{"version":"1.0","provider_name":"XLabs Security Blog","provider_url":"https:\/\/www.xlabs.com.br\/blog","author_name":"Mauricio Corr\u00eaa","author_url":"https:\/\/www.xlabs.com.br\/blog\/author\/mauricio-correa\/","title":"Malwares utilizando extens\u00f5es .cpl &ndash; XLabs Security Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"bR8YrDZkkb\"><a href=\"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/\">Malwares utilizando extens\u00f5es .cpl<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.xlabs.com.br\/blog\/malwares-utilizando-extensoes-cpl\/embed\/#?secret=bR8YrDZkkb\" width=\"600\" height=\"338\" title=\"&#8220;Malwares utilizando extens\u00f5es .cpl&#8221; &#8212; XLabs Security Blog\" data-secret=\"bR8YrDZkkb\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/malwares-utilizando-extensoes-cpl-blog-post-xlabs.png","thumbnail_width":1000,"thumbnail_height":488,"description":"Notamos um recente aumento nas dissemina\u00e7\u00f5es de Malwares se utilizando de extens\u00f5es para aplica\u00e7\u00f5es do painel de controle do Windows, conforme podemos perceber em um caso analisado por nossa equipe do SOC (Security Operation Center), ao qual foi informada pelo cliente do recebimento de um e-mail suspeito vindo de um contato de sua lista de e-mail's confi\u00e1veis, em coopera\u00e7\u00e3o com o cliente acessamos a sua esta\u00e7\u00e3o de trabalho e damos inicio a mais um chamado."}