{"id":5271,"date":"2024-01-18T12:47:11","date_gmt":"2024-01-18T12:47:11","guid":{"rendered":"https:\/\/shreshtait.com\/blog\/?p=5271"},"modified":"2025-09-30T15:10:27","modified_gmt":"2025-09-30T09:40:27","slug":"fake-google-play-store","status":"publish","type":"post","link":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/","title":{"rendered":"Fake Google Play Store"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-executive-summary\"><strong>Executive Summary<\/strong><\/h2>\n\n\n\n<p>While malicious and fake apps in the Google Play Store is common, <a href=\"https:\/\/shreshtait.com\/blog\" target=\"_blank\" rel=\"noreferrer noopener\">Shreshta Threat Intelligence <\/a>team has detected multiple fake Google Play Store websites which impersonate the Google Play Store. <\/p>\n\n\n\n<p>This gives an impression to the user, that they are visiting the Google Play Store. If the user clicks on the Install button, the phishing website prompts the user to save an APK file on the mobile device and install it via sideload<sup>1<\/sup>. <\/p>\n\n\n\n<p><sup>1<\/sup>Sideload is installing an application on a mobile device without using the device&#8217;s official application distribution method.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-technical-analysis-of-fake-google-play-store-nbsp-phishing-websites\"><strong>Technical analysis of fake Google Play Store&nbsp;phishing websites<\/strong><\/h2>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-google-play-store-phishing-website-1\"><strong>Google Play Store Phishing website #1<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/qCV0hEzq0Sbd5BbLXjUTlpIfRjGi9pbWJmZ2Ge23wNjpIc4TCR6txJmBNtQaRfVN7KXSp5KTn2WMhQ8G3kzW_foRKESPL9m4r8Pk_UZGIAoaK7R9RqxRcDG9R4oJ22dcW1pFM99ro2EWazHYfeXnU4s\" alt=\"Phishing website of Google Playstore\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 1 &#8211; Phishing website impersonating Google Play Store app Lucky Rabbit<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing-website-2\"><strong>Phishing website #2<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/jbYjE2CUFTph_Fvrp7LxQsJkS7LnXvLDWDwhBs5Y8iL2migrIMstPI6lkbJ_Nvox3i3OWg6U1IdevSEZPbTbcKZOyfTQ15aBcrkAr7tHedy7Rk8u62-6XZYbsaVfxqZUA3lVim-1TKw_CapusxLxWeo\" alt=\"Phishing website of Google Playstore\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 2 &#8211; Phishing website impersonating Google Play Store app Fortune Tiger<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing-website-3\"><strong>Phishing website #3<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1599\" height=\"788\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/01\/image-59.png\" alt=\"\" class=\"wp-image-5395\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/01\/image-59.png 1599w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/01\/image-59-300x148.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/01\/image-59-1024x505.png 1024w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/01\/image-59-768x378.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/01\/image-59-1536x757.png 1536w\" sizes=\"auto, (max-width: 1599px) 100vw, 1599px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 3 &#8211; Phishing website impersonating Google Play Store app Slots Tiger<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing-website-4\"><strong>Phishing website #4<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/ztOeCh0Q6xDid6h7V9kkCOjg4811hEtmNQsz5levcZe_snTiKpbd8KjvCjnTuQFYcsg9oU9djn_QsHlrG6HD8IxdLSKbVPGtlZESx2VRXbSKovkwmx6Td43u-99_mh9hJd33yNwJeaOraJ2O3y0cyLM\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 4 &#8211; Phishing website impersonating Google Play Store app Fortune Tiger 136bet<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing-website-5\"><strong>Phishing website #5<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/4SDypzdX04j7lsdWIfTteq1JX3QXwlHFsLgqzM20y7JBnMjj2yneeYY2cj0lwBmJ2k66WyDcT496J1VXpaDYVVTtExF6mmEi8GGs9f6UXjBqCeBH7iFee32t0Cm6gtH9Besv4dVexwIZPK1fflQHkrk\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 5 &#8211; Phishing website impersonating Google Play Store app Fortune Tiger widlbet<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing-website-6\"><strong>Phishing website #6<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/_Cn5MHjbeVQTF5zgT1GF9a9knsg7G8gxjNVz8LJPvexsWLxxijIORcr0sOmkTp0U69Od-5sTdnovfXoA17fqH6viMyr23ynkVvyfZJ_R2AUbwAj3vSwPSRw1NxivdM_CevT0PYl1ucmK-3QB8yjUwRM\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 6 &#8211; Phishing website impersonating Google Play Store app Fortune Games 888win<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing-website-7\"><strong>Phishing website #7<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/GWcZQq2s8sz2zJk-axgA4nXtrmXgn6wlxj5ttc0XNvSVhjY6LmJVNx-9LajaQ8lH2LFITo3P2l9oKnNRlCTimk9hZUkOGW3l5b0slwUF6IDJGdtJnqoVAJY-jGRAwds3D4ieUEhORe1Mjia3vIzMZL0\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 7 &#8211; Phishing website impersonating Google Play Store app Lucky Rabbit<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing-website-8\"><strong>Phishing website #8<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/2qWSZatoB8B2k0m-735vAgI70WRrHoobRnbB7Al03-88zytc_aWseayWv3IONCISAgP2XBao_gRaevRPSHjy7NbyyupKUhbi0zt48IOhgaEQzSDDTT5_ET216bAw3EK4YvWa70FW54lKdmGuwS_gmbE\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 8 &#8211; Phishing website impersonating Google Play Store app Lucky Rabbit<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing-website-9\"><strong>Phishing website #9<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/-_l5OQo-71Z5gb2_5LamSlZOjZkyewCGbgCW1M1P2HLtk_GPU4aIXc6dw5LHoMpqpG_WbdkJsRgBRUGEU_A4OJoDqShn9bAH7S4f6lFdajynIDc4J5PKLjLEHOVHhCpzpi3vz6MTVUw7siXHX7xOdrI\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 9 &#8211; Phishing website impersonating Google Play Store app Glimmer Teen Patti<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing-website-10\"><strong>Phishing website #10<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/AOnPHQUX3nOO1sp_eU4Wm4FAWoTKQkYQeQsReo2Eyj1mxuKoZOrmQHeRym3xKivHzoIIHESF6JuSTSctskXTy6rJknqly9YMwmxB6JwaB6IUlLxEibFa36eLu8TuH7N1DFtxPTsBm9res7sUSxBxpgk\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 10 &#8211; Phishing website impersonating Google Play Store <br>app Teen Patti Master<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-phishing-website-11\"><strong>Phishing website #11<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/F8YqptNtkK8PGjZHgxnrXEe2jRDqZ1-EhWhAWln9k_LWObi4NFuiEcLueTCJkV2xm-c3Efece5LrwsLMAr0GsaeNfyyoRBI1Lh9CXz90eNcG1l_iVOSZShPNnl33T9reVrUARS6ELyYG3mScap-F5n0\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 11 &#8211; Phishing website impersonating Google Play Store app Teen Patti Gold<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-network-infrastructure-analysis\"><strong>Network Infrastructure Analysis<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/YeLNPsgB4Stpn9dmW75C_YcOm3EP8H_uIT-4iht7gudZnkHHs0Mhh4JA5UGCAkPbGUi-Ky9PyzM4QY-NxZ3Hab8SblJUR0GgSoRJ0-Zc36BTnVgiTERzdgVMXKg3RuTsfWiqIKMai4S3Sv3qnt0LqDY\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 12 &#8211; Country-wise distribution of locations of the phishing websites&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-us.googleusercontent.com\/26odCj2s_-u2TFDPcogep9eHJBcucCf4GA13VD1-pT7th_MQnDY1_HTrTqRrr5fhDu3kkfUd_xK0ToH_7FfGhXzKJrzFpaek6f7bJpoPM3xdKGYTEaVbHxm5PcAM3ZW8Ftz6O-jcufpCVmx_XD6DQmQ\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Figure 13 &#8211; Autonomous System wise distribution of the locations of the phishing websites&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-safety-recommendations\"><strong>Safety Recommendations<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Configure <a href=\"https:\/\/cs-coe.iisc.ac.in\/resources-hub\/browsesafe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Browse Safe<\/a> DNS Servers on your devices to block phishing, malware, cryptojacking and other cyber threats. <\/li>\n\n\n\n<li>Download apps only from the official <a href=\"https:\/\/play.google.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google Play Store <\/a><\/li>\n\n\n\n<li>Any website which prompts downloading of an APK file should be treated as malicious<\/li>\n\n\n\n<li>If you become a victim of cybercrime, call the national (India) cybercrime helpline 1930 or file a complaint at <a href=\"https:\/\/cybercrime.gov.in\/\">https:\/\/cybercrime.gov.in\/<\/a>&nbsp;<\/li>\n\n\n\n<li>If you are an enterprise, protect your organisation in real-time from cyber threats such as phishing, malware, newly registered domain names and other malicious communication using&nbsp;<a href=\"https:\/\/shreshtait.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Shreshta Protective DNS<\/a>. Please email&nbsp;<a href=\"mailto:info@shreshtait.com\" target=\"_blank\" rel=\"noreferrer noopener\">info@shreshtait.com<\/a>&nbsp;for a free 30-day trial.<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\">\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Our analysis of the fake Google Play Store websites shows that the threat actors use deception technique along with social engineering to lure users into installing fake and malicious apps. <br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-indicators-of-compromise\"><strong>Indicators of Compromise<\/strong><\/h3>\n\n\n\n<p>https[:]\/\/h27.in\/aw\/2kieo<\/p>\n\n\n\n<p>https[:]\/\/h27.in\/c\/red\/m\/hj60an?f=w&amp;p=wa&amp;tp=aw1<\/p>\n\n\n\n<p>https[:]\/\/h27.in\/gold\/13ksl<\/p>\n\n\n\n<p>https[:]\/\/h27.in\/gold\/cvr8eh<\/p>\n\n\n\n<p>https[:]\/\/h27.in\/gold\/s03q<\/p>\n\n\n\n<p>https[:]\/\/h27.in\/m\/sjcg<\/p>\n\n\n\n<p>https[:]\/\/h27.in\/m\/tbqy3<\/p>\n\n\n\n<p>https[:]\/\/h27.in\/m\/teuo01<\/p>\n\n\n\n<p>https[:]\/\/h27.in\/m\/ywrh8<\/p>\n\n\n\n<p>https[:]\/\/h27.in\/sm\/hf59i2<\/p>\n\n\n\n<p>https[:]\/\/h29.in\/bws\/kakx9<\/p>\n\n\n\n<p>https[:]\/\/h29.in\/epic\/kakx9<\/p>\n\n\n\n<p>https[:]\/\/h29.in\/gold\/kakx9<\/p>\n\n\n\n<p>https[:]\/\/h29.in\/gold\/twh1a<\/p>\n\n\n\n<p>https[:]\/\/h29.in\/m\/kakx9<\/p>\n\n\n\n<p>https[:]\/\/h29.in\/m\/twh1a<\/p>\n\n\n\n<p>https[:]\/\/h29.in\/sm\/kakx9<\/p>\n\n\n\n<p>https[:]\/\/h29.in\/ysl\/kakx9<\/p>\n\n\n\n<p>https[:]\/\/share.bigswinner.online\/?appKey=nzwvop&amp;af_status=share-link&amp;clickLabel=MA==&amp;agent=levana2<\/p>\n\n\n\n<p>https[:]\/\/share.bigswinner.online\/?appKey=nzwvop&amp;af_status=share-link&amp;clickLabel=MA==&amp;agent=levana3<\/p>\n\n\n\n<p>https[:]\/\/share.bigswinner.online\/?appKey=nzwvop&amp;af_status=share-link&amp;clickLabel=MA==&amp;agent=levana4<\/p>\n\n\n\n<p>https[:]\/\/share.bigswinner.online\/?appKey=nzwvop&amp;af_status=share-link&amp;clickLabel=MA==&amp;agent=levana5<\/p>\n\n\n\n<p>https[:]\/\/share.bigswinner.online\/?appKey=nzwvop&amp;af_status=share-link&amp;clickLabel=MA==&amp;agent=levana6<\/p>\n\n\n\n<p>https[:]\/\/share.bigswinner.online\/?appKey=nzwvop&amp;af_status=share-link&amp;clickLabel=MA==&amp;agent=levana7<\/p>\n\n\n\n<p>https[:]\/\/nn5.pw\/aw\/4r47j<\/p>\n\n\n\n<p>https[:]\/\/nn5.pw\/aw\/ddvpb<\/p>\n\n\n\n<p>https[:]\/\/h25.in\/gold\/13ksl<\/p>\n\n\n\n<p>https[:]\/\/h25.in\/gold\/qpqgd<\/p>\n\n\n\n<p>https[:]\/\/h25.in\/m\/13ksl<\/p>\n\n\n\n<p>https[:]\/\/h25.in\/m\/qpqgd<\/p>\n\n\n\n<p>https[:]\/\/h25.in\/m\/tutoa<\/p>\n\n\n\n<p>https[:]\/\/h25.in\/sm\/qpqgd<\/p>\n\n\n\n<p>https[:]\/\/h25.pw\/aw\/r0efo<\/p>\n\n\n\n<p>https[:]\/\/h25.pw\/gold\/alxwr<\/p>\n\n\n\n<p>https[:]\/\/share.getfun.in\/?2jrliqec_2d833h<\/p>\n\n\n\n<p>https[:]\/\/share.getfun.in\/?2jrm3qq2_2d833h<\/p>\n\n\n\n<p>https[:]\/\/hh7.pw\/aw\/mrj2y<\/p>\n\n\n\n<p>https[:]\/\/h26.in\/c\/blue\/gold\/ywrh8?f=w&amp;p=wa&amp;tp=gold1<\/p>\n\n\n\n<p>https[:]\/\/h26.in\/c\/red\/m\/6jv1di?f=w&amp;p=default&amp;l=en&amp;tp=m31<\/p>\n\n\n\n<p>https[:]\/\/h26.in\/gold\/comsr<\/p>\n\n\n\n<p>https[:]\/\/h26.in\/gold\/mgmrq<\/p>\n\n\n\n<p>https[:]\/\/h26.in\/gold\/teuo01<\/p>\n\n\n\n<p>https[:]\/\/h26.in\/m\/comsr<\/p>\n\n\n\n<p>https[:]\/\/h26.in\/m\/mgmrq<\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recommended-reading\"><strong>Recommended Reading<\/strong><\/h2>\n\n\n\n<p>A few other threat intelligence blog posts that you might be interested in,<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-dns-security-amp-threat-intelligence-blog-shreshta wp-block-embed-dns-security-amp-threat-intelligence-blog-shreshta\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"0NcRqI3NN7\"><a href=\"https:\/\/shreshtait.com\/blog\/2024\/01\/online-shopping-frauds-in-india\/\">Online Shopping frauds in India<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Online Shopping frauds in India&#8221; &#8212; DNS Security &amp; Threat Intelligence Blog | Shreshta\" src=\"https:\/\/shreshtait.com\/blog\/2024\/01\/online-shopping-frauds-in-india\/embed\/#?secret=nszA8LklKs#?secret=0NcRqI3NN7\" data-secret=\"0NcRqI3NN7\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-shreshta-threat-intelligence-blog wp-block-embed-shreshta-threat-intelligence-blog\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/shreshtait.com\/blog\/2024\/01\/phishing-scam-aimed-at-flipper-zero-enthusiasts\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-dns-security-amp-threat-intelligence-blog-shreshta wp-block-embed-dns-security-amp-threat-intelligence-blog-shreshta\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"6GYlIKchgV\"><a href=\"https:\/\/shreshtait.com\/blog\/2024\/01\/national-crime-records-bureau-your-browser-has-been-locked\/\">National Crime Records Bureau &#8211; Your browser has been locked<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;National Crime Records Bureau &#8211; Your browser has been locked&#8221; &#8212; DNS Security &amp; Threat Intelligence Blog | Shreshta\" src=\"https:\/\/shreshtait.com\/blog\/2024\/01\/national-crime-records-bureau-your-browser-has-been-locked\/embed\/#?secret=rk6fWo3ZNM#?secret=6GYlIKchgV\" data-secret=\"6GYlIKchgV\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Executive Summary While malicious and fake apps in the Google Play Store is common, Shreshta Threat Intelligence team has detected multiple fake Google Play Store websites which impersonate the Google Play Store. This gives an impression to the user, that they are visiting the Google Play Store. If the user clicks on the Install button, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5397,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[42],"tags":[122,118,119,76,48,120,121,47],"class_list":["post-5271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threat-intelligence","tag-browse-safe","tag-fake","tag-google","tag-india","tag-phishing","tag-play-store","tag-sideload","tag-threat-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Security &amp; Threat Intelligence Blog | Shreshta<\/title>\n<meta name=\"description\" content=\"Shreshta Threat Intelligence team has detected multiple fake Google Play Store websites which impersonate the Google Play Store.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fake Google Play Store\" \/>\n<meta property=\"og:description\" content=\"Shreshta Threat Intelligence team has detected multiple fake Google Play Store websites which impersonate the Google Play Store.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/\" \/>\n<meta property=\"og:site_name\" content=\"DNS Security &amp; Threat Intelligence Blog | Shreshta\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-18T12:47:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-30T09:40:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/01\/DALL\u00b7E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Swapneel Patnekar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:site\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Swapneel Patnekar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/01\\\/fake-google-play-store\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/01\\\/fake-google-play-store\\\/\"},\"author\":{\"name\":\"Swapneel Patnekar\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\"},\"headline\":\"Fake Google Play Store\",\"datePublished\":\"2024-01-18T12:47:11+00:00\",\"dateModified\":\"2025-09-30T09:40:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/01\\\/fake-google-play-store\\\/\"},\"wordCount\":792,\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/01\\\/fake-google-play-store\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/DALL\u00b7E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch.png\",\"keywords\":[\"browse safe\",\"fake\",\"google\",\"india\",\"phishing\",\"play store\",\"sideload\",\"threat intelligence\"],\"articleSection\":[\"Threat Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/01\\\/fake-google-play-store\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/01\\\/fake-google-play-store\\\/\",\"name\":\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/01\\\/fake-google-play-store\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/01\\\/fake-google-play-store\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/DALL\u00b7E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch.png\",\"datePublished\":\"2024-01-18T12:47:11+00:00\",\"dateModified\":\"2025-09-30T09:40:27+00:00\",\"description\":\"Shreshta Threat Intelligence team has detected multiple fake Google Play Store websites which impersonate the Google Play Store.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/01\\\/fake-google-play-store\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/01\\\/fake-google-play-store\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/01\\\/fake-google-play-store\\\/#primaryimage\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/DALL\u00b7E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch.png\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/DALL\u00b7E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch.png\",\"width\":1024,\"height\":1024,\"caption\":\"google play store icon\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/01\\\/fake-google-play-store\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fake Google Play Store\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"name\":\"DNS Security &amp; Threat Intelligence Blog | Shreshta\",\"description\":\"DNS Security &amp; Threat Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\",\"name\":\"Shreshta IT Technologies Pvt. Ltd.\",\"alternateName\":\"Shreshta\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"width\":330,\"height\":76,\"caption\":\"Shreshta IT Technologies Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/shreshtait\",\"https:\\\/\\\/infosec.exchange\\\/@shreshta\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/shreshta\\\/\"],\"description\":\"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.\",\"email\":\"sales@shreshtait.com\",\"legalName\":\"Shreshta IT Technologies Pvt. Ltd.\",\"foundingDate\":\"2014-01-22\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"},\"publishingPrinciples\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/blog\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\",\"name\":\"Swapneel Patnekar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"caption\":\"Swapneel Patnekar\"},\"sameAs\":[\"https:\\\/\\\/shreshtait.com\\\/blog\"],\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/author\\\/pswapneel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"Shreshta Threat Intelligence team has detected multiple fake Google Play Store websites which impersonate the Google Play Store.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/","og_locale":"en_US","og_type":"article","og_title":"Fake Google Play Store","og_description":"Shreshta Threat Intelligence team has detected multiple fake Google Play Store websites which impersonate the Google Play Store.","og_url":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/","og_site_name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","article_published_time":"2024-01-18T12:47:11+00:00","article_modified_time":"2025-09-30T09:40:27+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/01\/DALL\u00b7E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch.png","type":"image\/png"}],"author":"Swapneel Patnekar","twitter_card":"summary_large_image","twitter_creator":"@shreshtait","twitter_site":"@shreshtait","twitter_misc":{"Written by":"Swapneel Patnekar","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/#article","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/"},"author":{"name":"Swapneel Patnekar","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484"},"headline":"Fake Google Play Store","datePublished":"2024-01-18T12:47:11+00:00","dateModified":"2025-09-30T09:40:27+00:00","mainEntityOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/"},"wordCount":792,"publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/01\/DALL\u00b7E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch.png","keywords":["browse safe","fake","google","india","phishing","play store","sideload","threat intelligence"],"articleSection":["Threat Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/","url":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/","name":"","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/#primaryimage"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/01\/DALL\u00b7E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch.png","datePublished":"2024-01-18T12:47:11+00:00","dateModified":"2025-09-30T09:40:27+00:00","description":"Shreshta Threat Intelligence team has detected multiple fake Google Play Store websites which impersonate the Google Play Store.","breadcrumb":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/#primaryimage","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/01\/DALL\u00b7E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch.png","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/01\/DALL\u00b7E-2024-01-22-03.14.26-Design-a-clean-and-modern-representation-of-the-Google-Play-Store-icon.-The-icon-should-feature-the-iconic-play-button-symbol-composed-of-Googles-ch.png","width":1024,"height":1024,"caption":"google play store icon"},{"@type":"BreadcrumbList","@id":"https:\/\/shreshtait.com\/blog\/2024\/01\/fake-google-play-store\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shreshtait.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Fake Google Play Store"}]},{"@type":"WebSite","@id":"https:\/\/shreshtait.com\/blog\/#website","url":"https:\/\/shreshtait.com\/blog\/","name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"DNS Security &amp; Threat Intelligence","publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shreshtait.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shreshtait.com\/blog\/#organization","name":"Shreshta IT Technologies Pvt. Ltd.","alternateName":"Shreshta","url":"https:\/\/shreshtait.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","width":330,"height":76,"caption":"Shreshta IT Technologies Pvt. Ltd."},"image":{"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/shreshtait","https:\/\/infosec.exchange\/@shreshta","https:\/\/www.linkedin.com\/company\/shreshta\/"],"description":"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.","email":"sales@shreshtait.com","legalName":"Shreshta IT Technologies Pvt. Ltd.","foundingDate":"2014-01-22","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"},"publishingPrinciples":"https:\/\/shreshtait.com\/blog\/blog\/"},{"@type":"Person","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484","name":"Swapneel Patnekar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","caption":"Swapneel Patnekar"},"sameAs":["https:\/\/shreshtait.com\/blog"],"url":"https:\/\/shreshtait.com\/blog\/author\/pswapneel\/"}]}},"_links":{"self":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/5271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/comments?post=5271"}],"version-history":[{"count":73,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/5271\/revisions"}],"predecessor-version":[{"id":7909,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/5271\/revisions\/7909"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media\/5397"}],"wp:attachment":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media?parent=5271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/categories?post=5271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/tags?post=5271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}