{"id":14767,"date":"2024-11-29T18:37:07","date_gmt":"2024-11-29T13:07:07","guid":{"rendered":"https:\/\/razorpay.com\/learn\/?p=14767"},"modified":"2025-05-26T09:11:52","modified_gmt":"2025-05-26T03:41:52","slug":"fraud-detection-in-financial-transactions","status":"publish","type":"post","link":"https:\/\/razorpay.com\/learn\/fraud-detection-in-financial-transactions\/","title":{"rendered":"Fraud Detection in Financial Transactions: Types &#038; How To Detect It"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69eb9d2f87dbf\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69eb9d2f87dbf\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/razorpay.com\/learn\/fraud-detection-in-financial-transactions\/#What-Is-Fraud-Detection-in-Financial-Transactions\" >What Is Fraud Detection in Financial Transactions?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/razorpay.com\/learn\/fraud-detection-in-financial-transactions\/#Example-Scenario-of-Fraud-Detection-in-Financial-Transactions\" >Example Scenario of Fraud Detection in Financial Transactions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/razorpay.com\/learn\/fraud-detection-in-financial-transactions\/#Types-of-Financial-Fraud\" >Types of Financial Fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/razorpay.com\/learn\/fraud-detection-in-financial-transactions\/#How-Does-Transaction-Fraud-Work\" >How Does Transaction Fraud Work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/razorpay.com\/learn\/fraud-detection-in-financial-transactions\/#Tools-and-Techniques-for-Fraud-Detection\" >Tools and Techniques for Fraud Detection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/razorpay.com\/learn\/fraud-detection-in-financial-transactions\/#Determining-the-Need-for-Transaction-Fraud-Detection\" >Determining the Need for Transaction Fraud Detection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/razorpay.com\/learn\/fraud-detection-in-financial-transactions\/#5-Key-Steps-for-Identifying-Transaction-Fraud\" >5 Key Steps for Identifying Transaction Fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/razorpay.com\/learn\/fraud-detection-in-financial-transactions\/#Best-Practices-for-Effective-Fraud-Detection\" >Best Practices for Effective Fraud Detection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/razorpay.com\/learn\/fraud-detection-in-financial-transactions\/#Conclusion\" >Conclusion<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/razorpay.com\/learn\/fraud-detection-in-financial-transactions\/#Frequently-Asked-Questions-FAQs\" >Frequently Asked Questions (FAQs)<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What-Is-Fraud-Detection-in-Financial-Transactions\"><\/span><b>What Is Fraud Detection in Financial Transactions?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Fraud detection in financial transactions is identifying and stopping fake or unauthorised activities in financial systems. It ensures customer security by monitoring transactions for unusual patterns that indicate fraud, such as <\/span>fake transactions<span style=\"font-weight: 400;\">, <\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/razorpay.com\/blog\/upi-frauds-types-tactics\/\">UPI frauds<\/a><\/span><span style=\"font-weight: 400;\">, or e-commerce fraud.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The key objectives of fraud detection include identifying suspicious behaviour, preventing fraudulent transaction attempts, and mitigating risks like <a href=\"https:\/\/razorpay.com\/blog\/what-is-a-chargeback\/\">chargebacks<\/a>. Advanced technologies, such as machine learning, play a vital role in helping detect fraudulent transactions by analysing data and spotting irregularities in real-time. This approach is especially critical for online <\/span>transaction fraud detection<span style=\"font-weight: 400;\">, where the risk is higher due to the digital nature of payments.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Example-Scenario-of-Fraud-Detection-in-Financial-Transactions\"><\/span><b>Example Scenario of Fraud Detection in Financial Transactions<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Imagine you run an e-commerce platform, and your payment system flags an online transaction for being unusually large and originating from an unfamiliar IP address. This could indicate card fraud or a phishing attempt.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The system, equipped with <\/span>machine learning to detect fraud<span style=\"font-weight: 400;\">, analyses the transaction. It notices that the customer\u2019s previous purchase patterns involve small transactions from a different location. To prevent a fake transaction, the system temporarily blocks the payment and sends a verification request to the customer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The customer confirms that they did not initiate the transaction. This helps you <\/span>detect fraudulent transactions<span style=\"font-weight: 400;\"> and prevent a potential chargeback. Additionally, by promptly mitigating this <\/span>e-commerce fraud<span style=\"font-weight: 400;\">, you enhance customer security and protect your platform\u2019s reputation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This scenario highlights how fraud detection works in real-world settings, using advanced tools to identify and stop fraudulent activities before they harm your business or your customers.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Types-of-Financial-Fraud\"><\/span><b>Types of Financial Fraud<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><b>1. Credit Card Fraud<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Credit card fraud happens when someone uses stolen or unauthorised card details to make purchases or withdraw money. You might notice unexpected charges or transactions from unfamiliar locations on your account statement.<\/span><\/p>\n<h3><b>2. Identity Theft<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Identity theft occurs when fraudsters steal personal information, like your Aadhaar or PAN details, to access your accounts or commit other crimes. This can cause financial losses and damage your reputation.<\/span><\/p>\n<h3><b>3. Phishing Scams<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing scams use fake emails or websites to trick you into revealing sensitive information such as passwords or bank details. These scams often appear as genuine messages from trusted institutions like banks or service providers.<\/span><\/p>\n<h3><b>4. Account Takeover Fraud<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Account takeover fraud happens when criminals hack into your account using stolen login credentials. They perform unauthorised transactions or misuse the account, often draining funds before you realise it.<\/span><\/p>\n<h3><b>5. Wire Transfer Fraud<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Wire transfer fraud involves unauthorised electronic fund transfers. Fraudsters may manipulate payment requests or hack systems to redirect payments to their accounts, targeting businesses that handle large sums.<\/span><\/p>\n<h3><b>6. Invoice Fraud<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Invoice fraud consists of scammers sending fake invoices that appear legitimate to deceive businesses into making payments to their accounts. This type of fraud is common in industries with frequent vendor payments.<\/span><\/p>\n<h3><b>7. Insider Fraud<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Insider fraud occurs when employees abuse their access to financial systems for personal gain. They may steal funds, approve fake expenses, or manipulate accounts. Conducting regular audits can help detect and prevent such fraud.<\/span><\/p>\n<h3><b>8. Money Laundering Fraud<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Money laundering involves making illegally acquired money appear legitimate by passing it through multiple financial transactions or accounts. Fraudsters use this technique to hide the true source of their funds.<\/span><\/p>\n<h3><b>9. Friendly Fraud<\/b><\/h3>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/razorpay.com\/learn\/what-is-friendly-fraud\/\">Friendly fraud<\/a> occurs when customers use the same policies meant to protect them from real fraud to make false claims. Once they experience how easy it is to get a refund, they may try to make more fraudulent claims, often called &#8220;armchair fraud&#8221; due to its low-effort nature.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How-Does-Transaction-Fraud-Work\"><\/span><b>How Does Transaction Fraud Work?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><b>Steps in Fraud Detection<\/b><\/h3>\n<h4><b>1. Data Collection and Monitoring<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Every transaction generates data, such as the amount, time, and location. Fraud detection systems collect and monitor this data continuously to find anything unusual.\u00a0<\/span><\/p>\n<h4><b>2. Pattern Recognition Using Algorithms<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Advanced algorithms analyse transaction data to identify irregular patterns. They look for behaviours like multiple failed login attempts or unexpected spending habits. By recognising these patterns, the system can detect fraudulent transactions quickly and accurately.<\/span><\/p>\n<h4><b>3. Real-Time Alerts and Responses<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">When the system detects suspicious activity, it sends an immediate alert. For example, it may block a transaction or notify the user for verification. This quick response helps to prevent financial losses and maintain trust with customers.<\/span><\/p>\n<h3><b>Technologies Involved<\/b><\/h3>\n<h4><b>1. Artificial Intelligence (AI) and Machine Learning (ML)<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">AI and ML are used to study transaction data and learn from past fraud cases. They adapt over time to identify new fraud patterns, making the system smarter and more effective. This technology is especially useful for<\/span> online transaction fraud detection<span style=\"font-weight: 400;\">.<\/span><\/p>\n<h4><b>2. Statistical Models and Analytics<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">These models use historical data to predict the likelihood of fraud in a transaction. They identify trends, such as frequent small transactions followed by large ones, which could signal fraudulent activity.<\/span><\/p>\n<h4><b>3. Behavioural Analysis Tools<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">These tools monitor user behaviour, such as regular login times or spending habits. If a user\u2019s behaviour suddenly changes\u2014like accessing the account from a different country\u2014the system flags it as suspicious.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Tools-and-Techniques-for-Fraud-Detection\"><\/span><b>Tools and Techniques for Fraud Detection<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Detecting fraud requires a combination of effective tools and advanced techniques. These help monitor transactions, identify irregularities, and prevent fraud before it happens.<\/span><\/p>\n<h3><b>1. Rule-Based Systems<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Rule-based systems use predefined thresholds to identify suspicious activities. For instance, a transaction exceeding a set amount or occurring in an unusual location may trigger an alert. These systems are straightforward and efficient for detecting common fraud patterns.<\/span><\/p>\n<h3><b>2. Machine Learning Models<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Machine learning models analyse large volumes of transaction data to find patterns and adapt over time. Unlike rule-based systems, they can detect new fraud techniques by learning from past fraudulent activities. This makes them highly effective in combating evolving threats.<\/span><\/p>\n<h3><b>3. Behavioural Analytics<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Behavioural analytics tools track user behaviour, such as spending habits, login times, or preferred payment methods. If a transaction deviates significantly from normal behaviour like a large purchase in a foreign country\u2014the system flags it as suspicious.<\/span><\/p>\n<h3><b>4. Biometric Verification<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Biometric tools, like fingerprint scanning and facial recognition, add an extra layer of<\/span> security for customers<span style=\"font-weight: 400;\">. They ensure that only authorised users can access accounts or approve transactions, reducing the chances of fraud.<\/span><\/p>\n<h3><b>5. Real-Time Monitoring Systems<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">These systems monitor transactions as they happen, providing instant alerts for suspicious activities. For example, a system might pause a transaction and notify the user for verification if it detects unusual patterns, ensuring immediate action to prevent fraud.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Determining-the-Need-for-Transaction-Fraud-Detection\"><\/span><b>Determining the Need for Transaction Fraud Detection<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><b>1. Increased Transaction Volume<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As your business grows, the number of transactions increases, and so does the likelihood of fraudulent activities. Without a fraud detection system, it becomes more difficult to spot suspicious transactions manually. Automated detection tools help monitor high volumes of transactions quickly and accurately.<\/span><\/p>\n<h3><b>2. Protecting Your Reputation<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Fraudulent activities can damage your business\u2019s reputation. Customers expect their personal and financial information to be safe. If fraud occurs and goes undetected, it can lead to customer dissatisfaction, negative reviews, and lost trust. Early detection ensures your customers remain confident in your business.<\/span><\/p>\n<h3><b>3. Regulatory Compliance<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In industries like banking, e-commerce, or fintech, there are strict regulations regarding fraud prevention. By implementing fraud detection systems, you protect your business and comply with legal requirements, avoiding potential penalties and fines.<\/span><\/p>\n<h3><b>4. Financial Loss Prevention<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Fraud can result in significant financial losses, whether through chargebacks, stolen funds, or reputational damage that leads to lost sales. Fraud detection systems can help prevent these losses by identifying suspicious activities before they escalate.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"5-Key-Steps-for-Identifying-Transaction-Fraud\"><\/span><b>5 Key Steps for Identifying Transaction Fraud<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><b>1. Data Enrichment<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Data enrichment ensures that transactions are linked to the correct cardholder by analysing additional details like email addresses, phone numbers, and IP addresses. Using real-time data enrichment allows you to spot inconsistencies quickly and make informed decisions to prevent fraud.<\/span><\/p>\n<h3><b>2. Social Media Verification<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Social media verification involves checking fraudsters&#8217; social profiles to validate their authenticity. Creating detailed social footprints is time-consuming, which discourages fraudsters. Reverse social profile lookup helps uncover mismatched or fake identities.<\/span><\/p>\n<h3><b>3. Device Fingerprinting<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Device fingerprinting collects details about how users connect to your website, including browser and device configurations. By identifying suspicious changes in device behaviour, it creates profiles based on unique software and hardware setups to detect fraud attempts.<\/span><\/p>\n<h3><b>4. Fraud Scores<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Fraud scores assess transaction risk by analysing user and transaction data. These scores are generated by fraud prevention systems and allow you to apply customisable rules and thresholds. This helps you categorise transactions by risk level and take appropriate action.<\/span><\/p>\n<h3><b>5. Machine Learning for Fraud Detection<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Machine learning helps analyse real-time and historical transaction data to identify hidden fraud patterns. For example, it can detect unusual spending habits that might go unnoticed by traditional systems, making fraud detection more efficient and proactive.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best-Practices-for-Effective-Fraud-Detection\"><\/span><b>Best Practices for Effective Fraud Detection<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><b>1. Implement Multi-Layered Security Measures<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A single layer of security is often not enough to deter sophisticated fraud attempts. Implementing multi-layered security measures creates multiple checkpoints, making it harder for fraudsters to penetrate your systems.\u00a0<\/span><\/p>\n<h3><b>2. Regularly Update and Train Fraud Detection Systems<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Fraud tactics evolve rapidly, requiring systems to keep up with the latest threats. Regularly updating fraud detection software ensures it can identify emerging risks. Training systems using real-world and simulated scenarios improve their ability to recognise and respond to complex fraud patterns. Continuous updates also enhance the accuracy of machine learning models, enabling them to adapt to new fraud techniques over time.<\/span><\/p>\n<h3><b>3. Use Encryption and Secure Authentication Processes<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Encryption protects sensitive data, such as payment details and personal information, during transmission, making it unreadable to unauthorised parties. Coupled with secure authentication methods like two-factor authentication (2FA) or biometric logins, this adds an extra layer of security. These methods ensure only legitimate users can access accounts or approve transactions, significantly reducing the risk of unauthorised activities.<\/span><\/p>\n<h3><b>4. Monitor Emerging Fraud Trends and Adapt Accordingly<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Fraudsters constantly develop new schemes, such as advanced phishing attempts or fake payment requests. Keeping track of these trends through industry reports and case studies helps you stay informed. Adapting your fraud detection processes\u2014such as integrating new tools or updating algorithms\u2014ensures your system remains resilient against novel threats.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><b>Conclusion<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Fraud detection in financial transactions<span style=\"font-weight: 400;\"> is essential for protecting your business, customers, and reputation. By implementing advanced tools, staying informed about emerging threats, and following best practices, you can significantly reduce the risk of fraudulent activities. Prioritising fraud prevention ensures secure transactions and builds trust, helping your business grow sustainably in a digital-first world.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently-Asked-Questions-FAQs\"><\/span><b>Frequently Asked Questions (FAQs)<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><b>1. Why is transaction fraud detection essential for businesses?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Transaction fraud detection is crucial to safeguard your business from financial losses and protect your customers&#8217; sensitive information. It helps prevent unauthorised activities, ensures compliance with regulations, and maintains customer trust by ensuring secure transactions.<\/span><\/p>\n<h3><b>2. What are the common types of transaction fraud that businesses face today?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Businesses commonly face credit card fraud, phishing scams, account takeovers, and invoice fraud. Other types include identity theft, wire transfer fraud, and insider fraud, which target financial systems, often leading to significant monetary and reputational damage.<\/span><\/p>\n<h3><b>3. How is transaction fraud detected?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Fraud detection involves monitoring transactions in real time, analysing behavioural patterns, and using tools like machine learning and fraud scoring. Techniques such as device fingerprinting, social media verification, and biometric authentication help identify suspicious activities and prevent fraudulent transactions.<\/span><\/p>\n<h3><b>4. How do you control fraudulent transactions?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Fraudulent transactions can be controlled by implementing multi-layered security measures, using advanced tools like encryption and fraud scores, and monitoring transactions regularly. Staying updated on emerging fraud trends and training your fraud detection systems ensures you can effectively adapt to and mitigate new threats.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What Is Fraud Detection in Financial Transactions? Fraud detection in financial transactions is identifying and stopping fake or unauthorised activities in financial systems. It ensures customer security by monitoring transactions for unusual patterns that indicate fraud, such as fake transactions, UPI frauds, or e-commerce fraud. The key objectives of fraud detection include identifying suspicious behaviour,<\/p>\n","protected":false},"author":151156580,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1387],"tags":[4056,4057],"class_list":{"0":"post-14767","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-payments","7":"tag-financial-fraud-detection","8":"tag-fraud-detection"},"_links":{"self":[{"href":"https:\/\/learn.razorpay.in\/learn\/wp-json\/wp\/v2\/posts\/14767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/learn.razorpay.in\/learn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/learn.razorpay.in\/learn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/learn.razorpay.in\/learn\/wp-json\/wp\/v2\/users\/151156580"}],"replies":[{"embeddable":true,"href":"https:\/\/learn.razorpay.in\/learn\/wp-json\/wp\/v2\/comments?post=14767"}],"version-history":[{"count":5,"href":"https:\/\/learn.razorpay.in\/learn\/wp-json\/wp\/v2\/posts\/14767\/revisions"}],"predecessor-version":[{"id":17540,"href":"https:\/\/learn.razorpay.in\/learn\/wp-json\/wp\/v2\/posts\/14767\/revisions\/17540"}],"wp:attachment":[{"href":"https:\/\/learn.razorpay.in\/learn\/wp-json\/wp\/v2\/media?parent=14767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/learn.razorpay.in\/learn\/wp-json\/wp\/v2\/categories?post=14767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/learn.razorpay.in\/learn\/wp-json\/wp\/v2\/tags?post=14767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}