{"id":99773,"date":"2024-12-13T16:52:09","date_gmt":"2024-12-13T08:52:09","guid":{"rendered":"https:\/\/version-2.com\/?p=99773"},"modified":"2024-12-04T12:11:01","modified_gmt":"2024-12-04T04:11:01","slug":"rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/12\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/","title":{"rendered":"Rockstar 2FA: Compromising Microsoft 365 Accounts-What MSPs and Small Businesses Need to Know"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"99773\" class=\"elementor elementor-99773\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp\" width=\"1281\" height=\"720\" \/><\/p><div class=\"elementor-widget-container\"><p>Key Takeaways<\/p><ol class=\"wp-block-list\"><li><strong><em>Sophisticated Phishing-as-a-Service Model:<\/em><\/strong><strong> Rockstar 2FA uses advanced adversary-in-the-middle (AiTM) techniques to bypass multi-factor authentication (MFA) protections in Microsoft 365.<\/strong><\/li><li><strong><em>Small Businesses Are Prime Targets:<\/em><\/strong><strong> Limited resources and cybersecurity awareness make small and medium-sized businesses especially vulnerable to such attacks.<\/strong><\/li><li><strong><em>MSPs Must Evolve Defense Strategies:<\/em><\/strong><strong> The role of Managed Service Providers (MSPs) in combating advanced threats is more critical than ever, requiring proactive tools, training, and incident response.<\/strong><\/li><\/ol><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>The Threat Landscape: What Is Rockstar 2FA?<\/strong><\/h3><p>A recent discovery has exposed a new iteration of Phishing-as-a-Service (PhaaS) platforms called <strong>Rockstar 2FA<\/strong>. This campaign focuses on stealing credentials from Microsoft 365 (M365) by bypassing MFA protections through <strong>adversary-in-the-middle (AiTM)<\/strong> techniques. The platform is a subscription-based service marketed to cybercriminals across forums like Telegram and Mail.ru, offering advanced features such as:<\/p><ul class=\"wp-block-list\"><li><strong>Session cookie harvesting to hijack active user sessions<\/strong><\/li><li><strong>Customizable phishing templates mimicking trusted services<\/strong><\/li><li><strong>Antibot features to avoid automated detection systems<\/strong><\/li><li><strong>Randomized source code and links to evade detection and FUD attachments\u00a0<\/strong><\/li><\/ul><p>Rockstar 2FA capitalizes on user trust in services like Microsoft 365, posing a significant risk for organizations that rely on this platform for communication and collaboration. Its accessibility to attackers, regardless of technical expertise, makes it a widespread and pressing concern.<\/p><p>For more technical details, see the analysis by <strong>Trustwave<\/strong>:<a href=\"https:\/\/thehackernews.com\/2024\/11\/phishing-as-service-rockstar-2fa.html\" target=\"_blank\" rel=\"noopener\"> Rockstar 2FA PhaaS Campaign<\/a>.<\/p><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>How the Attack Works<\/strong><\/h3><p>At the heart of the Rockstar 2FA campaign is its <strong>adversary-in-the-middle (AiTM)<\/strong> technique. Here\u2019s how the attack unfolds:<\/p><ol class=\"wp-block-list\"><li><strong>Phishing Email: <\/strong>The Attacker is sending an email using the templates of the Rockstar platform, such as: Document and file-sharing notifications, MFA lures, E-signature platform-themed messages and more. The campaign executed through several email delivery mechanisms, like compromised accounts, to conceal oneself behind a credible source and contain FUD links and attachments to bypass antispam detections.<\/li><li><strong>Antibot: <\/strong>Upon being redirected to the landing page, the user will encounter a Cloudflare Turnstile challenge \u2013 a free service that protects websites from bots. Threat actors now exploit to avoid automated analysis of their phishing pages.<\/li><li><strong>The AiTM Server:<\/strong> The server functions as both the phishing landing page, the credentials housing server and the proxy server. The phishing page mimics the brand\u2019s sign-in page despite obfuscated HTML, forwarding those credentials to the legitimate service to complete the authentication process and then sending user data directly to the AiTM server to extract credentials and retrieve the target account\u2019s session cookie.<\/li><li><strong>Credential and Cookie Theft:<\/strong> When the victim enters their login credentials and MFA code, the proxy server captures both, along with session cookies.<\/li><li><strong>Session Hijacking:<\/strong> Using these session cookies, attackers can access the victim\u2019s account without needing to allow MFA repeatedly.<\/li><\/ol><p>This approach is particularly effective because it nullifies MFA protections, which are traditionally seen as a critical safeguard against unauthorized access.<\/p><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>The Impact on Small Businesses Using Microsoft 365<\/strong><\/h3><p>Small businesses are a favorite target for phishing campaigns due to limited cybersecurity resources and expertise. For organizations heavily reliant on M365 for day-to-day operations, the risks include:<\/p><ul class=\"wp-block-list\"><li><strong>Data Breaches:<\/strong> Unauthorized access to sensitive files, emails, and client information stored in M365.<\/li><li><strong>Business Disruption:<\/strong> Compromised accounts can lead to halted operations, delayed projects, or worse, ransomware incidents.<\/li><li><strong>Business Email Compromise (BEC)<\/strong> is a sophisticated type of phishing attack where cybercriminals impersonate trusted executives, employees, or business partners to deceive victims into transferring funds or sharing sensitive information. BEC often involves carefully crafted emails that exploit human trust, bypassing technical defenses and resulting in significant financial and reputational damage for organizations.<\/li><li><strong>Financial Loss:<\/strong> Whether through direct theft, fraudulent transactions, or fines related to non-compliance with data protection regulations.<\/li><\/ul><p>The Rockstar 2FA campaign also leverages <strong>trusted platforms<\/strong> like Atlassian Confluence, Google Docs, Microsoft OneDrive and OneNote- to host malicious links, making phishing emails harder to identify.<\/p><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>The Critical Role of MSPs in Defending Against Rockstar 2FA and Similar Threats<\/strong><\/h3><p>Managed Service Providers (MSPs) have become indispensable for small and medium-sized enterprises (SMEs) navigating today\u2019s complex cybersecurity landscape. As Rockstar 2FA highlights, phishing campaigns are becoming more advanced, leveraging tools and tactics that were once the domain of highly skilled hackers. In this context, MSPs play a multifaceted role, acting not just as service providers but as strategic partners in securing their clients\u2019 operations.<\/p><h4>\u00a0<\/h4><h4 class=\"wp-block-heading\"><strong>1. Proactive Threat Prevention<\/strong><\/h4><p>MSPs must focus on preventing threats before they reach their clients\u2019 environments. This requires a blend of technical expertise, advanced tools, and constant vigilance.<\/p><ul class=\"wp-block-list\"><li><strong>Deploying Phishing Simulations:<\/strong><strong><br \/><\/strong>MSPs can implement solutions like <strong>Guardz\u2019s AI-powered phishing simulations<\/strong> to proactively test their clients\u2019 susceptibility to phishing attempts. These simulations mirror real-world scenarios, helping organizations identify gaps in employee training and response.<ul class=\"wp-block-list\"><li><em>Example:<\/em> Regular phishing drills can reveal if employees are consistently clicking on malicious links, allowing MSPs to intervene with targeted education.<\/li><\/ul><\/li><li><strong>Security Configuration Management:<\/strong><strong><br \/><\/strong>Ensuring that Microsoft 365 environments are configured with best-practice security settings (e.g., disabling legacy authentication, enabling conditional access policies) reduces the attack surface significantly.<\/li><\/ul><h4>\u00a0<\/h4><h4 class=\"wp-block-heading\"><strong>2. Real-Time Detection and Response<\/strong><\/h4><p>Phishing campaigns like Rockstar 2FA are designed to bypass traditional security mechanisms, making real-time detection critical.<\/p><ul class=\"wp-block-list\"><li><strong>Anomaly Monitoring:<\/strong><strong><br \/><\/strong>MSPs should deploy tools that track login anomalies, such as sign-ins from unexpected locations or devices. Suspicious behavior can trigger alerts and automatic account lockdowns.<\/li><li><strong>Continuous Security Operations:<\/strong><strong><br \/><\/strong>Many MSPs now operate Security Operations Centers (SOCs) or leverage third-party providers to monitor client environments around the clock. For example, unusual activity within Microsoft 365\u2014like mass file downloads\u2014can indicate a compromised account and prompt immediate action.<\/li><li><strong>Incident Response Planning:<\/strong><strong><br \/><\/strong>When phishing attacks succeed, MSPs must act quickly to mitigate damage. An effective incident response plan includes:<ul class=\"wp-block-list\"><li>Revoking compromised session cookies and resetting credentials.<\/li><li>Performing forensic analysis to understand how the breach occurred.<\/li><li>Communicating transparently with the client about the incident and steps for recovery.<\/li><\/ul><\/li><\/ul><h4>\u00a0<\/h4><h4 class=\"wp-block-heading\"><strong>3. Employee Education and Cyber Hygiene<\/strong><\/h4><p>Phishing remains one of the most successful attack vectors because it targets human behavior. MSPs can turn this vulnerability into a strength by fostering a culture of cybersecurity awareness.<\/p><ul class=\"wp-block-list\"><li><strong>Tailored Cybersecurity Training:<\/strong><strong><br \/><\/strong>MSPs should regularly provide training sessions for employees, focusing on real-world examples of phishing attempts. These sessions should cover:<ul class=\"wp-block-list\"><li>Identifying phishing red flags, such as mismatched URLs, urgent language, and unusual requests.<\/li><li>Steps to verify sender legitimacy, such as calling the organization directly.<\/li><li>The importance of not sharing credentials or MFA codes under any circumstances.<\/li><\/ul><\/li><li><strong>Phishing Resilience Programs:<\/strong><strong><br \/><\/strong>A resilience program combines simulated phishing attacks, immediate feedback, and ongoing education. The goal is to transform employees from potential vulnerabilities into a critical line of defense.<\/li><\/ul><h4>\u00a0<\/h4><h4 class=\"wp-block-heading\"><strong>4. Security Integration Across Platforms<\/strong><\/h4><p>Small businesses often rely on multiple cloud-based platforms beyond Microsoft 365, such as Google Workspace, Dropbox, and CRM systems. MSPs must ensure that security measures extend seamlessly across these platforms.<\/p><ul class=\"wp-block-list\"><li><strong>Unified Threat Management:<\/strong><strong><br \/><\/strong>By integrating security tools across platforms, MSPs can create a centralized system for threat detection and response. This approach prevents attackers from exploiting gaps in security coverage.<\/li><li><strong>Identity and Access Management (IAM):<\/strong><strong><br \/><\/strong>Implementing IAM solutions ensures that access to sensitive data is restricted to authorized personnel. MSPs should use tools that enforce principles like least privilege and role-based access controls.<\/li><\/ul><h4>\u00a0<\/h4><h4 class=\"wp-block-heading\"><strong>5. Guiding Clients Through a Changing Threat Landscape<\/strong><\/h4><p>Cyber threats evolve rapidly, and businesses often struggle to keep up. MSPs act as trusted advisors, helping their clients navigate these changes.<\/p><ul class=\"wp-block-list\"><li><strong>Regular Security Reviews:<\/strong><strong><br \/><\/strong>Periodic reviews allow MSPs to assess their clients\u2019 current security posture and recommend updates to address new threats, such as those posed by Rockstar 2FA.<\/li><li><strong>Advising on Cybersecurity Investments:<\/strong><strong><br \/><\/strong>MSPs can guide businesses on the most effective use of limited budgets, prioritizing solutions that deliver the highest return on investment. For instance:<ul class=\"wp-block-list\"><li>Encouraging investment in tools like phishing simulations to prevent human errors.<\/li><li>Recommending endpoint detection and response (EDR) solutions to protect against ransomware.<\/li><\/ul><\/li><li><strong>Cyber Insurance Advisory:<\/strong><strong><br \/><\/strong>With threats like Rockstar 2FA on the rise, MSPs can assist clients in obtaining cyber insurance policies that cover phishing-related damages, complementing their technical defenses.<\/li><\/ul><h4>\u00a0<\/h4><h4 class=\"wp-block-heading\"><strong>6. Building Trust Through Transparency<\/strong><\/h4><p>For many small businesses, trust is a key factor in selecting an MSP. Clients need to feel confident that their MSP is not only capable of defending against threats but also committed to their success.<\/p><ul class=\"wp-block-list\"><li><strong>Regular Reporting:<\/strong><strong><br \/><\/strong>Providing clients with detailed reports on security incidents, training outcomes, and system health builds confidence and highlights the value of the MSP\u2019s services.<\/li><li><strong>Collaborative Incident Management:<\/strong><strong><br \/><\/strong>When a breach occurs, clear and honest communication ensures clients understand the steps being taken to resolve the issue and prevent future occurrences.<\/li><\/ul><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>Guardz\u2019s Comprehensive Approach to Phishing Prevention<\/strong><\/h3><p>Guardz offers a robust suite of tools designed to combat phishing threats and enhance organizational resilience, making it an invaluable ally for MSPs and small businesses. By combining <strong>email security protection<\/strong> and <strong>AI-powered phishing simulations<\/strong>, Guardz provides both proactive and reactive defenses against campaigns like Rockstar 2FA.<\/p><h4>\u00a0<\/h4><h4 class=\"wp-block-heading\"><strong>1. Email Security Protection<\/strong><\/h4><p>Guardz\u2019s email security solution is a critical first line of defense against phishing attacks. It actively scans and monitors incoming emails, detecting and blocking suspicious messages before they reach employees\u2019 inboxes.<\/p><p>Key capabilities include:<\/p><ul class=\"wp-block-list\"><li><strong>Phishing Detection:<\/strong> Identifies malicious links, attachments, and spoofed sender addresses commonly used in phishing campaigns.<\/li><li><strong>Real-Time Threat Analysis:<\/strong> Uses advanced algorithms to analyze email metadata and content for indicators of compromise (IoCs).<\/li><li><strong>Automated Remediation:<\/strong> Flags and quarantines phishing emails, preventing users from interacting with potentially harmful content.<\/li><\/ul><p>This layer of protection significantly reduces the likelihood of a phishing attack reaching employees, especially in environments with high email traffic like Microsoft 365.<\/p><h4>\u00a0<\/h4><h4 class=\"wp-block-heading\"><strong>2. Phishing Simulation Tool<\/strong><\/h4><p>Even with robust email protection, phishing attempts may occasionally bypass filters, relying on human error to succeed. Guardz addresses this vulnerability with its <strong>AI-powered phishing simulation tool<\/strong>, designed to enhance employee awareness and resilience.<\/p><p><strong>How it Works:<\/strong><\/p><ul class=\"wp-block-list\"><li><strong>Realistic Simulations:<\/strong> Guardz leverages AI to craft realistic phishing campaigns that mimic current threats, including tactics like AiTM attacks.<\/li><li><strong>Customizable Scenarios:<\/strong> MSPs can tailor simulations to align with the specific challenges faced by their clients, making the training highly relevant.<\/li><li><strong>Immediate Feedback:<\/strong> Employees receive instant feedback on their actions during simulations, turning mistakes into valuable learning opportunities.<\/li><li><strong>Actionable Reporting:<\/strong> Detailed reports help organizations identify patterns in employee behavior and target areas for improvement.<\/li><\/ul><p>By regularly running simulations, businesses can build a culture of vigilance, ensuring employees are prepared to recognize and report phishing attempts in real-world scenarios.<\/p><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>Lessons Learned: Protecting Against Sophisticated Phishing Attacks<\/strong><\/h3><p><strong>For MSPs:<\/strong><\/p><ol class=\"wp-block-list\"><li><strong>Stay Ahead of Threats:<\/strong> Regularly update clients about evolving phishing tactics like AiTM attacks to ensure they understand the risks.<\/li><li><strong>Adopt Layered Security:<\/strong> Combine phishing simulations, endpoint protection, and continuous monitoring for a robust defense.<\/li><li><strong>Empower Through Education:<\/strong> Provide ongoing training and resources to help employees identify and report phishing attempts effectively.<\/li><\/ol><p><strong>For Small Businesses:<\/strong><\/p><ol class=\"wp-block-list\"><li><strong>Trust but Verify:<\/strong> Always verify suspicious emails, especially those requesting credentials or sensitive information.<\/li><li><strong>Invest in Training:<\/strong> Regular phishing simulations can help employees stay alert and minimize errors.<\/li><li><strong>Rely on Experts:<\/strong> Partnering with a knowledgeable MSP ensures access to advanced tools and expertise that may not be available in-house.<\/li><\/ol><p>\u00a0<\/p><p>The Rockstar 2FA campaign highlights the growing sophistication of phishing attacks and the urgent need for advanced defenses. For MSPs and small businesses, proactive strategies, continuous education, and robust tools like Guardz\u2019s phishing simulations are critical in staying secure.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86d84e0 elementor-widget elementor-widget-button\" data-id=\"86d84e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/guardz.com\/distributors\/v2\/?utm_source=web&#038;utm_medium=v2sg&#038;utm_campaign=guardz&#038;utm_content=trial\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start Free Trial<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"76994\" class=\"elementor elementor-76994\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Guardz<br \/><\/strong>Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Key Takeaways Sophisticated Phishing-as-a-Service Model [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,1276,61],"tags":[1272,1277],"class_list":["post-99773","post","type-post","status-publish","format-standard","hentry","category-1273","category-guardz","category-press-release","tag-1272","tag-guardz"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Rockstar 2FA: Compromising Microsoft 365 Accounts-What MSPs and Small Businesses Need to Know - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rockstar 2FA: Compromising Microsoft 365 Accounts-What MSPs and Small Businesses Need to Know - Version 2\" \/>\n<meta property=\"og:description\" content=\"Key Takeaways Sophisticated Phishing-as-a-Service Model [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-13T08:52:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Rockstar 2FA: Compromising Microsoft 365 Accounts-What MSPs and Small Businesses Need to Know\",\"datePublished\":\"2024-12-13T08:52:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/\"},\"wordCount\":1856,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Guardz-Threat-Report-banner.jpg.webp\",\"keywords\":[\"2024\",\"Guardz\"],\"articleSection\":[\"2024\",\"Guardz\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/guardz.com\\\/blog\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/\",\"url\":\"https:\\\/\\\/guardz.com\\\/blog\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/\",\"name\":\"Rockstar 2FA: Compromising Microsoft 365 Accounts-What MSPs and Small Businesses Need to Know - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Guardz-Threat-Report-banner.jpg.webp\",\"datePublished\":\"2024-12-13T08:52:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/guardz.com\\\/blog\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Guardz-Threat-Report-banner.jpg.webp\",\"contentUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Guardz-Threat-Report-banner.jpg.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rockstar 2FA: Compromising Microsoft 365 Accounts-What MSPs and Small Businesses Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rockstar 2FA: Compromising Microsoft 365 Accounts-What MSPs and Small Businesses Need to Know - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Rockstar 2FA: Compromising Microsoft 365 Accounts-What MSPs and Small Businesses Need to Know - Version 2","og_description":"Key Takeaways Sophisticated Phishing-as-a-Service Model [&hellip;]","og_url":"https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/","og_site_name":"Version 2","article_published_time":"2024-12-13T08:52:09+00:00","og_image":[{"url":"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/12\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Rockstar 2FA: Compromising Microsoft 365 Accounts-What MSPs and Small Businesses Need to Know","datePublished":"2024-12-13T08:52:09+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/12\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/"},"wordCount":1856,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp","keywords":["2024","Guardz"],"articleSection":["2024","Guardz","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/12\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/","url":"https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/","name":"Rockstar 2FA: Compromising Microsoft 365 Accounts-What MSPs and Small Businesses Need to Know - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp","datePublished":"2024-12-13T08:52:09+00:00","breadcrumb":{"@id":"https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/#primaryimage","url":"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp","contentUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/guardz.com\/blog\/rockstar-2fa-compromising-microsoft-365-accounts-what-msps-and-small-businesses-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Rockstar 2FA: Compromising Microsoft 365 Accounts-What MSPs and Small Businesses Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-pXf","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/99773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=99773"}],"version-history":[{"count":8,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/99773\/revisions"}],"predecessor-version":[{"id":99796,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/99773\/revisions\/99796"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=99773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=99773"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=99773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}