Microsoft warns even patched Exchange servers can still be attacked

Zero-day attack
(Image credit: Shutterstock.com)
Audio player loading…

Microsoft’s analysis of the series of attacks that exploit the now-fixed zero-day vulnerabilities (opens in new tab) on Exchange servers (opens in new tab) reveals that the threat doesn’t end simply by applying patches (opens in new tab).

Chinese state-sponsored threat actor Hafnium was blamed for being the first to exploit the vulnerabilities known as ProxyLogon vulnerabilities (opens in new tab). Utilities such as Microsoft’s one-click tool (opens in new tab) has helped ensure that over 90% servers, several at small business (opens in new tab) that lack dedicated IT and security teams, have now plugged the vulnerabilities. However, the threat is far from over.

“Many of the compromised systems have not yet received a secondary action, such as human-operated ransomware attacks or data exfiltration, indicating attackers could be establishing and keeping their access for potential later actions,” the company warned.

TechRadar needs yo...

We're looking at how our readers use VPN for a forthcoming in-depth report. We'd love to hear your thoughts in the survey below. It won't take more than 60 seconds of your time.

>> Click here to start the survey in a new window (opens in new tab)<<

Second wave?

Even though a majority of the servers have been patched, the cause of concern are reports from security experts such as ESET, which had observed over 5000 compromised servers (opens in new tab).

In the weeks following the disclosure of the vulnerabilities and the release of the patches, security researchers picked up several attacks on Exchange servers such as the human-operated DearCry ransomware attack (opens in new tab).

In a blog post, the Microsoft 365 Defender Threat Intelligence Team has now shared “threat trends” that it has observed as part of its investigations into the attacks.

Besides human-operated attacks that drop malware (opens in new tab) such as ransomware into the servers, the team has picked up on several instances of web shell attacks and credential theft. The researchers believe these could potentially be used for follow up attacks.

They’ve shared detailed analysis into several known post-compromise activities, while urging administrators to exercise credential hygiene in order to prevent the threat actors from regaining access to the servers. 

It has also published tools and guides to help remove known web shells and attack tools, while sharing some best practices to help admins run servers with least privileges in order to minimize damage in case of a compromise.

Via: ZDNet (opens in new tab)

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.