{"id":96010,"date":"2026-01-17T09:30:00","date_gmt":"2026-01-17T08:30:00","guid":{"rendered":"https:\/\/ru.law\/?p=96010"},"modified":"2026-03-12T11:37:18","modified_gmt":"2026-03-12T10:37:18","slug":"kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht","status":"publish","type":"post","link":"https:\/\/ru.law\/en\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/","title":{"rendered":"Crypto fraud through deepfakes \u2013 how AI enables new scams"},"content":{"rendered":"<p>Cryptocurrency fraud is evolving rapidly. While traditional phishing emails are becoming increasingly ineffective, perpetrators are relying more and more on artificial intelligence and deepfake technology. Deceptively realistic videos, voices, and live calls are used to build trust and persuade victims to make financial transactions. This form of crypto fraud represents a new level of escalation in digital economic crime.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Deepfakes as a new tool in investment fraud<\/strong><\/h2>\n\n\n\n<p>Deepfakes are AI-generated content that realistically imitates real people. Voices, facial expressions, and even live reactions can be replicated almost flawlessly. This technology is increasingly being used for fraudulent investment offers. Victims see supposedly well-known personalities, company representatives, or government authorities promoting allegedly safe crypto investments or warning of urgent security issues.<\/p>\n\n\n\n<p>The combination of visual and auditory deception is particularly dangerous. What was once recognizable as an obvious attempt at fraud now appears credible and professional.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Massive damage caused by AI-powered crypto fraud<\/strong><\/h2>\n\n\n\n<p>International reports illustrate the scale of this trend. In 2024 alone, known losses from cryptocurrency fraud worldwide amounted to several billion US dollars. A significant portion of this is attributable to fraud schemes employing deepfakes. Law enforcement agencies report uncovering dozens of fraud networks, particularly in Asia, that specifically utilize AI-based deception.<\/p>\n\n\n\n<p>Western countries are also reporting a sharp increase in the number of cases. The use of AI leads to a higher success rate per fraud case, as victims are manipulated more intensively and kept engaged for longer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Deceptively genuine authority and targeted manipulation<\/strong><\/h2>\n\n\n\n<p>A key feature of modern deepfake scams is the deliberate simulation of authority. Perpetrators impersonate well-known businesspeople, stockbrokers, or government investigators. In some cases, they even use video calls lasting several days to put victims under psychological pressure. This form of so-called digital hostage-taking combines technological deception with social coercion.<\/p>\n\n\n\n<p>Through falsified backgrounds, official-looking documents, and persuasive language, a situation is created in which even skeptical people make decisions they would not make under normal circumstances.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Deepfake support calls and remote access<\/strong><\/h2>\n\n\n\n<p>One particularly widespread scam involves deepfake calls from supposed support staff of cryptocurrency exchanges. The AI-generated voices sound authentic and use technical jargon. Victims are warned of alleged security incidents and urged to take immediate action.<\/p>\n\n\n\n<p>Later, the perpetrators often request remote access to computers or smartphones. Under the guise of a technical review, they gain direct access to wallets, banking apps, and security codes. Significant assets can be stolen within minutes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Target group: older users and high number of unreported cases<\/strong><\/h2>\n\n\n\n<p>Statistics show that older users in particular are increasingly affected. Many are less familiar with AI voice clones or fake video calls and rely on seemingly official instructions. The number of unreported cases is high, as victims are often ashamed or only recognize the fraud late.<\/p>\n\n\n\n<p>The actual damage is therefore likely to be significantly higher than the known figures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Legal classification of deepfake crypto fraud<\/strong><\/h2>\n\n\n\n<p>From a legal perspective, these situations regularly constitute investment fraud, sometimes combined with identity theft, computer fraud, and organized crime. The technical complexity complicates investigations but does not preclude legal action. Payment flows, communication histories, and technical access data can provide starting points for investigation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why traditional caution is no longer enough<\/strong><\/h2>\n\n\n\n<p>These developments clearly show that visual or auditory verification alone no longer provides sufficient protection. Deepfake technology bypasses traditional warning signals. The fraud no longer relies on mass fraud, but on targeted, intensive manipulation of individuals, resulting in significant financial losses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Classification and legal support<\/strong><\/h2>\n\n\n\n<p>The professionalization of AI-powered crypto fraud requires an equally professional legal response. <a href=\"https:\/\/ru.law\/en\/kontakt\/\">RU Law<\/a> is specialized in the legal investigation of crypto fraud and supports those affected in classifying the facts and enforcing their claims.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-faqs-haufig-gestellte-fragen-zum-kryptobetrug\"><strong>FAQs \u2013 Frequently Asked Questions about Crypto Fraud<\/strong><\/h2>\n\n\n<div class=\"wp-block-uagb-faq uagb-faq__outer-wrap uagb-block-ed0fa9cc uagb-faq-icon-row uagb-faq-layout-accordion uagb-faq-expand-first-true uagb-faq-inactive-other-true uagb-faq__wrap uagb-buttons-layout-wrap uagb-faq-equal-height\" data-faqtoggle=\"true\" role=\"tablist\"><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-f9785a0e\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">What is deepfake crypto fraud?<\/span><\/div><div class=\"uagb-faq-content\"><p>Deepfake crypto fraud refers to scams that use artificial intelligence to create deceptively realistic videos or voices of real people. This content is used to build trust and entice victims to invest in cryptocurrencies.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-eef02c53\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">How are deepfakes used in crypto fraud?<\/span><\/div><div class=\"uagb-faq-content\"><p>Perpetrators use deepfakes to impersonate celebrities, alleged stock market employees, or government agencies. These deepfake videos or calls are used to promote supposedly secure crypto investments or to warn of alleged security problems.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-7b6999cf\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Why are deepfake scams particularly dangerous?<\/span><\/div><div class=\"uagb-faq-content\"><p>Deepfakes appear authentic and bypass classic warning signs. Voice, facial expressions, and speech seem credible, so even skeptical people can be manipulated.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-a5f0bb69\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">What role do alleged support calls play in deepfake crypto fraud?<\/span><\/div><div class=\"uagb-faq-content\"><p>Often, perpetrators impersonate support staff from cryptocurrency exchanges. Using AI-generated voices, they demand security measures that actually lead to the transfer of cryptocurrencies or the granting of remote access.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-28b6f38a\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Can experienced users also fall victim to deepfake crypto fraud?<\/span><\/div><div class=\"uagb-faq-content\"><p>Yes. The technical quality of modern deepfakes is so high that even technically skilled or economically experienced people cannot immediately recognize the fraud.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-922e0bf1\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">What warning signs indicate deepfake crypto fraud?<\/span><\/div><div class=\"uagb-faq-content\"><p>Typical signs include unexpected calls, time pressure, requests for remote access, alleged security problems, and unusual payment instructions in cryptocurrencies.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-910f255b\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Why are cryptocurrencies particularly suitable for deepfake fraud?<\/span><\/div><div class=\"uagb-faq-content\"><p>Cryptocurrencies enable fast, cross-border transactions and offer perpetrators a high degree of anonymity. Once transferred, the value is usually irreversible.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-44975cc3\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">How high are the damages caused by deepfake crypto fraud?<\/span><\/div><div class=\"uagb-faq-content\"><p>Internationally, the damage amounts to billions. Authorities report a sharp increase in the number of cases, particularly involving fraud schemes using AI-powered deception.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-7ab03cea\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Is deepfake crypto fraud a crime?<\/span><\/div><div class=\"uagb-faq-content\"><p>Yes. Legally, it is regularly considered investment fraud, sometimes supplemented by identity theft, computer fraud, or commercial activity.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-ab813d0e\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Who supports victims of deepfake crypto fraud?<\/span><\/div><div class=\"uagb-faq-content\"><p>RU Law specializes in the legal handling of crypto fraud and supports those affected in classifying the facts and enforcing their claims.<\/p><\/div><\/div><\/div>\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Der Betrug mit Kryptow\u00e4hrungen entwickelt sich rasant weiter. W\u00e4hrend klassische Phishing-Mails zunehmend an Wirkung verlieren, setzen T\u00e4ter vermehrt auf k\u00fcnstliche Intelligenz und Deepfake-Technologie. T\u00e4uschend echte [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":96007,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1220,1448],"tags":[1415,1225,1419,1413,1408,1224],"class_list":["post-96010","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bank-und-kapitalmarktrecht","category-krypto","tag-anlagebtrug","tag-betrug","tag-deepfake","tag-kryptobetrug","tag-kryptowaehrung","tag-online-banking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Kryptobetrug durch Deepfakes: KI erm\u00f6glciht neue Betrugsmasche - R&amp;U<\/title>\n<meta name=\"description\" content=\"Wie KI mit gef\u00e4lschten Videos und Stimmen neue Betrugsmaschen erm\u00f6glicht \u2013 Risiken, Sch\u00e4den und rechtliche Einordnung.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ru.law\/en\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kryptobetrug durch Deepfakes \u2013 wie KI neue Betrugsmaschen erm\u00f6glicht\" \/>\n<meta property=\"og:description\" content=\"Wie KI mit gef\u00e4lschten Videos und Stimmen neue Betrugsmaschen erm\u00f6glicht \u2013 Risiken, Sch\u00e4den und rechtliche Einordnung.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ru.law\/en\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/\" \/>\n<meta property=\"og:site_name\" content=\"R&amp;U\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogertUlbrich\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-17T08:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T10:37:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stefan Selge\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RogertUlbrich\" \/>\n<meta name=\"twitter:site\" content=\"@RogertUlbrich\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/\"},\"author\":{\"name\":\"Stefan Selge\",\"@id\":\"https:\\\/\\\/ru.law\\\/#\\\/schema\\\/person\\\/10e5b85e615f8a9d0bb96174432e1e1a\"},\"headline\":\"Kryptobetrug durch Deepfakes \u2013 wie KI neue Betrugsmaschen erm\u00f6glicht\",\"datePublished\":\"2026-01-17T08:30:00+00:00\",\"dateModified\":\"2026-03-12T10:37:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/\"},\"wordCount\":628,\"publisher\":{\"@id\":\"https:\\\/\\\/ru.law\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/AdobeStock_747785012-scaled.jpeg\",\"keywords\":[\"Anlagebtrug\",\"Betrug\",\"Deepfake\",\"Kryptobetrug\",\"Kryptow\u00e4hrung\",\"Online-Banking\"],\"articleSection\":[\"Bank- und Kapitalmarktrecht\",\"Krypto\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/\",\"url\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/\",\"name\":\"Kryptobetrug durch Deepfakes: KI erm\u00f6glciht neue Betrugsmasche - R&amp;U\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ru.law\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/AdobeStock_747785012-scaled.jpeg\",\"datePublished\":\"2026-01-17T08:30:00+00:00\",\"dateModified\":\"2026-03-12T10:37:18+00:00\",\"description\":\"Wie KI mit gef\u00e4lschten Videos und Stimmen neue Betrugsmaschen erm\u00f6glicht \u2013 Risiken, Sch\u00e4den und rechtliche Einordnung.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/AdobeStock_747785012-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/AdobeStock_747785012-scaled.jpeg\",\"width\":2560,\"height\":1440,\"caption\":\"Deepfake deep learning fake news generator modern internet technology concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ru.law\\\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/ru.law\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kryptobetrug durch Deepfakes \u2013 wie KI neue Betrugsmaschen erm\u00f6glicht\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ru.law\\\/#website\",\"url\":\"https:\\\/\\\/ru.law\\\/\",\"name\":\"R&U\",\"description\":\"Verbraucheranw\u00e4lte\",\"publisher\":{\"@id\":\"https:\\\/\\\/ru.law\\\/#organization\"},\"alternateName\":\"Rogert & Ulbrich\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ru.law\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ru.law\\\/#organization\",\"name\":\"Kanzlei Rogert & Ulbrich\",\"url\":\"https:\\\/\\\/ru.law\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ru.law\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/logo-ru-law.svg\",\"contentUrl\":\"https:\\\/\\\/ru.law\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/logo-ru-law.svg\",\"width\":992,\"height\":259,\"caption\":\"Kanzlei Rogert & Ulbrich\"},\"image\":{\"@id\":\"https:\\\/\\\/ru.law\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RogertUlbrich\\\/\",\"https:\\\/\\\/x.com\\\/RogertUlbrich\",\"https:\\\/\\\/www.instagram.com\\\/rogertulbrich\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rogert-ulbrich\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCganCgpvwpPFqMFf1vVmG2A\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ru.law\\\/#\\\/schema\\\/person\\\/10e5b85e615f8a9d0bb96174432e1e1a\",\"name\":\"Stefan Selge\",\"url\":\"https:\\\/\\\/ru.law\\\/en\\\/author\\\/selge\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kryptobetrug durch Deepfakes: KI erm\u00f6glciht neue Betrugsmasche - R&amp;U","description":"Wie KI mit gef\u00e4lschten Videos und Stimmen neue Betrugsmaschen erm\u00f6glicht \u2013 Risiken, Sch\u00e4den und rechtliche Einordnung.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ru.law\/en\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/","og_locale":"en_GB","og_type":"article","og_title":"Kryptobetrug durch Deepfakes \u2013 wie KI neue Betrugsmaschen erm\u00f6glicht","og_description":"Wie KI mit gef\u00e4lschten Videos und Stimmen neue Betrugsmaschen erm\u00f6glicht \u2013 Risiken, Sch\u00e4den und rechtliche Einordnung.","og_url":"https:\/\/ru.law\/en\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/","og_site_name":"R&amp;U","article_publisher":"https:\/\/www.facebook.com\/RogertUlbrich\/","article_published_time":"2026-01-17T08:30:00+00:00","article_modified_time":"2026-03-12T10:37:18+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg","type":"image\/jpeg"}],"author":"Stefan Selge","twitter_card":"summary_large_image","twitter_creator":"@RogertUlbrich","twitter_site":"@RogertUlbrich","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#article","isPartOf":{"@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/"},"author":{"name":"Stefan Selge","@id":"https:\/\/ru.law\/#\/schema\/person\/10e5b85e615f8a9d0bb96174432e1e1a"},"headline":"Kryptobetrug durch Deepfakes \u2013 wie KI neue Betrugsmaschen erm\u00f6glicht","datePublished":"2026-01-17T08:30:00+00:00","dateModified":"2026-03-12T10:37:18+00:00","mainEntityOfPage":{"@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/"},"wordCount":628,"publisher":{"@id":"https:\/\/ru.law\/#organization"},"image":{"@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#primaryimage"},"thumbnailUrl":"https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg","keywords":["Anlagebtrug","Betrug","Deepfake","Kryptobetrug","Kryptow\u00e4hrung","Online-Banking"],"articleSection":["Bank- und Kapitalmarktrecht","Krypto"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/","url":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/","name":"Kryptobetrug durch Deepfakes: KI erm\u00f6glciht neue Betrugsmasche - R&amp;U","isPartOf":{"@id":"https:\/\/ru.law\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#primaryimage"},"image":{"@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#primaryimage"},"thumbnailUrl":"https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg","datePublished":"2026-01-17T08:30:00+00:00","dateModified":"2026-03-12T10:37:18+00:00","description":"Wie KI mit gef\u00e4lschten Videos und Stimmen neue Betrugsmaschen erm\u00f6glicht \u2013 Risiken, Sch\u00e4den und rechtliche Einordnung.","breadcrumb":{"@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#primaryimage","url":"https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg","contentUrl":"https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg","width":2560,"height":1440,"caption":"Deepfake deep learning fake news generator modern internet technology concept."},{"@type":"BreadcrumbList","@id":"https:\/\/ru.law\/kryptobetrug-durch-deepfakes-wie-ki-neue-betrugsmaschen-ermoeglicht\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/ru.law\/"},{"@type":"ListItem","position":2,"name":"Kryptobetrug durch Deepfakes \u2013 wie KI neue Betrugsmaschen erm\u00f6glicht"}]},{"@type":"WebSite","@id":"https:\/\/ru.law\/#website","url":"https:\/\/ru.law\/","name":"R&amp;U","description":"Consumer lawyers","publisher":{"@id":"https:\/\/ru.law\/#organization"},"alternateName":"Rogert & Ulbrich","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ru.law\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ru.law\/#organization","name":"Rogert &amp; Ulbrich Law Firm","url":"https:\/\/ru.law\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ru.law\/#\/schema\/logo\/image\/","url":"https:\/\/ru.law\/wp-content\/uploads\/2020\/12\/logo-ru-law.svg","contentUrl":"https:\/\/ru.law\/wp-content\/uploads\/2020\/12\/logo-ru-law.svg","width":992,"height":259,"caption":"Kanzlei Rogert & Ulbrich"},"image":{"@id":"https:\/\/ru.law\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogertUlbrich\/","https:\/\/x.com\/RogertUlbrich","https:\/\/www.instagram.com\/rogertulbrich\/","https:\/\/www.linkedin.com\/company\/rogert-ulbrich\/","https:\/\/www.youtube.com\/channel\/UCganCgpvwpPFqMFf1vVmG2A"]},{"@type":"Person","@id":"https:\/\/ru.law\/#\/schema\/person\/10e5b85e615f8a9d0bb96174432e1e1a","name":"Stefan Selge","url":"https:\/\/ru.law\/en\/author\/selge\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg",2560,1440,false],"thumbnail":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg",128,72,false],"medium":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg",2560,1440,false],"medium_large":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-768x432.jpeg",768,432,true],"large":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-scaled.jpeg",2560,1440,false],"1536x1536":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-1536x864.jpeg",1536,864,true],"2048x2048":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-2048x1152.jpeg",2048,1152,true],"trp-custom-language-flag":["https:\/\/ru.law\/wp-content\/uploads\/2026\/01\/AdobeStock_747785012-18x10.jpeg",18,10,true]},"uagb_author_info":{"display_name":"Stefan Selge","author_link":"https:\/\/ru.law\/en\/author\/selge\/"},"uagb_comment_info":0,"uagb_excerpt":"Der Betrug mit Kryptow\u00e4hrungen entwickelt sich rasant weiter. W\u00e4hrend klassische Phishing-Mails zunehmend an Wirkung verlieren, setzen T\u00e4ter vermehrt auf k\u00fcnstliche Intelligenz und Deepfake-Technologie. T\u00e4uschend echte [&hellip;]","_links":{"self":[{"href":"https:\/\/ru.law\/en\/wp-json\/wp\/v2\/posts\/96010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ru.law\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ru.law\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ru.law\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ru.law\/en\/wp-json\/wp\/v2\/comments?post=96010"}],"version-history":[{"count":0,"href":"https:\/\/ru.law\/en\/wp-json\/wp\/v2\/posts\/96010\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ru.law\/en\/wp-json\/wp\/v2\/media\/96007"}],"wp:attachment":[{"href":"https:\/\/ru.law\/en\/wp-json\/wp\/v2\/media?parent=96010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ru.law\/en\/wp-json\/wp\/v2\/categories?post=96010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ru.law\/en\/wp-json\/wp\/v2\/tags?post=96010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}