{"id":962,"date":"2023-10-11T13:26:00","date_gmt":"2023-10-11T12:26:00","guid":{"rendered":"https:\/\/conscia.com\/ie\/?p=962"},"modified":"2025-09-23T13:31:47","modified_gmt":"2025-09-23T12:31:47","slug":"enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data","status":"publish","type":"post","link":"https:\/\/conscia.com\/ie\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/","title":{"rendered":"Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data"},"content":{"rendered":"\n<p class=\" wp-block-paragraph\">Enumeration attacks, especially banking identification number (BIN) generation attacks, enable threat actors to produce and&nbsp;validate&nbsp;payment card numbers. These attacks, while not new, are high-effort and offer low rewards. However, they can still pose a threat to the&nbsp;payments&nbsp;ecosystem.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group  spacing-after--4 spacing-before--3 background-graphics--none has-gray-300-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading  wp-block-paragraph spacing-before--2\">Understanding Enumeration Attacks&nbsp;<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">Enumeration attacks involve \u201cguessing\u201d the correct combinations of values, with the attacker knowing at least one correct value. For example, using BIN generation, a subset of enumeration attacks, attackers can use algorithms like the Luhn Algorithm to generate a valid payment card number.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><a href=\"https:\/\/www.ncl.ac.uk\/press\/articles\/archive\/2016\/12\/cyberattack\/\">Research from Newcastle University has highlighted that cybercriminals can use enumeration attacks to identify unknown payment card data elements.<\/a>&nbsp;They can start with one piece of data, such as the payment card\u2019s primary account number (PAN), and make multiple attempts on e-commerce sites with minimal verification requirements to guess other values. This method can potentially reveal a card\u2019s expiration date, CVV2, and address details within seconds.<\/p>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How it Works<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">Threat actors, in practice, often obtain complete card data sets, including personal identification information (PII), when they buy payment card data from dark web shops. However, BIN generation attacks offer them an alternative method to get valid card data without making such purchases.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">The process generally involves:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Generation<\/strong>: Use the card issuer\u2019s BINs to produce potential card numbers.<\/li>\n\n\n\n<li><strong>Validation<\/strong>: Confirm if the generated numbers are valid.<\/li>\n\n\n\n<li><strong>Monetization<\/strong>: Use the valid card data for fraudulent activities.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image\" id=\"attachment_20068\"><img decoding=\"async\" src=\"https:\/\/conscia.com\/wp-content\/uploads\/2023\/10\/validation-process-by-fraudsters-logo.jpg\" alt=\"Figure 1 - A high-level concept of the Validation process by fraudsters\" class=\"wp-image-20068\"\/><figcaption class=\"wp-element-caption\">Figure 1 \u2013 A high-level concept of the Validation process by fraudsters<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Validating Generated Payment Card Data<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">For attackers, validating the generated card numbers is crucial. They can easily produce tens of thousands of valid card numbers from a single BIN. However, these numbers must be correctly associated with other card data values, such as expiration dates and CVV2, to be used fraudulently.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Methods used for validation include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Using Stripe\u2019s Live Mode Secret API Key<\/strong>: Attackers can exploit the Stripe secret API key to validate the card data obtained from enumeration attacks.<\/li>\n\n\n\n<li><strong>Utilizing Free Online Checker Services<\/strong>: A growing number of free card-checking services are emerging, making card-testing services more accessible.<\/li>\n\n\n\n<li><strong>Employing Ready-to-Go Checker Software<\/strong>: Some threat actors sell software that others can use to validate generated card data.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\" id=\"attachment_20069\"><img decoding=\"async\" src=\"https:\/\/conscia.com\/wp-content\/uploads\/2023\/10\/example-of-cc-checker-online.jpg\" alt=\"Figure 2 - An example of CC Checker online\" class=\"wp-image-20069\"\/><figcaption class=\"wp-element-caption\">Figure 2 \u2013 An example of CC Checker online<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigating the Risks<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">To address the threats posed by enumeration attacks:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Card issuers should institute velocity checks<\/strong>&nbsp;to detect unusual transaction spikes within certain BIN sets.<\/li>\n\n\n\n<li>Merchant acquirers should encourage or require merchants to adopt&nbsp;<strong>more stringent verification processes<\/strong>.<\/li>\n\n\n\n<li>All parties involved should adopt and disseminate&nbsp;<strong>best practices, like Visa\u2019s 2021 guidelines against enumeration attacks<\/strong>, and use&nbsp;<strong>automated anti-fraud systems<\/strong>.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">While threat actors can obtain valid payment card data through the methods described, the success of these fraudulent schemes largely depends on the ability to exploit weaknesses in merchant verification processes. As merchants adopt more rigorous verification methods, the effectiveness of enumeration attacks will likely diminish. Nevertheless, the ongoing evolution of cyber threats means stakeholders must remain vigilant and continually adapt their defenses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enumeration attacks, especially banking identification number (BIN) generation attacks, enable threat actors to produce and&nbsp;validate&nbsp;payment card numbers. These attacks, while not new, are high-effort and offer low rewards. However, they can still pose a threat to the&nbsp;payments&nbsp;ecosystem.&nbsp; Understanding Enumeration Attacks&nbsp; Enumeration attacks involve \u201cguessing\u201d the correct combinations of values, with the attacker knowing at least [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":963,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[9,22],"global_partners":[],"global_industries":[25],"global_business_outcome":[43],"global_types":[],"class_list":["post-962","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","global_solutions-cybersecurity","global_solutions-threat-intelligence","global_industries-all-industries","global_business_outcome-security-operations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data - Conscia Ireland<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data\" \/>\n<meta property=\"og:description\" content=\"Enumeration attacks, especially banking identification number (BIN) generation attacks, enable threat actors to produce and&nbsp;validate&nbsp;payment card numbers. These attacks, while not new, are high-effort and offer low rewards. However, they can still pose a threat to the&nbsp;payments&nbsp;ecosystem.&nbsp; Understanding Enumeration Attacks&nbsp; Enumeration attacks involve \u201cguessing\u201d the correct combinations of values, with the attacker knowing at least [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia Ireland\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-11T12:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-23T12:31:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mikkel Elvej\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikkel Elvej\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/\"},\"author\":{\"name\":\"Mikkel Elvej\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\"},\"headline\":\"Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data\",\"datePublished\":\"2023-10-11T12:26:00+00:00\",\"dateModified\":\"2025-09-23T12:31:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/\"},\"wordCount\":518,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/ie\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/\",\"url\":\"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/\",\"name\":\"Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data - Conscia Ireland\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408.jpg\",\"datePublished\":\"2023-10-11T12:26:00+00:00\",\"dateModified\":\"2025-09-23T12:31:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/ie\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/ie\/#website\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"name\":\"Conscia Ireland\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/ie\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/ie\/#organization\",\"name\":\"Conscia Ireland\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"width\":994,\"height\":241,\"caption\":\"Conscia Ireland\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/conscia-ireland\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\",\"name\":\"Mikkel Elvej\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"caption\":\"Mikkel Elvej\"},\"url\":\"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data - Conscia Ireland","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/","og_locale":"en_US","og_type":"article","og_title":"Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data","og_description":"Enumeration attacks, especially banking identification number (BIN) generation attacks, enable threat actors to produce and&nbsp;validate&nbsp;payment card numbers. These attacks, while not new, are high-effort and offer low rewards. However, they can still pose a threat to the&nbsp;payments&nbsp;ecosystem.&nbsp; Understanding Enumeration Attacks&nbsp; Enumeration attacks involve \u201cguessing\u201d the correct combinations of values, with the attacker knowing at least [&hellip;]","og_url":"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/","og_site_name":"Conscia Ireland","article_published_time":"2023-10-11T12:26:00+00:00","article_modified_time":"2025-09-23T12:31:47+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408.jpg","type":"image\/jpeg"}],"author":"Mikkel Elvej","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mikkel Elvej","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/"},"author":{"name":"Mikkel Elvej","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e"},"headline":"Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data","datePublished":"2023-10-11T12:26:00+00:00","dateModified":"2025-09-23T12:31:47+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/ie\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/"},"wordCount":518,"publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"image":{"@id":"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/ie\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/","url":"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/","name":"Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data - Conscia Ireland","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408.jpg","datePublished":"2023-10-11T12:26:00+00:00","dateModified":"2025-09-23T12:31:47+00:00","breadcrumb":{"@id":"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#primaryimage","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408.jpg","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/credit-cards_113236408.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/blog\/enumeration-attacks-a-deep-dive-into-threat-actors-generating-valid-payment-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/ie\/"},{"@type":"ListItem","position":2,"name":"Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/ie\/#website","url":"https:\/\/conscia.com\/ie\/","name":"Conscia Ireland","description":"","publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conscia.com\/ie\/#organization","name":"Conscia Ireland","url":"https:\/\/conscia.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","width":994,"height":241,"caption":"Conscia Ireland"},"image":{"@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/conscia-ireland\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e","name":"Mikkel Elvej","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","caption":"Mikkel Elvej"},"url":"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/comments?post=962"}],"version-history":[{"count":2,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/962\/revisions"}],"predecessor-version":[{"id":966,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/962\/revisions\/966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media\/963"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media?parent=962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/categories?post=962"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_solutions?post=962"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_partners?post=962"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_industries?post=962"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_business_outcome?post=962"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_types?post=962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}