{"id":98677,"date":"2022-05-16T11:15:37","date_gmt":"2022-05-16T11:15:37","guid":{"rendered":"https:\/\/www.stellarinfo.com\/blog\/?p=98677"},"modified":"2023-07-20T06:56:49","modified_gmt":"2023-07-20T06:56:49","slug":"iceapple-post-exploitation-framework-deployed-on-exchange-servers","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/","title":{"rendered":"Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers"},"content":{"rendered":"<?xml encoding=\"utf-8\" ?><?xml encoding=\"utf-8\" ?><p>IceApple is a novel Internet Information Services (IIS) .NET-based post-exploitation framework deployed on Microsoft Exchange Servers for surveillance and stealing or encrypting the business data. Hackers use it on compromised Microsoft Exchange Servers to harvest credentials from OWA servers, local or remote host registries, and data exfiltration.<\/p><p>First uncovered by the CrowdStrike cybersecurity firm back in late 2021, the IceApple framework has been observed on multiple Exchange Servers located in geographically different areas. Additionally, it targeted a wide range of sectors, such as academics, technology, etc.<\/p><p>Once again, the emergence of a new and improved IceApple post-exploitation framework indicates active development and deployments.<\/p><h2 class=\"wp-block-heading\" id=\"how-iceapple-evades-detection-on-exchange-servers?\">How IceApple Evades Detection on Exchange Servers?<\/h2><p>IceApple uses an in-memory framework to maintain a low forensic footprint on the infected host and uses a number of features to evade detection. The analysis of IceApple suggests that the module is developed by adversaries with deep insights and experience of the inner workings of Internet Information Services (IIS).<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"648\" height=\"446\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/tasking-deserialization-and-processing-flowchart-.png\" alt=\"tasking deserialization and processing flowchart \" class=\"wp-image-98679 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/tasking-deserialization-and-processing-flowchart-.png 648w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/tasking-deserialization-and-processing-flowchart--300x206.png 300w\" sizes=\"auto, (max-width: 648px) 100vw, 648px\" \/><\/figure><\/div><p><strong>Figure 1: <\/strong>Tasking deserialization and processing flowchart (Source: <a href=\"https:\/\/www.crowdstrike.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CrowdStrike<\/a>)<\/p><p>Until now, intrusions observed on Microsoft Exchange Servers involved malware being loaded to steal or encrypt information. However, IceApple can run under any Internet Information Service (IIS) web app. Moreover, it can install malicious components to establish persistence under IIS, providing a mechanism to extend the web servers&rsquo; functionality. It also blends into the compromised server by generating assembly files that appear to be generated by the IIS web server, making the IceApple a potent threat.<\/p><p>According to OverWatch &mdash; a CrowdStrike&rsquo;s managed threat hunting service:<\/p><p>&ldquo;At its core, IceApple is a post-exploitation framework focused on increasing an adversary&rsquo;s visibility of a target through the acquisition of credentials and exfiltration of data. None of the modules observed by OverWatch provides exploitation or lateral movement capabilities.&rdquo;<\/p><h2 class=\"wp-block-heading\" id=\"how-to-protect-your-exchange-organization-from-iceapple?\">How to Protect Your Exchange Organization from IceApple?<\/h2><p>Currently, the best defense is to safeguard your Exchange environment, especially the web applications, from malicious access. Thus, it&rsquo;s important to <a href=\"https:\/\/americansecuritytoday.com\/how-to-deal-with-exchange-server-security-challenges\/\">identify the Exchange security challenges<\/a> to strengthen your baseline security and fully patch all applications and servers to prevent IceApple from infiltrating your Exchange organization.<\/p><p>Follow our guide on installing the <a href=\"https:\/\/www.stellarinfo.com\/article\/install-exchange-cumulative-updates.php\">latest Security and Cumulative Updates to protect Exchange Servers<\/a> from malicious attacks.<\/p><p>Also, use technology to identify and prevent known threats and emerging threats proactively. For example, here are some <a href=\"https:\/\/www.toolbox.com\/it-security\/vulnerability-management\/guest-article\/best-security-practices-exchange-admins-need-to-understand\/\">best Exchange security practices in 2023 you must follow to fortify server security<\/a>.&nbsp; &nbsp;<\/p><h2 class=\"wp-block-heading\" id=\"to-wrap-up\">To Wrap Up<\/h2><p>IceApple is a highly advanced and sophisticated post-exploitation framework, which isn&rsquo;t easy to detect. To safeguard your Exchange organization from IceApple, you must update and patch the applications, including your Exchange environment with the latest Security Updates. To stay updated on the latest Security and Cumulative Update releases, you can follow our blog on <a href=\"https:\/\/www.stellarinfo.com\/blog\/microsoft-exchange-remote-code-execution-vulnerability-flaws-and-fixes\/\">Exchange vulnerabilities, flaws, and fixes<\/a>.<\/p><p>However, if you suspect that the server is compromised, you should set up a new Exchange Server and stop using the compromised one. You can use your backup to restore mailboxes or install an <a href=\"https:\/\/www.stellarinfo.com\/edb-exchange-server-recovery.htm\">Exchange recovery software<\/a>, such as Stellar Repair for Exchange, to extract mailboxes from the database files on the compromised Exchange Server and export them directly to the newly set up server. The software comes in handy when backups are not available. It can repair damaged or corrupt databases, and thus, you can use it if the database doesn&rsquo;t mount due to inconsistencies or corruption caused by the malicious attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IceApple is a novel Internet Information Services (IIS) .NET-based post-exploitation framework deployed&hellip; <a class=\"more-link\" href=\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/\">Continue reading <span class=\"screen-reader-text\">Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers<\/span><\/a><\/p>\n","protected":false},"author":32,"featured_media":98678,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5298],"tags":[629,347,499,498],"class_list":["post-98677","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-exchange","tag-exchange-recovery","tag-exchange-server-errors","tag-exchange-server-issues","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers | Stellar<\/title>\n<meta name=\"description\" content=\"Iceapple post-exploitation framework deployed on hacked Microsoft Exchange Servers to steal user credentials.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers | Stellar\" \/>\n<meta property=\"og:description\" content=\"Iceapple post-exploitation framework deployed on hacked Microsoft Exchange Servers to steal user credentials.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/raavisingh\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-16T11:15:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-20T06:56:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/New-IceApple-exploit-toolset-deployed-on-Microsoft-Exchange-servers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ravi Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/ravi51ngh\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ravi Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/\"},\"author\":{\"name\":\"Ravi Singh\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\"},\"headline\":\"Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers\",\"datePublished\":\"2022-05-16T11:15:37+00:00\",\"dateModified\":\"2023-07-20T06:56:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/\"},\"wordCount\":574,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/New-IceApple-exploit-toolset-deployed-on-Microsoft-Exchange-servers.jpg\",\"keywords\":[\"Exchange\",\"exchange recovery\",\"Exchange Server Errors\",\"exchange server issues\"],\"articleSection\":[\"Ransomware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/\",\"name\":\"Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers | Stellar\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/New-IceApple-exploit-toolset-deployed-on-Microsoft-Exchange-servers.jpg\",\"datePublished\":\"2022-05-16T11:15:37+00:00\",\"dateModified\":\"2023-07-20T06:56:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\"},\"description\":\"Iceapple post-exploitation framework deployed on hacked Microsoft Exchange Servers to steal user credentials.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#primaryimage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/New-IceApple-exploit-toolset-deployed-on-Microsoft-Exchange-servers.jpg\",\"contentUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/New-IceApple-exploit-toolset-deployed-on-Microsoft-Exchange-servers.jpg\",\"width\":1000,\"height\":600,\"caption\":\"Hackers Deploying IceApple Exploitation Framework on Hacked Exchange Servers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stellarinfo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/\",\"name\":\"Stellar Data Recovery Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\",\"name\":\"Ravi Singh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g\",\"caption\":\"Ravi Singh\"},\"description\":\"Ravi Singh is a Senior Writer at Stellar\u00ae. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 7 years of experience in technical writing. He writes about Microsoft Exchange, Microsoft 365, Email Migration, Linux, Windows, Mac, DIY Tech, and Smart Home. Ravi spends most of his weekends working with IoT (DIY Smart Home) devices and playing Overwatch. He is also a solo traveler who loves hiking and exploring new trails.\",\"sameAs\":[\"https:\/\/stellarinfo.com\/blog\",\"https:\/\/facebook.com\/raavisingh\",\"https:\/\/instagram.com\/ravi.s1ngh\",\"https:\/\/linkedin.com\/in\/ravi-singh-5a65356a\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/ravi51ngh\",\"https:\/\/youtube.com\/ravisingh9\"],\"url\":\"https:\/\/www.stellarinfo.com\/blog\/author\/ravi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers | Stellar","description":"Iceapple post-exploitation framework deployed on hacked Microsoft Exchange Servers to steal user credentials.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers | Stellar","og_description":"Iceapple post-exploitation framework deployed on hacked Microsoft Exchange Servers to steal user credentials.","og_url":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/","og_site_name":"Stellar Data Recovery Blog","article_author":"https:\/\/facebook.com\/raavisingh","article_published_time":"2022-05-16T11:15:37+00:00","article_modified_time":"2023-07-20T06:56:49+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/New-IceApple-exploit-toolset-deployed-on-Microsoft-Exchange-servers.jpg","type":"image\/jpeg"}],"author":"Ravi Singh","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/ravi51ngh","twitter_misc":{"Written by":"Ravi Singh","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/"},"author":{"name":"Ravi Singh","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11"},"headline":"Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers","datePublished":"2022-05-16T11:15:37+00:00","dateModified":"2023-07-20T06:56:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/"},"wordCount":574,"commentCount":0,"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/New-IceApple-exploit-toolset-deployed-on-Microsoft-Exchange-servers.jpg","keywords":["Exchange","exchange recovery","Exchange Server Errors","exchange server issues"],"articleSection":["Ransomware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/","url":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/","name":"Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers | Stellar","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/New-IceApple-exploit-toolset-deployed-on-Microsoft-Exchange-servers.jpg","datePublished":"2022-05-16T11:15:37+00:00","dateModified":"2023-07-20T06:56:49+00:00","author":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11"},"description":"Iceapple post-exploitation framework deployed on hacked Microsoft Exchange Servers to steal user credentials.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#primaryimage","url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/New-IceApple-exploit-toolset-deployed-on-Microsoft-Exchange-servers.jpg","contentUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/05\/New-IceApple-exploit-toolset-deployed-on-Microsoft-Exchange-servers.jpg","width":1000,"height":600,"caption":"Hackers Deploying IceApple Exploitation Framework on Hacked Exchange Servers"},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.com\/blog\/iceapple-post-exploitation-framework-deployed-on-exchange-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Deploy IceApple Post-Exploitation Framework on Hacked Exchange Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.com\/blog\/#website","url":"https:\/\/www.stellarinfo.com\/blog\/","name":"Stellar Data Recovery Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11","name":"Ravi Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g","caption":"Ravi Singh"},"description":"Ravi Singh is a Senior Writer at Stellar\u00ae. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 7 years of experience in technical writing. He writes about Microsoft Exchange, Microsoft 365, Email Migration, Linux, Windows, Mac, DIY Tech, and Smart Home. Ravi spends most of his weekends working with IoT (DIY Smart Home) devices and playing Overwatch. He is also a solo traveler who loves hiking and exploring new trails.","sameAs":["https:\/\/stellarinfo.com\/blog","https:\/\/facebook.com\/raavisingh","https:\/\/instagram.com\/ravi.s1ngh","https:\/\/linkedin.com\/in\/ravi-singh-5a65356a\/","https:\/\/x.com\/https:\/\/twitter.com\/ravi51ngh","https:\/\/youtube.com\/ravisingh9"],"url":"https:\/\/www.stellarinfo.com\/blog\/author\/ravi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/98677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/comments?post=98677"}],"version-history":[{"count":4,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/98677\/revisions"}],"predecessor-version":[{"id":98689,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/98677\/revisions\/98689"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media\/98678"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media?parent=98677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/categories?post=98677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/tags?post=98677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}