{"version":"1.0","provider_name":"Joglo IT Center | Blog |","provider_url":"https:\/\/www.jogloitcenter.com\/blog","title":"Mainkan aktor ransomware melewati mitigasi ProxyNotShell - Joglo IT Center | Blog |","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"AuZ3oBuzIO\"><a href=\"https:\/\/www.jogloitcenter.com\/blog\/trends\/mainkan-aktor-ransomware-melewati-mitigasi-proxynotshell\">Mainkan aktor ransomware melewati mitigasi ProxyNotShell<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.jogloitcenter.com\/blog\/trends\/mainkan-aktor-ransomware-melewati-mitigasi-proxynotshell\/embed#?secret=AuZ3oBuzIO\" width=\"600\" height=\"338\" title=\"&#8220;Mainkan aktor ransomware melewati mitigasi ProxyNotShell&#8221; &#8212; Joglo IT Center | Blog |\" data-secret=\"AuZ3oBuzIO\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.jogloitcenter.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.jogloitcenter.com\/blog\/wp-content\/uploads\/2022\/12\/michael-geiger-JJPqavJBy_k-unsplash-1.jpg","thumbnail_width":1024,"thumbnail_height":768,"description":"image featured from : unsplash.com Pelaku ransomware Play menggunakan metode eksploit baru untuk melewati mitigasi ProxyNotShell Microsoft dan mendapatkan akses awal ke server Exchange, menurut penelitian baru dari CrowdStrike. ProxyNotShell terdiri dari dua kerentanan Microsoft Exchange Server yang dieksploitasi sebelum pengungkapan publik pada bulan September. Penyerang merantai cacat server-side-request forgery (SSRF), dilacak sebagai CVE-2022-41040, dan"}