{"id":3277,"date":"2018-09-12T14:15:32","date_gmt":"2018-09-12T13:15:32","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=3277"},"modified":"2018-09-12T14:15:32","modified_gmt":"2018-09-12T13:15:32","slug":"code-use-in-british-airways-cyber-attack-identified","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified","title":{"rendered":"Code use in British Airways cyber attack identified"},"content":{"rendered":"<p>It\u2019s understood that the code used in the British Airways cyber attack that compromised the payment data for 380,000 has been found.<\/p>\n<p>A cyber security firm has reportedly identified the malicious code that was injected into the British Airways site that led to the <a href=\"https:\/\/www.dataleaklawyers.co.uk\/british-airways-data-breach-compensation-action\" target=\"_blank\" rel=\"noopener\"><strong>massive data breach that we\u2019ve initiated legal action for<\/strong><\/a>. As previously suspected, the code reportedly acts like a digital form of \u201cskimming\u201d where information entered into payment forms is copied and stolen.<\/p>\n<p>The revelation means we\u2019re one step close to uncovering how the <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/380000-payment-cards-exposed-in-british-airways-data-breach\" target=\"_blank\" rel=\"noopener\"><strong>biggest data hack of the new GDPR era was committed<\/strong><\/a> as we fight for compensation for victims of the attack.<\/p>\n<p><!--more--><\/p>\n<h3><strong>British Airways cyber attack: the biggest of the new GDPR era<\/strong><\/h3>\n<p>The British Airways cyber attack is undoubtedly the biggest attack in the post-GDPR era since the legislation changes that took place in May earlier this year.<\/p>\n<p>The <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/ba-data-theft-compensation-action-launched\" target=\"_blank\" rel=\"noopener\"><strong>payment information for some 380,000 people has been compromised<\/strong><\/a>, which includes the full long card number; expiration dates of cards; security (CVV) codes of card; and the personal information of the customer, such as their name and email address.<\/p>\n<p>This is enough to place victims of the British Airways cyber attack at an immediate and serious risk of fraud. <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/a-guide-for-victims-of-the-british-airways-data-theft-incident\" target=\"_blank\" rel=\"noopener\"><strong>Victims are being urged to contact their banks<\/strong><\/a> for replacements cards to replace the compromised ones.<\/p>\n<h3><strong>Similarities in the British Airways cyber attack and the Ticketmaster data breach<\/strong><\/h3>\n<p>There are reportedly stark similarities in the British Airways cyber attack and the <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/ticketmaster-uk-data-breach-just-the-tip-of-the-iceberg\" target=\"_blank\" rel=\"noopener\"><strong>Ticketmaster data breach that we\u2019re also representing victims<\/strong><\/a> for in a group action legal case.<\/p>\n<p>It appears that code has reportedly been injected into the payment procedure which has essentially copied the data entered, which can be sent directly to the hackers responsible.<\/p>\n<p>It\u2019s understood that there was just 22 lines of code used in the British Airways cyber attack, which applied to both the website and their app. It&#8217;s also reportedly said that the code was specifically modified to suit the British Airways website, suggesting that this was a tailored attack.<\/p>\n<h3><strong>No comment from airline on the latest British Airways cyber attack revelations<\/strong><\/h3>\n<p>There has been no comment from the airliner so far over the security firm\u2019s claims that they&#8217;ve cracked the secret of the British Airways cyber attack.<\/p>\n<p>We\u2019ll continue to monitor the developments as we\u2019re incredibly keen to learn how this attack happened and how British Airways managed to allow such a wealth of personal and sensitive data to be compromised.<\/p>\n<p>Whatever the outcome of the investigations, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/british-airways-data-breach-compensation-action\" target=\"_blank\" rel=\"noopener\"><strong>we\u2019re acting for victims of the British Airways cyber attack in a legal action<\/strong><\/a>. Our lawyers are already fighting in over 20 different data breach actions, and we\u2019re committed to helping victims on our <a href=\"https:\/\/www.dataleaklawyers.co.uk\/no-win-no-fee\" target=\"_blank\" rel=\"noopener\"><strong>No Win, No Fee service<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s understood that the code used in the British Airways cyber attack that compromised the payment data for 380,000 has been found. A cyber security firm has reportedly identified the malicious code that was injected into the British Airways site that led to the massive data breach that we\u2019ve initiated legal action for. As previously &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Code use in British Airways cyber attack identified<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":2543,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[121,113,122,8,1],"tags":[120,16,2,55,20],"class_list":["post-3277","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-british-airways-data-breach","category-cybersecurity","category-group-action","category-hacking-news","category-latest","tag-british-airways-data-breach","tag-compensation","tag-cyber-attack","tag-cybersecurity","tag-online-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Code use in British Airways cyber attack identified - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"It\u2019s understood that the code used in the British Airways cyber attack that compromised the payment data for 380,000 has been found.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Code use in British Airways cyber attack identified - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"It\u2019s understood that the code used in the British Airways cyber attack that compromised the payment data for 380,000 has been found.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-12T13:15:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cybersecurity-specialists-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/code-use-in-british-airways-cyber-attack-identified#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/code-use-in-british-airways-cyber-attack-identified\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Code use in British Airways cyber attack identified\",\"datePublished\":\"2018-09-12T13:15:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/code-use-in-british-airways-cyber-attack-identified\"},\"wordCount\":470,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/code-use-in-british-airways-cyber-attack-identified#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-specialists-min.png\",\"keywords\":[\"British Airways Data Breach\",\"compensation\",\"cyber attack\",\"cybersecurity\",\"online security\"],\"articleSection\":[\"British Airways Data Breach\",\"Cybersecurity\",\"Group Action\",\"Hacking News\",\"Latest\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/code-use-in-british-airways-cyber-attack-identified\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/code-use-in-british-airways-cyber-attack-identified\",\"name\":\"Code use in British Airways cyber attack identified - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/code-use-in-british-airways-cyber-attack-identified#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/code-use-in-british-airways-cyber-attack-identified#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-specialists-min.png\",\"datePublished\":\"2018-09-12T13:15:32+00:00\",\"description\":\"It\u2019s understood that the code used in the British Airways cyber attack that compromised the payment data for 380,000 has been found.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/code-use-in-british-airways-cyber-attack-identified#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/code-use-in-british-airways-cyber-attack-identified\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/code-use-in-british-airways-cyber-attack-identified#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-specialists-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-specialists-min.png\",\"width\":725,\"height\":250,\"caption\":\"shortage of cybersecurity specialists\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/code-use-in-british-airways-cyber-attack-identified#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Code use in British Airways cyber attack identified\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Code use in British Airways cyber attack identified - Data Leaks, Breaches &amp; Hacks","description":"It\u2019s understood that the code used in the British Airways cyber attack that compromised the payment data for 380,000 has been found.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified","og_locale":"en_GB","og_type":"article","og_title":"Code use in British Airways cyber attack identified - Data Leaks, Breaches &amp; Hacks","og_description":"It\u2019s understood that the code used in the British Airways cyber attack that compromised the payment data for 380,000 has been found.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2018-09-12T13:15:32+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cybersecurity-specialists-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Code use in British Airways cyber attack identified","datePublished":"2018-09-12T13:15:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified"},"wordCount":470,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cybersecurity-specialists-min.png","keywords":["British Airways Data Breach","compensation","cyber attack","cybersecurity","online security"],"articleSection":["British Airways Data Breach","Cybersecurity","Group Action","Hacking News","Latest"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified","name":"Code use in British Airways cyber attack identified - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cybersecurity-specialists-min.png","datePublished":"2018-09-12T13:15:32+00:00","description":"It\u2019s understood that the code used in the British Airways cyber attack that compromised the payment data for 380,000 has been found.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cybersecurity-specialists-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cybersecurity-specialists-min.png","width":725,"height":250,"caption":"shortage of cybersecurity specialists"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/code-use-in-british-airways-cyber-attack-identified#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Code use in British Airways cyber attack identified"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3277"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3277\/revisions"}],"predecessor-version":[{"id":3278,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3277\/revisions\/3278"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/2543"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}