16","modified_gmt":"2026-05-14T04:11:16","slug":"app-fraud-money-mule-detection","status":"publish","type":"post","link":"https:\/\/nexiant.ai\/resources\/blogs\/app-fraud-money-mule-detection\/","title":{"rendered":"APP Fraud and Money Mule Detection: Why Banks Must Act at Both Ends"},"content":{"rendered":"\n<style>\n  .nx-blog * { box-sizing: border-box; margin: 0; padding: 0; }\n  .nx-blog { font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, sans-serif; font-size: 16px; line-height: 1.75; color: #1a1a2e; max-width: 820px; margin: 0 auto; }\n  .nx-blog h2 { font-size: 1.55rem; font-weight: 700; color: #00184C; margin: 2.5rem 0 0.75rem; padding-bottom: 0.4rem; border-bottom: 3px solid #073EA1; }\n  .nx-blog h3 { font-size: 1.15rem; font-weight: 700; color: #073EA1; margin: 1.75rem 0 0.5rem; }\n  .nx-blog h4 { font-size: 0.98rem; font-weight: 700; color: #00184C; margin: 1.25rem 0 0.35rem; }\n  .nx-blog p { margin-bottom: 1rem; }\n  .nx-blog ul, .nx-blog ol { margin: 0.5rem 0 1rem 1.4rem; }\n  .nx-blog li { margin-bottom: 0.4rem; }\n  .nx-blog strong { color: #00184C; }\n\n  .nx-hero { background: linear-gradient(135deg, #00184C 0%, #073EA1 100%); color: #fff; border-radius: 12px; padding: 1.75rem 2rem; margin-bottom: 2rem; }\n  .nx-hero .nx-tag { display: inline-block; background: rgba(255,255,255,0.15); color: #AEC9FF; font-size: 0.75rem; font-weight: 600; text-transform: uppercase; letter-spacing: 0.08em; padding: 4px 12px; border-radius: 20px; margin-bottom: 0.6rem; }\n  .nx-hero .nx-meta { font-size: 0.95rem; color: #AEC9FF; margin: 0; }\n\n  .nx-stat-bar { display: grid; grid-template-columns: repeat(auto-fit, minmax(175px, 1fr)); gap: 12px; margin: 1.5rem 0 2rem; }\n  .nx-stat { background: #f0f4ff; border: 1px solid #d0daf5; border-radius: 10px; padding: 1rem 1.25rem; text-align: center; }\n  .nx-stat .nx-stat-num { font-size: 1.8rem; font-weight: 800; color: #073EA1; line-height: 1; margin-bottom: 0.3rem; }\n  .nx-stat .nx-stat-label { font-size: 0.82rem; color: #555; line-height: 1.4; }\n\n  .nx-callout { border-left: 4px solid #073EA1; background: #f0f4ff; border-radius: 0 8px 8px 0; padding: 1rem 1.25rem; margin: 1.5rem 0; }\n  .nx-callout.nx-callout--warning { border-left-color: #A30000; background: #fff5f5; }\n  .nx-callout .nx-callout-title { font-size: 0.8rem; font-weight: 700; text-transform: uppercase; letter-spacing: 0.07em; color: #073EA1; margin-bottom: 0.4rem; }\n  .nx-callout.nx-callout--warning .nx-callout-title { color: #A30000; }\n  .nx-callout p { margin: 0; font-size: 0.95rem; color: #1a1a2e; }\n\n  .nx-grid { display: grid; grid-template-columns: repeat(auto-fit, minmax(185px, 1fr)); gap: 12px; margin: 1.25rem 0 1.75rem; }\n  .nx-card { background: #fff; border: 1px solid #d0daf5; border-radius: 10px; padding: 1rem; }\n  .nx-card.nx-card--red { border-color: #f9c0c0; background: #fff8f8; }\n  .nx-card-icon { width: 36px; height: 36px; border-radius: 8px; background: #073EA1; display: flex; align-items: center; justify-content: center; margin-bottom: 0.6rem; }\n  .nx-card-icon.red { background: #A30000; }\n  .nx-card-icon svg { width: 18px; height: 18px; fill: #fff; }\n  .nx-card h4 { font-size: 0.88rem; font-weight: 700; color: #00184C; margin-bottom: 0.2rem; }\n  .nx-card p { font-size: 0.8rem; color: #555; margin: 0; line-height: 1.5; }\n\n  .nx-flow { margin: 1.25rem 0 1.75rem; }\n  .nx-flow-step { display: flex; gap: 1rem; margin-bottom: 0.75rem; align-items: flex-start; }\n  .nx-flow-num { flex-shrink: 0; width: 36px; height: 36px; border-radius: 50%; background: #A30000; color: #fff; font-size: 0.9rem; font-weight: 700; display: flex; align-items: center; justify-content: center; margin-top: 0.1rem; }\n  .nx-flow-body { display: flex; flex-direction: column; justify-content: center; }\n  .nx-flow-body h4 { font-size: 0.93rem; font-weight: 700; color: #00184C; margin: 0 0 0.15rem; line-height: 1.2; }\n  .nx-flow-body p { font-size: 0.87rem; color: #444; margin: 0; }\n\n  .nx-compare { display: grid; grid-template-columns: 1fr 1fr; gap: 12px; margin: 1.25rem 0 1.75rem; }\n  @media (max-width: 500px) { .nx-compare { grid-template-columns: 1fr; } }\n  .nx-compare-card { border-radius: 10px; padding: 1.1rem 1.25rem; }\n  .nx-compare-card.uk { background: #f0f4ff; border: 1px solid #d0daf5; }\n  .nx-compare-card.au { background: #f0f7f0; border: 1px solid #b8ddb8; }\n  .nx-compare-card .nx-compare-label { font-size: 0.72rem; font-weight: 700; text-transform: uppercase; letter-spacing: 0.08em; margin-bottom: 0.6rem; }\n  .nx-compare-card.uk .nx-compare-label { color: #073EA1; }\n  .nx-compare-card.au .nx-compare-label { color: #1a6630; }\n  .nx-compare-card ul { margin: 0 0 0 1.1rem; }\n  .nx-compare-card li { font-size: 0.85rem; color: #333; margin-bottom: 0.35rem; line-height: 1.5; }\n\n  .nx-faq { margin: 1.25rem 0 1.75rem; }\n  .nx-faq-item { border: 1px solid #d0daf5; border-radius: 8px; margin-bottom: 8px; overflow: hidden; }\n  .nx-faq-q { width: 100%; background: #fff; border: none; text-align: left; padding: 1rem 1.25rem; font-size: 0.95rem; font-weight: 600; color: #00184C; cursor: pointer; display: flex; justify-content: space-between; align-items: center; gap: 1rem; }\n  .nx-faq-q:hover { background: #f5f8ff; }\n  .nx-faq-q .nx-chevron { flex-shrink: 0; width: 20px; height: 20px; border-radius: 50%; background: #EEF2FF; display: flex; align-items: center; justify-content: center; transition: transform 0.25s; }\n  .nx-faq-q .nx-chevron svg { width: 10px; height: 10px; stroke: #073EA1; fill: none; }\n  .nx-faq-q[aria-expanded=\"true\"] .nx-chevron { transform: rotate(180deg); background: #073EA1; }\n  .nx-faq-q[aria-expanded=\"true\"] .nx-chevron svg { stroke: #fff; }\n  .nx-faq-a { display: none; padding: 0 1.25rem 1rem; font-size: 0.92rem; color: #333; line-height: 1.7; background: #fff; }\n  .nx-faq-a.open { display: block; }\n\n  .nx-cta { background: linear-gradient(135deg, #00184C 0%, #073EA1 100%); border-radius: 12px; padding: 2rem; text-align: center; margin-top: 2.5rem; }\n  .nx-cta h3 { color: #fff; font-size: 1.3rem; font-weight: 700; margin-bottom: 0.5rem; }\n  .nx-cta p { color: #AEC9FF; font-size: 0.95rem; margin-bottom: 1.25rem; }\n  .nx-cta a { display: inline-block; background: #E11A1A; color: #fff; font-weight: 700; font-size: 0.95rem; padding: 0.7rem 1.8rem; border-radius: 6px; text-decoration: none; transition: background 0.2s; }\n  .nx-cta a:hover { background: #A30000; }\n  .nx-divider { border: none; border-top: 1px solid #e0e7f5; margin: 2rem 0; }\n  .nx-disclaimer { font-size: 0.8rem; color: #888; font-style: italic; text-align: center; margin-top: 1.5rem; }\n<\/style>\n\n<div class=\"nx-blog\">\n\n  <div class=\"nx-hero\">\n    <span class=\"nx-tag\">Insight &nbsp;\u00b7&nbsp; May 2026<\/span>\n    <p class=\"nx-meta\">Authorised push payment fraud losses are rising globally. Effective response requires action at both the scam origination point and the mule account receiving end.<\/p>\n  <\/div>\n\n  <p>Authorised push payment (APP) fraud has become the dominant fraud typology in markets with real-time payment infrastructure. Unlike card fraud \u2014 where the liability framework and dispute mechanisms are relatively mature \u2014 APP fraud sits at the intersection of fraud detection, <a href=\"https:\/\/nexiant.ai\/resources\/blogs\/aml-compliance-guide-2026\/\" class=\"nx-inline-link\">AML compliance<\/a>, and customer protection, creating an accountability gap that financial institutions, regulators, and industry bodies are actively working to close.<\/p>\n\n  <div class=\"nx-stat-bar\">\n    <div class=\"nx-stat\">\n      <div class=\"nx-stat-num\">\u00a3460m+<\/div>\n      <div class=\"nx-stat-label\">APP fraud losses in the UK in 2024 (UK Finance)<\/div>\n    <\/div>\n    <div class=\"nx-stat\">\n      <div class=\"nx-stat-num\">\u00a385,000<\/div>\n      <div class=\"nx-stat-label\">per-claim reimbursement cap under the UK PSR mandatory framework<\/div>\n    <\/div>\n    <div class=\"nx-stat\">\n      <div class=\"nx-stat-num\">50\/50<\/div>\n      <div class=\"nx-stat-label\">liability split between sending and receiving banks under UK PSR rules<\/div>\n    <\/div>\n  <\/div>\n\n  <h2 id=\"how-app-fraud-uses-the-banking-system\"><span class=\"ez-toc-section\" id=\"How_APP_Fraud_Uses_the_Banking_System\"><\/span>How APP Fraud Uses the Banking System<span class=\"ez-toc-section-end\"><\/span><\/h2>\n  <p>APP fraud succeeds because it exploits the trustworthiness of legitimate payment infrastructure. The victim is socially engineered into authorising a transfer \u2014 through investment scams, romance fraud, government impersonation, or business email compromise. The payment is made through a legitimate channel, making it instantaneous and, once confirmed, difficult to reverse.<\/p>\n\n  <h3 id=\"the-fraud-to-laundering-chain\">The Fraud-to-Laundering Chain<\/h3>\n\n  <div class=\"nx-flow\">\n    <div class=\"nx-flow-step\">\n      <div class=\"nx-flow-num\">1<\/div>\n      <div class=\"nx-flow-body\">\n        <h4>Social Engineering<\/h4>\n        <p>Victim is deceived \u2014 investment scam, romance fraud, impersonation, or business email compromise<\/p>\n      <\/div>\n    <\/div>\n    <div class=\"nx-flow-step\">\n      <div class=\"nx-flow-num\">2<\/div>\n      <div class=\"nx-flow-body\">\n        <h4>Authorised Payment<\/h4>\n        <p>Victim authorises transfer via real-time payment infrastructure \u2014 instantaneous and irrevocable<\/p>\n      <\/div>\n    <\/div>\n    <div class=\"nx-flow-step\">\n      <div class=\"nx-flow-num\">3<\/div>\n      <div class=\"nx-flow-body\">\n        <h4>Mule Account Receipt<\/h4>\n        <p>Funds land in an account controlled by the fraudster or an unwitting mule \u2014 the AML component begins<\/p>\n      <\/div>\n    <\/div>\n    <div class=\"nx-flow-step\">\n      <div class=\"nx-flow-num\">4<\/div>\n      <div class=\"nx-flow-body\">\n        <h4>Rapid Layering<\/h4>\n        <p>Within minutes, funds are forwarded through multiple accounts \u2014 often internationally \u2014 beginning the laundering phase<\/p>\n      <\/div>\n    <\/div>\n    <div class=\"nx-flow-step\">\n      <div class=\"nx-flow-num\">5<\/div>\n      <div class=\"nx-flow-body\">\n        <h4>Beyond Recovery<\/h4>\n        <p>By the time the victim reports and a recall request is raised, funds have moved through multiple accounts and are typically unrecoverable<\/p>\n      <\/div>\n    <\/div>\n  <\/div>\n\n  <h2 id=\"mule-account-detection-challenge\"><span class=\"ez-toc-section\" id=\"The_Mule_Account_Detection_Challenge\"><\/span>The Mule Account Detection Challenge<span class=\"ez-toc-section-end\"><\/span><\/h2>\n  <p>Mule accounts present a specific detection challenge because individual account behaviour may appear entirely normal at onboarding and during initial operation. The account passes <a href=\"https:\/\/nexiant.ai\/resources\/blogs\/kyc-screening\/\" class=\"nx-inline-link\">KYC checks<\/a>. The first few transactions are unremarkable. The suspicious pattern only emerges when the account begins receiving and rapidly forwarding fraud proceeds.<\/p>\n\n  <p>Effective mule detection requires <a href=\"https:\/\/nexiant.ai\/resources\/blogs\/transaction-monitoring-rules-vs-ai-best-practices-2026\/\" class=\"nx-inline-link\">transaction monitoring<\/a> calibrated for the specific behavioural signatures of mule activity:<\/p>\n\n  <div class=\"nx-grid\">\n    <div class=\"nx-card nx-card--red\">\n      <div class=\"nx-card-icon red\"><svg viewBox=\"0 0 20 20\"><path d=\"M10 1a9 9 0 100 18A9 9 0 0010 1zm1 13H9v-2h2v2zm0-4H9V6h2v5z\"\/><\/svg><\/div>\n      <h4>Minimal Dwell Time<\/h4>\n      <p>Rapid receipt and forwarding of funds with near-zero balance maintained between transactions<\/p>\n    <\/div>\n    <div class=\"nx-card nx-card--red\">\n      <div class=\"nx-card-icon red\"><svg viewBox=\"0 0 20 20\"><path d=\"M3 3h14v2H3zm0 4h14v2H3zm0 4h10v2H3zm0 4h7v2H3z\"\/><\/svg><\/div>\n      <h4>Credit\/Debit Ratios<\/h4>\n      <p>High credit-to-debit ratios with consistently low end balances \u2014 inconsistent with stated purpose of account<\/p>\n    <\/div>\n    <div class=\"nx-card nx-card--red\">\n      <div class=\"nx-card-icon red\"><svg viewBox=\"0 0 20 20\"><path d=\"M10 2a8 8 0 100 16A8 8 0 0010 2zm1 11H9V9h2v4zm0-6H9V5h2v2z\"\/><\/svg><\/div>\n      <h4>Network Concentration<\/h4>\n      <p>Multiple incoming sources forwarding to a single concentrated destination \u2014 a hallmark of the layering phase<\/p>\n    <\/div>\n    <div class=\"nx-card nx-card--red\">\n      <div class=\"nx-card-icon red\"><svg viewBox=\"0 0 20 20\"><path d=\"M13 6a3 3 0 11-6 0 3 3 0 016 0zm5 10a7 7 0 00-14 0h14z\"\/><\/svg><\/div>\n      <h4>Device &amp; Behavioural Signals<\/h4>\n      <p>Device and session signals consistent with account compromise or recruited mule behaviour<\/p>\n    <\/div>\n  <\/div>\n\n  <h2 id=\"regulatory-obligations\"><span class=\"ez-toc-section\" id=\"Regulatory_Obligations_AML_Meets_Consumer_Protection\"><\/span>Regulatory Obligations: AML Meets Consumer Protection<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n  <div class=\"nx-compare\">\n    <div class=\"nx-compare-card uk\">\n      <div class=\"nx-compare-label\">United Kingdom<\/div>\n      <ul>\n        <li>PSR mandatory reimbursement framework effective October 2024<\/li>\n        <li>Joint liability for sending and receiving banks up to \u00a385,000 per claim<\/li>\n        <li>Receiving bank (mule account holder) contributes 50% of reimbursement costs<\/li>\n        <li>Creates direct financial incentive for mule account detection investment<\/li>\n        <li>CIFAS National Fraud Database for cross-institution sharing<\/li>\n      <\/ul>\n    <\/div>\n    <div class=\"nx-compare-card au\">\n      <div class=\"nx-compare-label\">Australia<\/div>\n      <ul>\n        <li>AUSTRAC AML\/CTF Act obligations apply to mule account-holding institutions<\/li>\n        <li>Suspicious matter report obligation when mule activity detected<\/li>\n        <li>Australian Banking Association Scam-Safe Accord (2023)<\/li>\n        <li>Enhanced mule detection and cross-institution sharing commitments<\/li>\n        <li>AFCX framework for cross-institution fraud intelligence sharing<\/li>\n      <\/ul>\n    <\/div>\n  <\/div>\n\n  <h2 id=\"information-sharing\"><span class=\"ez-toc-section\" id=\"Industry_Information_Sharing_as_a_Detection_Lever\"><\/span>Industry Information Sharing as a Detection Lever<span class=\"ez-toc-section-end\"><\/span><\/h2>\n  <p>APP fraud and mule account schemes operate across institutions \u2014 funds move from the victim&#8217;s bank to the mule&#8217;s bank, and often through further accounts at different institutions. Single-institution detection can only see part of the picture.<\/p>\n\n  <div class=\"nx-callout\">\n    <div class=\"nx-callout-title\">\ud83d\udca1 Network participation delivers measurable uplift<\/div>\n    <p>Institutions that participate actively in cross-institution sharing networks \u2014 both contributing signals and consuming intelligence \u2014 consistently achieve higher detection rates for mule account and APP fraud than those that rely solely on internal data. Regulators in both the UK and Australia have encouraged broader participation as a systemic response.<\/p>\n  <\/div>\n\n  <hr class=\"nx-divider\">\n\n  <h2 id=\"frequently-asked-questions\"><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n  <div class=\"nx-faq\">\n    <div class=\"nx-faq-item\">\n      <button class=\"nx-faq-q\" aria-expanded=\"false\">What is APP fraud?<span class=\"nx-chevron\"><svg viewBox=\"0 0 10 6\" stroke-width=\"1.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M1 1l4 4 4-4\"\/><\/svg><\/span><\/button>\n      <div class=\"nx-faq-a\">Authorised push payment fraud occurs when a victim is deceived into authorising a payment to an account controlled by a fraudster. Common methods include investment scams, romance fraud, impersonation of government agencies, and business email compromise. Unlike card fraud, the victim authorises the transaction directly, making it harder to dispute and often difficult to recover.<\/div>\n    <\/div>\n    <div class=\"nx-faq-item\">\n      <button class=\"nx-faq-q\" aria-expanded=\"false\">What is a money mule?<span class=\"nx-chevron\"><svg viewBox=\"0 0 10 6\" stroke-width=\"1.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M1 1l4 4 4-4\"\/><\/svg><\/span><\/button>\n      <div class=\"nx-faq-a\">A money mule is a person whose bank account is used to receive and forward the proceeds of fraud or other crimes. Mules may be willing participants or unwitting victims recruited through job scams or social engineering. In either case, the account performs an AML function within the fraud scheme \u2014 layering funds to obscure their origin.<\/div>\n    <\/div>\n    <div class=\"nx-faq-item\">\n      <button class=\"nx-faq-q\" aria-expanded=\"false\">What are the AML obligations of a bank that holds a mule account?<span class=\"nx-chevron\"><svg viewBox=\"0 0 10 6\" stroke-width=\"1.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M1 1l4 4 4-4\"\/><\/svg><\/span><\/button>\n      <div class=\"nx-faq-a\">Banks maintaining mule accounts have AML obligations including submitting suspicious matter reports when mule activity is detected, taking appropriate action to restrict or close the account, and maintaining records of the suspicious activity for AUSTRAC (Australia) or the equivalent regulatory body. Failure to detect and report through adequate transaction monitoring may constitute a breach of AML\/CTF obligations.<\/div>\n    <\/div>\n    <div class=\"nx-faq-item\">\n      <button class=\"nx-faq-q\" aria-expanded=\"false\">How does the UK&#8217;s APP fraud reimbursement framework affect banks?<span class=\"nx-chevron\"><svg viewBox=\"0 0 10 6\" stroke-width=\"1.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M1 1l4 4 4-4\"\/><\/svg><\/span><\/button>\n      <div class=\"nx-faq-a\">The UK Payment Systems Regulator&#8217;s mandatory reimbursement scheme (effective October 2024) requires sending and receiving banks to share liability for APP fraud losses up to \u00a385,000 per claim. The receiving bank \u2014 which held the mule account \u2014 must contribute 50% of reimbursement costs, creating a direct financial incentive to invest in mule account detection and prevention.<\/div>\n    <\/div>\n    <div class=\"nx-faq-item\">\n      <button class=\"nx-faq-q\" aria-expanded=\"false\">Can banks share information about suspected mule accounts?<span class=\"nx-chevron\"><svg viewBox=\"0 0 10 6\" stroke-width=\"1.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M1 1l4 4 4-4\"\/><\/svg><\/span><\/button>\n      <div class=\"nx-faq-a\">Yes, within defined legal frameworks. In Australia, the Australian Financial Crimes Exchange (AFCX) provides a structure for cross-institution fraud intelligence sharing under safe harbour provisions. In the UK, CIFAS operates a similar national fraud database. Institutions that participate in these networks achieve materially better detection rates than those relying solely on internal data.<\/div>\n    <\/div>\n  <\/div>\n\n  <div class=\"nx-cta\">\n    <h3>Strengthening your APP fraud and mule detection?<\/h3>\n    <p>Nexiant helps financial institutions build integrated fraud and AML detection capabilities to tackle APP fraud at both ends of the transaction chain.<\/p>\n    <a href=\"\/contact\">Get in touch with our team<\/a>\n  <\/div>\n\n  <p class=\"nx-disclaimer\">This article was accurate at the time of publication in May 2026 and is intended for general informational purposes only. It does not constitute legal or compliance advice. Organisations should seek qualified professional counsel in relation to their specific obligations.<\/p>\n\n<\/div>\n\n<script>\n  document.querySelectorAll('.nx-faq-q').forEach(function(btn) {\n    btn.addEventListener('click', function() {\n      var expanded = this.getAttribute('aria-expanded') === 'true';\n      this.setAttribute('aria-expanded', !expanded);\n      this.nextElementSibling.classList.toggle('open', !expanded);\n    });\n  });\n<\/script>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>APP fraud losses are rising globally and the mule accounts that launder the proceeds sit inside your institution&#8217;s own customer base. Effective response means acting at both ends of the transaction chain \u2014 here&#8217;s how.<\/p>\n","protected":false},"author":2,"featured_media":474,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1,15],"tags":[],"class_list":["post-473","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraudprevention","category-risk-management"],"blocksy_meta":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/posts\/473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/comments?post=473"}],"version-history":[{"count":2,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/posts\/473\/revisions"}],"predecessor-version":[{"id":476,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/posts\/473\/revisions\/476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/media\/474"}],"wp:attachment":[{"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/media?parent=473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/categories?post=473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/tags?post=473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}