{"id":1627,"date":"2026-02-02T13:13:59","date_gmt":"2026-02-02T12:13:59","guid":{"rendered":"https:\/\/finanz-forensik.de\/?p=1627"},"modified":"2026-02-02T13:22:52","modified_gmt":"2026-02-02T12:22:52","slug":"crypto-fraud-through-app-advertising-financial-forensic-analysis-of-a-current-fraud-case-from-heidelberg","status":"publish","type":"post","link":"https:\/\/finanz-forensik.de\/en\/krypto-betrug-durch-app-werbung-finanzforensische-einordnung-eines-aktuellen-betrugsfalls-aus-heidelberg\/","title":{"rendered":"Crypto fraud through app advertising \u2013 Financial forensic analysis of a recent fraud case from Heidelberg"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"1627\" class=\"elementor elementor-1627\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e67e032 e-flex e-con-boxed e-con e-parent\" data-id=\"3e67e032\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c341f82 elementor-widget elementor-widget-text-editor\" data-id=\"3c341f82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cryptocurrency fraud is on the rise and increasingly exhibits standardized structures. The use of digital advertisements in mobile applications and social networks as an entry point for fraudulent investment offers is particularly striking. A recent case from Heidelberg exemplifies how professionally organized crypto fraud schemes operate and the risks they pose.<\/p>\n<p>A 64-year-old investor suffered a financial loss of more than \u20ac40,000 as a result of such a fraud. The case exhibits typical characteristics of modern, internationally organized investment fraud schemes in the cryptocurrency sector.<\/p>\n<h2>App-based advertising as the initial point of contact<\/h2>\n<p>According to current findings, the fraud began in June 2025 with an advertisement within a smartphone application. This advertisement promoted supposedly high-yield investments in cryptocurrencies. The design conveyed a sense of legitimacy and the impression of a professional financial offer.<\/p>\n<p>After initial contact, the investor decided to make an initial deposit in the low three-figure range. From a financial forensics perspective, this is a typical entry scenario. Small initial amounts regularly serve to build trust and lower the barriers to later, larger investments.<\/p>\n<h2>Personal support from alleged investment advisors<\/h2>\n<p>Subsequently, the investor was contacted by telephone. The caller presented himself as a financial or crypto advisor and conveyed an impression of professional competence and personalized service. In several conversations, high returns were promised, and active support for the investment was suggested.<\/p>\n<p>The communication became increasingly intense, leading the investor to make further deposits. Subsequently, two bank loans were even taken out to invest additional sums in the alleged cryptocurrency venture. The transfers were made to a foreign account located in Malta, a common feature of cross-border fraud schemes.<\/p>\n<h2>Failure to pay out despite reported profits<\/h2>\n<p>After substantial sums had been invested, no payout was made despite alleged profits. Repeated inquiries went unanswered. At this point, it became clear that this was not a genuine investment, but a fraudulent scheme.<\/p>\n<p>The investor filed a complaint with the relevant authorities. The documented financial loss amounted to over \u20ac40,000. The police have launched an investigation on suspicion of commercial investment fraud.<\/p>\n<h2>Financial forensic classification of the fraud pattern<\/h2>\n<p>The described situation corresponds to a now frequently occurring pattern in the area of crypto investment fraud. Characteristic elements include, in particular:<\/p>\n<ul>\n<li>Entry via professionally designed app or online advertisements,<\/li>\n<li>the subsequent personal contact by alleged consultants,<\/li>\n<li>the gradual increase in investment amounts,<\/li>\n<li>the use of foreign bank accounts,<\/li>\n<li>the failure to make payouts despite reported profits.<\/li>\n<\/ul>\n<p>This structure regularly leads to fraud only being detected after significant assets have already been transferred.<\/p>\n<h2>Importance of early financial forensic analysis<\/h2>\n<p>This case demonstrates that crypto fraud doesn&#039;t exclusively target inexperienced investors. The professional design of advertisements and targeted personal approaches can also deceive individuals with economic or technical expertise.<\/p>\n<p>Typical warning signs include unrealistic promises of returns, investment advice offered over the phone without transparent regulation, pressure to make decisions quickly, and requests for international money transfers. Early financial forensic analysis can help limit further damage and systematically investigate the facts.<\/p>\n<h2>Role of financial forensics in investigating crypto fraud<\/h2>\n<p>Financial forensic investigations support the analysis of payment flows, transaction paths, and the platform structures involved. The goal is to document the course of the fraud in a traceable manner and to create a solid foundation for legal assessments and for cooperation with lawyers and authorities.<\/p>\n<p>A structured financial forensic analysis thus forms an essential basis for the objective classification of complex crypto fraud cases and for further legal or regulatory steps.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0584a3b e-flex e-con-boxed e-con e-parent\" data-id=\"0584a3b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4a8ab94 e-con-full e-flex e-con e-child\" data-id=\"4a8ab94\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0038860 elementor-widget elementor-widget-heading\" data-id=\"0038860\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span style=\"font-weight: normal\">FAQs \u2013 Frequently Asked Questions about Crypto Fraud through App Advertising<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b695e2 uael-faq-box-layout-yes align-at-left elementor-widget elementor-widget-uael-faq\" data-id=\"8b695e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"uael-faq.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id='uael-faq-wrapper-146' class=\"uael-faq-wrapper\">\n\t\t\t\t<div class=\"uael-faq-container uael-faq-layout-accordion\" data-layout=\"accordion\" >\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-a9bae3e\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-a9bae3e uael-question-span\" tabindex=\"0\" id=\"uael-faq-1-6a0f513c67e4a\">Why do scammers specifically use app advertising for crypto fraud?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p>App advertising appears legitimate and commonplace to many users. Professionally designed ads lower the barrier to entry and convey the impression of a verified or established offer. This makes app advertising an effective entry point for fraud.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-106aad7\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-106aad7 uael-question-span\" tabindex=\"0\" id=\"uael-faq-2-6a0f513c67e70\">What are the typical characteristics of crypto fraud via app advertising?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p>Typical features include low initial investments, personal contact by alleged advisors, gradually increasing investment demands, foreign payment terms, and a lack of payouts despite advertised profits.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-0b26c36\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-0b26c36 uael-question-span\" tabindex=\"0\" id=\"uael-faq-3-6a0f513c67e81\">What role do alleged crypto consultants play in these fraud cases?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p>The perpetrators often pose as personal crypto or financial advisors. Through regular conversations and targeted communication, they build trust in order to induce further deposits.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-c78e332\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-c78e332 uael-question-span\" tabindex=\"0\" id=\"uael-faq-4-6a0f513c67e92\">Why are foreign bank accounts or payment methods frequently used?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p>Foreign accounts make it difficult to trace payment flows and are often used to delay or obstruct investigations. This is a common feature of internationally organized crypto fraud schemes.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-c7561ca\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-c7561ca uael-question-span\" tabindex=\"0\" id=\"uael-faq-5-6a0f513c67ea1\">Why is crypto fraud often only noticed late?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p>Fraudulent platforms are technically sophisticated and display apparent winnings. The fraud is often only discovered when payouts are refused or additional fees are demanded.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-3d12e9f\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-3d12e9f uael-question-span\" tabindex=\"0\" id=\"uael-faq-6-6a0f513c67eaf\">Can payments in crypto fraud cases be forensically traced?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p>Yes. Even though cryptocurrencies appear anonymous, transactions on public blockchains are fundamentally traceable. However, the analysis requires specialized financial forensic expertise.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-a4297c9\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-a4297c9 uael-question-span\" tabindex=\"0\" id=\"uael-faq-7-6a0f513c67ebd\">What is the significance of an early financial forensic analysis?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p data-start=\"930\" data-end=\"1357\">Early analysis can help document payment methods, identify transaction patterns, and systematically analyze the facts. Delays significantly complicate the reconstruction process.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-03391fc\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-03391fc uael-question-span\" tabindex=\"0\" id=\"uael-faq-8-6a0f513c67ecb\">Does crypto fraud through app advertising only affect inexperienced investors?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p data-start=\"1438\" data-end=\"1905\">No. Even people with economic or technical expertise can be affected, as the fraud schemes specifically target trustworthiness, technical language, and professional processes.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-ba395c6\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-ba395c6 uael-question-span\" tabindex=\"0\" id=\"uael-faq-9-6a0f513c67ed8\">How does financial forensics support the investigation of crypto fraud?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p data-start=\"1988\" data-end=\"2418\">Financial forensics assists in the analysis of payment flows, wallet structures, and platform mechanisms. The goal is to create verifiable documentation as a basis for legal assessments and regulatory action.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6cc28f e-flex e-con-boxed e-con e-parent\" data-id=\"b6cc28f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>A recent fraud case from Heidelberg illustrates how crypto fraud via app advertising is structured. This article provides a financial forensic analysis of the case and explains typical characteristics of modern fraud schemes.<\/p>","protected":false},"author":2,"featured_media":1642,"menu_order":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1627","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/posts\/1627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/comments?post=1627"}],"version-history":[{"count":11,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/posts\/1627\/revisions"}],"predecessor-version":[{"id":1643,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/posts\/1627\/revisions\/1643"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/media\/1642"}],"wp:attachment":[{"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/media?parent=1627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/categories?post=1627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/tags?post=1627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}