{"id":19689,"date":"2023-05-08T14:05:50","date_gmt":"2023-05-08T08:35:50","guid":{"rendered":"https:\/\/www.stellarinfo.co.in\/blog\/?p=19689"},"modified":"2025-10-10T13:50:13","modified_gmt":"2025-10-10T08:20:13","slug":"royal-ransomware-attacks-tips-to-recover-files-safeguard-data","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/","title":{"rendered":"Royal Ransomware Attacks: Tips to  Recover Files &#038; Safeguard Data"},"content":{"rendered":"<table class=\" alignleft\" style=\"border: 2px dashed #eeeeee; height: 121px;\" width=\"989\">\n<tbody>\n<tr>\n<th style=\"background-color: #eee; text-align: justify;\">\n<p style=\"text-align: justify;\"><strong>Summary: Indian cybersecurity agencies have recently warned against Royal Ransomware, which is attacking critical sectors in India and individuals, asking for a ransom to decrypt the data and not leaking it to the public domain. Learn how to protect your business from ransomware and solutions to repair and restore your files.<\/strong><\/p>\n<p><a href=\"https:\/\/cloud.stellarinfo.co.in\/blog\/sql-repair\/StellarRepairforMSSQL.exe\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10906 size-full\" src=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/12\/free-download-win.png\" alt=\"Free Download\" width=\"230\" height=\"70\" srcset=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/12\/free-download-win.png 230w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/12\/free-download-win-150x46.png 150w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/a><\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Table of Content:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/#srv1\"><strong> How Does Royal Ransomware Work?<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/#srv2\"><strong>Common Signs of a Royal Ransomware Attack<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/#srv3\"><strong>How to Safeguard Your Organization from Royal Ransomware?<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/#srv4\"><strong>Restore Data After Royal Ransomware Attack<\/strong><\/a><\/li>\n<\/ul>\n<p>Ransomware attacks have become common in today&#8217;s digital age. Over the few years, cyber threats have significantly increased, with <em><strong>ransomware being one of the most prevalent and dangerous types.<\/strong><\/em><\/p>\n<p>Recently, the Indian cyber security agency warned against the &#8220;Royal ransomware&#8221; attack, which is<em><strong> targeting critical sectors such as education, healthcare, communications, and individuals.<\/strong><\/em><\/p>\n<p>The threat actors or cybercriminals behind the Royal ransomware are using a technique referred to as <em><strong>&#8220;double extortion,&#8221;<\/strong> <\/em>where they not only <em><strong>encrypt the victim&#8217;s data<\/strong><\/em> but also<em><strong> threaten to release it publicly if their victim does not pay or fails to pay the ransom<\/strong><\/em>. The ransom is asked in cryptocurrency, typically Bitcoin, which provides a greater degree of anonymity and makes it hard to trace.<\/p>\n<p><a href=\"https:\/\/www.stellarinfo.co.in\/contact\/corporate-customer-enquiry.php\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-22133 size-full\" src=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2023\/05\/Get-our-expert-help-to-repair-your-MS-SQL-Database-File-002.jpg\" alt=\"\" width=\"800\" height=\"448\" srcset=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2023\/05\/Get-our-expert-help-to-repair-your-MS-SQL-Database-File-002.jpg 800w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2023\/05\/Get-our-expert-help-to-repair-your-MS-SQL-Database-File-002-300x168.jpg 300w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2023\/05\/Get-our-expert-help-to-repair-your-MS-SQL-Database-File-002-150x84.jpg 150w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2023\/05\/Get-our-expert-help-to-repair-your-MS-SQL-Database-File-002-768x430.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<h2><strong id=\"srv1\">How Does Royal Ransomware Work?<\/strong><\/h2>\n<p>Similar to many other ransomware attacks, Royal ransomware attacks also begin with a phishing email,<em><strong> aimed at tricking unsuspecting employees into clicking on a malicious link or downloading an infected attachment.<\/strong><\/em><\/p>\n<p>Once the ransomware-infected attachment is downloaded and clicked, it quickly installs on the victim&#8217;s computer and spreads to the organization&#8217;s network, encrypting files and rendering them inaccessible.<\/p>\n<p>The threat actors then ask for a ransom payment in exchange for the decryption key and not leaking personal data in the public domain via a ransom note. This puts more pressure on the victim to pay the ransom.<\/p>\n<p>In many cases, the ransom amount is substantial, based on the targeted organizations or individuals and the potential value of the compromised data.<\/p>\n<p>However, paying the ransom does not guarantee that attackers will decrypt the data or send the decryption key.<\/p>\n<p>In some instances, we have seen attackers taking the ransom and not providing the decryption key.<\/p>\n<h3><strong id=\"srv2\">Common Signs of a Royal Ransomware Attack<\/strong><\/h3>\n<p>Below we have discussed some of the <em><strong>most common signs<\/strong><\/em> that you can watch for to detect if your system or network is compromised by the Royal ransomware.<\/p>\n<h4><strong>1. Unusual File Extensions<\/strong><\/h4>\n<p>Similar to any other ransomware, Royal ransomware also generates files with unusual extensions and adds the unfamiliar extension at the end of the encrypted filename as well. This makes it difficult for the victim to access their data without the decryption key.<\/p>\n<h4><strong>2. Ransom Note<\/strong><\/h4>\n<p>Royal ransomware attack also leaves a ransom note on the infected system in plain text or HTML format. You can find the note in the same folder where the encrypted files are located. This ransom note contains instructions on how to pay the ransom and get the decryption key.<\/p>\n<h4><strong>3. Slow System Performance<\/strong><\/h4>\n<p>Royal ransomware attacks may also lead to noticeable performance issues on the infected system as the encryption process requires a significant amount of processing power. This causes the system to respond slowly and reduces the overall system efficiency.<\/p>\n<h4><strong>4. Unusual Network Traffic<\/strong><\/h4>\n<p>Royal ransomware generates a significant amount of data during the encryption process, which is transmitted to the attacker\u2019s servers. This leads to a sudden increase in network traffic, which is an early warning sign of a Royal ransomware attack.<\/p>\n<h4><strong>5. Suspicious User Account Activity<\/strong><\/h4>\n<p>Unusual user account activity is also an indicator of ransomware attacks where attackers create new user accounts with elevated\/administrator privileges. This helps the attackers maintain persistent access to the infected system and network.<\/p>\n<h4><strong>6. Altered System Configuration<\/strong><\/h4>\n<p><strong>Royal ransomware attackers may also make some significant changes to your system configurations, such as:<\/strong><\/p>\n<ul>\n<li>Disable antivirus software<\/li>\n<li>Modify firewall settings<\/li>\n<li>Delete system restore points, etc.<\/li>\n<\/ul>\n<h3><strong id=\"srv3\">How to Safeguard Your Organization from Royal Ransomware?<\/strong><\/h3>\n<p>A <em><strong>regular backup<\/strong><\/em> can help reduce the adverse impact of a Royal ransomware attack on the organization.<\/p>\n<p>Backing up critical data allows organizations and individuals to restore their data and files to a new system without having to pay the ransom to the attackers.<\/p>\n<p>It is also important to <em><strong>choose the right backup solution<\/strong><\/em> for swift data recovery after a ransomware attack.<\/p>\n<p>The 3-2-1 backup rule is one of the most effective ways to safeguard data against a Royal ransomware attack. The 3-2-1 backup rule states,<\/p>\n<ul>\n<li>Create at least<em><strong> three backup copies of critical data<\/strong><\/em><\/li>\n<li>Store the <em><strong>backup on two different types of media<\/strong><\/em>, such as hard drive tape, or SSD<\/li>\n<li>Store at least <em><strong>one copy offsite<\/strong><\/em>.<\/li>\n<\/ul>\n<p>This will help organizations restore their data from unaffected media even if a ransomware attack compromises one of the storage media.<\/p>\n<p>It is also important to check or test the backup and restoration process every once in a while, to ensure that backups are working as intended.<\/p>\n<h3><strong id=\"srv4\">Conclusion: Restore Data After Royal Ransomware Attack<\/strong><\/h3>\n<p>The Royal ransomware threat is an ongoing concern for many organizations and businesses across the globe. The blog shares the potential risk posed by the Royal ransomware, its common signs, and discusses the role of backup in ransomware recovery.<\/p>\n<p>If you or your organization is one of the victims of Royal ransomware, we recommend you disconnect the system from the network immediately and restore data from the backup to a new system.<\/p>\n<p>However, if the backup isn\u2019t available or obsolete, you can try the <strong>Stellar file repair software<\/strong> to try and fix your SQL database, documents, Exchange database (.edb), and other files. If the software does not work or restore the files, you can opt for the <a href=\"https:\/\/www.stellarinfo.co.in\/services\/ransomware-data-recovery.php\" target=\"_blank\" rel=\"noopener\"><strong>Stellar ransomware data recovery service<\/strong><\/a> and <a href=\"https:\/\/www.stellarinfo.co.in\/services\/file-repair.php\" target=\"_blank\" rel=\"noopener\"><strong>Stellar file repair service<\/strong><\/a>.<\/p>\n<p><a href=\"https:\/\/www.stellarinfo.co.in\/\" target=\"_blank\" rel=\"noopener\"><strong>Stellar Data Recovery<\/strong><\/a>, a leading data care company with over<strong> 30 years of expertise<\/strong>, offers a range of file repair and ransomware data recovery services to help businesses repair and restore their files or data damaged or encrypted by ransomware attacks, including Royal ransomware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: Indian cybersecurity agencies have recently warned against Royal Ransomware, which is attacking critical sectors in India and individuals, asking for a ransom to decrypt the data and not leaking it to the public domain. Learn how to protect your business from ransomware and solutions to repair and restore your files. Table of Content: How [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":19691,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[53],"tags":[],"class_list":["post-19689","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sql-data-recovery","has_thumb"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Royal Ransomware: Tips to Recover Files &amp; Safeguard Data<\/title>\n<meta name=\"description\" content=\"Read this blog to know what is Royal Ransomware Attacks, Know Common Signs, tips to Recover Files &amp; Safeguard your Data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Royal Ransomware: Tips to Recover Files &amp; Safeguard Data\" \/>\n<meta property=\"og:description\" content=\"Read this blog to know what is Royal Ransomware Attacks, Know Common Signs, tips to Recover Files &amp; Safeguard your Data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog - Tips and Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-08T08:35:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-10T08:20:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2023\/05\/Royal-Ransomware-Attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vandita Jain\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vandita Jain\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Royal Ransomware: Tips to Recover Files & Safeguard Data","description":"Read this blog to know what is Royal Ransomware Attacks, Know Common Signs, tips to Recover Files & Safeguard your Data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/","og_locale":"en_GB","og_type":"article","og_title":"Royal Ransomware: Tips to Recover Files & Safeguard Data","og_description":"Read this blog to know what is Royal Ransomware Attacks, Know Common Signs, tips to Recover Files & Safeguard your Data.","og_url":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/","og_site_name":"Stellar Data Recovery Blog - Tips and Solutions","article_published_time":"2023-05-08T08:35:50+00:00","article_modified_time":"2025-10-10T08:20:13+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2023\/05\/Royal-Ransomware-Attacks.jpg","type":"image\/jpeg"}],"author":"Vandita Jain","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vandita Jain","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/"},"author":{"name":"Vandita Jain","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/deae85161f02f1cea83a1793d2164add"},"headline":"Royal Ransomware Attacks: Tips to Recover Files &#038; Safeguard Data","datePublished":"2023-05-08T08:35:50+00:00","dateModified":"2025-10-10T08:20:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/"},"wordCount":1001,"commentCount":0,"publisher":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2023\/05\/Royal-Ransomware-Attacks.jpg","articleSection":["Sql Data Recovery"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/","url":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/","name":"Royal Ransomware: Tips to Recover Files & Safeguard Data","isPartOf":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2023\/05\/Royal-Ransomware-Attacks.jpg","datePublished":"2023-05-08T08:35:50+00:00","dateModified":"2025-10-10T08:20:13+00:00","description":"Read this blog to know what is Royal Ransomware Attacks, Know Common Signs, tips to Recover Files & Safeguard your Data.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/#primaryimage","url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2023\/05\/Royal-Ransomware-Attacks.jpg","contentUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2023\/05\/Royal-Ransomware-Attacks.jpg","width":1000,"height":600,"caption":"Royal Ransomware Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.co.in\/blog\/royal-ransomware-attacks-tips-to-recover-files-safeguard-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.co.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Royal Ransomware Attacks: Tips to Recover Files &#038; Safeguard Data"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#website","url":"https:\/\/www.stellarinfo.co.in\/blog\/","name":"Stellar Data Recovery Blog - Tips and Solutions","description":"","publisher":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.co.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization","name":"Stellar Data Recovery","url":"https:\/\/www.stellarinfo.co.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/07\/stellar-data-recovery-logo.png","contentUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/07\/stellar-data-recovery-logo.png","width":181,"height":52,"caption":"Stellar Data Recovery"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/deae85161f02f1cea83a1793d2164add","name":"Vandita Jain","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bc609ca9b98c88b028e23b86b9b24d33?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bc609ca9b98c88b028e23b86b9b24d33?s=96&d=mm&r=g","caption":"Vandita Jain"},"description":"Vandita Jain is a Technology Writer at Stellar. She is a tech enthusiast with over two years of experience in the Data Recovery domain. Vandita loves researching and providing DIY solutions, tips, and tricks to solve Windows technical issues. She is also an avid learner, constantly exploring the latest advancements in technology. Besides, she enjoys traveling and trekking.","url":"https:\/\/www.stellarinfo.co.in\/blog\/author\/user11stellar\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/19689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/comments?post=19689"}],"version-history":[{"count":5,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/19689\/revisions"}],"predecessor-version":[{"id":28192,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/19689\/revisions\/28192"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/media\/19691"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/media?parent=19689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/categories?post=19689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/tags?post=19689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}