{"id":110394,"date":"2022-09-29T03:29:59","date_gmt":"2022-09-29T03:29:59","guid":{"rendered":"https:\/\/www.stellarinfo.com\/blog\/?p=110394"},"modified":"2023-01-06T10:07:48","modified_gmt":"2023-01-06T10:07:48","slug":"hackers-compromise-exchange-servers-using-oauth-apps","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/","title":{"rendered":"Hackers using OAuth Apps to Compromise Exchange Servers"},"content":{"rendered":"<?xml encoding=\"utf-8\" ?><?xml encoding=\"utf-8\" ?><p>On September 22, 2023, Microsoft, via a blog post, warned the Exchange Server customers that attackers are deploying malicious OAuth apps on compromised cloud tenants hosting Exchange Online to gain control of their Exchange Servers. &nbsp;<\/p><h2 class=\"wp-block-heading\" id=\"what-is-oauth?\">What is OAuth?<\/h2><p>Open Authentication or OAuth is an open standard for an authorization protocol. It is a framework that provides apps to securely allow designated access. The protocol is often used by web apps to create user accounts and access services without having to sign up, for passwords, or email verification. It uses tokens to prove its identity. For instance, when you sign up for an add-in or app using your Office 365 account via OAuth, your profile can be accessed by the applications securely. &nbsp;&nbsp;<\/p><h2 class=\"wp-block-heading\" id=\"how-attackers-are-leveraging-oauth?\">How Attackers are Leveraging OAuth?<\/h2><p>Threat actors have launched credentials stuffing attacks against high-risk accounts or accounts with weak\/reused passwords that don&rsquo;t have multi-factor (MFA) or two-factor authentication (2FA) enabled. They are leveraging unsecured administrator accounts to gain initial access to the cloud tenants. &nbsp;<\/p><p>Once the attacker has unauthorized access to your cloud organization, they register a malicious OAuth app with elevated permissions to abuse the Microsoft cloud email services and spread spam. They modify the Exchange Server settings to allow unbound emails from specific IP addresses and route them through the compromised server to make them look legit for phishing attacks. &nbsp;<\/p><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/01\/oauth-attack-on-exchnage-servers-1024x576.jpg\" alt=\" oauth attack on exchange servers\" class=\"wp-image-119639 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/01\/oauth-attack-on-exchnage-servers-1024x576.jpg 1024w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/01\/oauth-attack-on-exchnage-servers-300x169.jpg 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/01\/oauth-attack-on-exchnage-servers-768x432.jpg 768w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/01\/oauth-attack-on-exchnage-servers-1536x864.jpg 1536w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/01\/oauth-attack-on-exchnage-servers-1568x882.jpg 1568w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2023\/01\/oauth-attack-on-exchnage-servers.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><h3 class=\"wp-block-heading\" id=\"h-spam-email-campaign\">Spam Email Campaign<\/h3><p>&ldquo;The spam mails for phishing attacks are sent as a part of deceptive sweepstakes scheme meant to trick the recipient into signing up for recurring paid subscriptions,&rdquo; Microsoft stated. The email urges the recipient to click on the link to get their prize but then it redirects the victim to the landing page where they are asked to enter their credit card details for a small shipping fee for collecting the reward.<\/p><h3 class=\"wp-block-heading\" id=\"h-evading-detection\">Evading Detection<\/h3><p>The attackers are using several techniques to evade detection, including waiting for weeks or months before using their malicious OAuth app after setup. They also delete any modification made to the Exchange Server once their short spam campaigns end, leaving no traces.<\/p><p>Microsoft&rsquo;s threat intelligence division has said that the attackers have been actively running these short bursts of spam email campaigns for the past several years. While the initial attacks were targeted to lure consumer users, the attackers are now targeting enterprise tenants and using their infrastructure for their malicious campaigns. This has exposed the weaknesses that allow attackers to compromise cloud tenants and raised some security concerns.<\/p><h2 class=\"wp-block-heading\" id=\"how-to-protect-exchange-servers?\">How to Protect Exchange Servers?<\/h2><p>To protect your Exchange Server from OAuth and reduce the attack surface, Microsoft recommends securing the identity of your infrastructure. To safeguard your infrastructure,<\/p><ul class=\"wp-block-list\">\n<li>Implement Multi-Factor Authentication.<\/li>\n\n\n\n<li>Enable conditional access policies and continuous access evaluation (CAE) in Azure Active Directory (AD).<\/li>\n\n\n\n<li>Use complex passwords.<\/li>\n\n\n\n<li>Enable <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/hybrid\/how-to-connect-password-hash-synchronization\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">password hash synchronization<\/a> (PHS).<\/li>\n\n\n\n<li>Block legacy authentication.<\/li>\n\n\n\n<li>Review admin roles.<\/li>\n<\/ul><h2 class=\"wp-block-heading\" id=\"final-thoughts\">Final Thoughts<\/h2><p>It&rsquo;s not the first time attackers are targeting the Microsoft Exchange Server and surely won&rsquo;t be the last. But this time, they successfully compromised the cloud tenants raising concerns over O365 security. To prevent such attacks and safeguard your Exchange organization, you must follow the <a href=\"https:\/\/www.spiceworks.com\/it-security\/vulnerability-management\/guest-article\/best-security-practices-exchange-admins-need-to-understand\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">best practices to secure your Exchange Servers<\/a>. If your organization is running on-premises servers, keep the servers, operating system, and apps updated to the latest stable version as attackers often target unpatched servers. You can refer to our <a href=\"https:\/\/www.stellarinfo.com\/article\/install-exchange-cumulative-updates.php\" target=\"_blank\" rel=\"noreferrer noopener\">detailed guides on installing and patching Exchange Servers with the latest Cumulative and Security Updates<\/a>.<\/p><p>In case your server breaks due to or after a malicious attack, immediately take down the server and disconnect from your network. Also, deploy a new server and restore data from the backup. Do not use the compromised server in a production environment. There could be backdoors installed that can be used by threat actors later to steal your business data or compromise your Exchange organization.<\/p><p>If the backup isn&rsquo;t available, obsolete, or fails to restore mailboxes, use<a href=\"https:\/\/www.stellarinfo.com\/edb-exchange-server-recovery.htm\" target=\"_blank\" rel=\"noreferrer noopener\"> Stellar Repair for Exchange<\/a>. The software can help you extract mailboxes from the databases on the compromised server and export them directly to your new server with complete integrity. If you plan to switch to Office 365, the software can help export all mailboxes directly to Office 365 tenant.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On September 22, 2023, Microsoft, via a blog post, warned the Exchange&hellip; <a class=\"more-link\" href=\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/\">Continue reading <span class=\"screen-reader-text\">Hackers using OAuth Apps to Compromise Exchange Servers<\/span><\/a><\/p>\n","protected":false},"author":32,"featured_media":110521,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[25],"tags":[],"class_list":["post-110394","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exchange-server","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers using OAuth Apps to Compromise Exchange Servers | Stellar<\/title>\n<meta name=\"description\" content=\"Learn how attackers are leveraging the malicious OAuth apps to compromise the Exchange servers and how to protect them from such attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers using OAuth Apps to Compromise Exchange Servers | Stellar\" \/>\n<meta property=\"og:description\" content=\"Learn how attackers are leveraging the malicious OAuth apps to compromise the Exchange servers and how to protect them from such attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/raavisingh\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-29T03:29:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-06T10:07:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/09\/Hackers-Using-OAuth-Apps-to-Compromise-Exchange-Servers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ravi Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/ravi51ngh\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ravi Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/\"},\"author\":{\"name\":\"Ravi Singh\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\"},\"headline\":\"Hackers using OAuth Apps to Compromise Exchange Servers\",\"datePublished\":\"2022-09-29T03:29:59+00:00\",\"dateModified\":\"2023-01-06T10:07:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/\"},\"wordCount\":709,\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/09\/Hackers-Using-OAuth-Apps-to-Compromise-Exchange-Servers.jpg\",\"articleSection\":[\"Exchange Server Recovery\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/\",\"name\":\"Hackers using OAuth Apps to Compromise Exchange Servers | Stellar\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/09\/Hackers-Using-OAuth-Apps-to-Compromise-Exchange-Servers.jpg\",\"datePublished\":\"2022-09-29T03:29:59+00:00\",\"dateModified\":\"2023-01-06T10:07:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\"},\"description\":\"Learn how attackers are leveraging the malicious OAuth apps to compromise the Exchange servers and how to protect them from such attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#primaryimage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/09\/Hackers-Using-OAuth-Apps-to-Compromise-Exchange-Servers.jpg\",\"contentUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/09\/Hackers-Using-OAuth-Apps-to-Compromise-Exchange-Servers.jpg\",\"width\":1000,\"height\":600,\"caption\":\"Hackers using OAuth Apps to Compromise Exchange Servers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stellarinfo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers using OAuth Apps to Compromise Exchange Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/\",\"name\":\"Stellar Data Recovery Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\",\"name\":\"Ravi Singh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g\",\"caption\":\"Ravi Singh\"},\"description\":\"Ravi Singh is a Senior Writer at Stellar\u00ae. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 7 years of experience in technical writing. He writes about Microsoft Exchange, Microsoft 365, Email Migration, Linux, Windows, Mac, DIY Tech, and Smart Home. Ravi spends most of his weekends working with IoT (DIY Smart Home) devices and playing Overwatch. He is also a solo traveler who loves hiking and exploring new trails.\",\"sameAs\":[\"https:\/\/stellarinfo.com\/blog\",\"https:\/\/facebook.com\/raavisingh\",\"https:\/\/instagram.com\/ravi.s1ngh\",\"https:\/\/linkedin.com\/in\/ravi-singh-5a65356a\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/ravi51ngh\",\"https:\/\/youtube.com\/ravisingh9\"],\"url\":\"https:\/\/www.stellarinfo.com\/blog\/author\/ravi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers using OAuth Apps to Compromise Exchange Servers | Stellar","description":"Learn how attackers are leveraging the malicious OAuth apps to compromise the Exchange servers and how to protect them from such attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/","og_locale":"en_US","og_type":"article","og_title":"Hackers using OAuth Apps to Compromise Exchange Servers | Stellar","og_description":"Learn how attackers are leveraging the malicious OAuth apps to compromise the Exchange servers and how to protect them from such attacks.","og_url":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/","og_site_name":"Stellar Data Recovery Blog","article_author":"https:\/\/facebook.com\/raavisingh","article_published_time":"2022-09-29T03:29:59+00:00","article_modified_time":"2023-01-06T10:07:48+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/09\/Hackers-Using-OAuth-Apps-to-Compromise-Exchange-Servers.jpg","type":"image\/jpeg"}],"author":"Ravi Singh","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/ravi51ngh","twitter_misc":{"Written by":"Ravi Singh","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/"},"author":{"name":"Ravi Singh","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11"},"headline":"Hackers using OAuth Apps to Compromise Exchange Servers","datePublished":"2022-09-29T03:29:59+00:00","dateModified":"2023-01-06T10:07:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/"},"wordCount":709,"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/09\/Hackers-Using-OAuth-Apps-to-Compromise-Exchange-Servers.jpg","articleSection":["Exchange Server Recovery"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/","url":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/","name":"Hackers using OAuth Apps to Compromise Exchange Servers | Stellar","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/09\/Hackers-Using-OAuth-Apps-to-Compromise-Exchange-Servers.jpg","datePublished":"2022-09-29T03:29:59+00:00","dateModified":"2023-01-06T10:07:48+00:00","author":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11"},"description":"Learn how attackers are leveraging the malicious OAuth apps to compromise the Exchange servers and how to protect them from such attacks.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#primaryimage","url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/09\/Hackers-Using-OAuth-Apps-to-Compromise-Exchange-Servers.jpg","contentUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/09\/Hackers-Using-OAuth-Apps-to-Compromise-Exchange-Servers.jpg","width":1000,"height":600,"caption":"Hackers using OAuth Apps to Compromise Exchange Servers"},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.com\/blog\/hackers-compromise-exchange-servers-using-oauth-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers using OAuth Apps to Compromise Exchange Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.com\/blog\/#website","url":"https:\/\/www.stellarinfo.com\/blog\/","name":"Stellar Data Recovery Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11","name":"Ravi Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g","caption":"Ravi Singh"},"description":"Ravi Singh is a Senior Writer at Stellar\u00ae. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 7 years of experience in technical writing. He writes about Microsoft Exchange, Microsoft 365, Email Migration, Linux, Windows, Mac, DIY Tech, and Smart Home. Ravi spends most of his weekends working with IoT (DIY Smart Home) devices and playing Overwatch. He is also a solo traveler who loves hiking and exploring new trails.","sameAs":["https:\/\/stellarinfo.com\/blog","https:\/\/facebook.com\/raavisingh","https:\/\/instagram.com\/ravi.s1ngh","https:\/\/linkedin.com\/in\/ravi-singh-5a65356a\/","https:\/\/x.com\/https:\/\/twitter.com\/ravi51ngh","https:\/\/youtube.com\/ravisingh9"],"url":"https:\/\/www.stellarinfo.com\/blog\/author\/ravi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/110394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/comments?post=110394"}],"version-history":[{"count":11,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/110394\/revisions"}],"predecessor-version":[{"id":119641,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/110394\/revisions\/119641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media\/110521"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media?parent=110394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/categories?post=110394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/tags?post=110394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}