Have You Audited Your Apps Lately? Here’s Why You Should.
Our smartphones are our lifelines. They keep us connected, entertained, and organized. But our devices can easily become cluttered with so many apps...
Urgent patching necessary. Microsoft continues to see increased attacks targeting unpatched systems by multiple malicious actors beyond Hafnium attack group.
A sophisticated attack on Microsoft’s widely used business email software, Microsoft Exchange Server, is shifting into a global cybersecurity crisis, as hackers race to infect as many victims as possible before companies can secure their computer systems.
Four ‘zero-day’ vulnerabilities in Microsoft Exchange Server are being actively exploited by Hafnium, a state-sponsored advanced persistent threat (APT) group from China that is described by Microsoft as a "highly skilled and sophisticated actor."
The attacks include three steps.
Microsoft is urging customers to apply the updates as soon as possible due to the critical rating of the flaws.
“We released security updates that will protect customers running Exchange Server. We strongly encourage all Exchange Server customers to apply these updates immediately” Microsoft said.
The flaws affected Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019. Exchange Online is not affected.
Bloomberg estimates approximately 60,000 organizations as known victims, as of March 8, many of which are small or medium-sized businesses.
Microsoft's Exchange Server team has released a script for IT admins to check if systems are vulnerable to recently-disclosed zero-day bugs.
As noted in an alert published by the US Cybersecurity and Infrastructure Security Agency (CISA) on Saturday, Microsoft's team has published a script on GitHub that can check the security status of Exchange servers.
The script has been updated to include indicators of compromise (IOCs) linked to four zero-day vulnerabilities found in Microsoft Exchange Server.
Microsoft recommends that you update and investigate in parallel, but if you must prioritize one, prioritize updating and mitigation of the vulnerability.
Successful response should consist of the following steps:
These vulnerabilities are being actively exploited by multiple rival hacking groups. Block access to vulnerable Exchange servers from untrusted networks until your Exchange servers are patched or mitigated.
“Microsoft continues to see multiple actors taking advantage of unpatched systems to attack organizations with on-premises Exchange Server. To aid defenders in investigating these attacks where Microsoft security products and tooling may not be deployed, we are releasing a feed of observed indicators of compromise (IOCs). The feed of malware hashes and known malicious file paths observed in related attacks is available in both JSON and CSV formats at the below GitHub links. This information is being shared as TLP:WHITE.”
For more information about these vulnerabilities and how to defend against their exploitation, see:
If you’re looking for IT services in the Tri-Cities or Yakima, Washington or Bend, Oregon areas, or concerned about the Exchange attack, give us a call at 541.848.6072 in Oregon or 509-396-6640 in Washington.
Our smartphones are our lifelines. They keep us connected, entertained, and organized. But our devices can easily become cluttered with so many apps...
The holiday season is here, bringing the excitement of discovering amazing deals during Black Friday and Cyber Monday. But while you’re hunting for...
Ah, the holiday season, when everything sparkles, sales soar, and your to-do list rivals Santa's naughty and nice list. For businesses, it's a time...