Microsoft Exchange Server Attacked By Chinese Hackers

Chinese state-sponsored hackers have attacked on-premises versions of Microsoft Exchange Server using zero-day exploits in an effort to obtain long-term access to victim environments.

The Redmond, Wash.-based software giant said the hackers took advantage of previously unknown vulnerabilities to carry out limited and targeted attacks against on-premises Exchange servers. This enabled access to victim email accounts, which in turn allowed for the installation of additional malware that pave the way for long-term access.

The Microsoft Threat Intelligence Center is attributing the campaign to Hafnium, a state-sponsored hacking group based in China that conducts its operations primarily from leased virtual private servers in the United States. Hafnium targets U.S.-based infectious disease researchers, policy think tanks, higher education institutions, law firms, defense contractors and NGOs in hopes of exfiltrating information.

[Related: Microsoft’s Brad Smith Drags AWS, Google Over SolarWinds Response]

“We are sharing this information with our customers and the security community to emphasize the critical nature of these vulnerabilities and the importance of patching all affected systems immediately to protect against these exploits and prevent future abuse across the ecosystem,” the Microsoft Threat Intelligence Center wrote in a blog Tuesday.

The Chinese hackers would first gain access to an Exchange Server either with stolen passwords or by using the zero-day vulnerabilities to disguise themselves as someone who should have access, Tom Burt, Microsoft’s corporate vice president of customer security and trust, wrote in a blog post Tuesday. From there, Burt said the hackers would create a web shell to control the compromised server remotely.

Finally, Burt said the hackers would capitalize on their remote access – run from U.S.-based private servers – to steal data from an organization’s network. Hafnium’s exploits don’t affect Exchange Online are in no way connected to the massive SolarWinds campaign, which was carried out by the Russian foreign intelligence service. Microsoft has briefed appropriate U.S. government agencies on this activity.

“Even though we’ve worked quickly to deploy an update for the Hafnium exploits, we know that many nation-state actors and criminal groups will move quickly to take advantage of any unpatched systems,” Burt wrote in his blog post. “Promptly applying today’s patches in the best protection against this attack.”

Volexity first detected anomalous activity from two of its customers’ Microsoft Exchange servers on Jan. 6, with large amounts of data being sent to IP addresses not believed to be tied to legitimate users. The incident response vendor said it’s seeing active in-the-wild exploitation of multiple Microsoft Exchange vulnerabilities used to steal email and compromise networks, and worked with Microsoft to investigate.

The hackers took advantage of one vulnerability to steal the full contents of several user mailboxes, Volexity said, which only required knowing the server running Exchange as well as the account from which they want to extract email. The flaw is remotely exploitable and requires neither authentication of any kind nor any special knowledge or access to a target environment, according to Volexity.

“Volexity has observed the attacker writing webshells to disk and conducting further operations to dump credentials, add user accounts, steal copies of the Active Directory database, and move laterally to other systems and environments,” Volexity wrote in a blog post published Tuesday.

The first Microsoft vulnerability allowed Hafnium to send arbitrary HTTP requests and authenticate as the Exchange server, according to the Microsoft Threat Intelligence Center. The second vulnerability required administrator permission or another flaw to exploit, and give Hafnium the ability to run code as SYSTEM on the Exchange server, according to Microsoft.

If Hafnium was able to authenticate with the Exchange server, the hackers could either compromise a legitimate admin’s credentials or take advantage of the third or fourth Microsoft vulnerabilities to write a file to any path on the server. The hackers were also able to download the Exchange offline address book from compromised systems, which contains information about an organization and its users.

“After exploiting these vulnerabilities to gain initial access, Hafnium operators deployed web shells on the compromised server,” the Microsoft Threat Intelligence Center wrote in its blog post. “Web shells potentially allow attackers to steal data and perform additional malicious actions that lead to further compromise.”RELATED TOPICS:

Back to Top

RELATED STORIES

VIDEO

Play Video

  1. Aryaka: The Future Of The Hybrid Workplace Demands New Architectural Approach
  2. Infinidat: Operational Efficiency Is Key To Reinventing Data Centers At Petabyte Scale
  3. Protect Your People With Proofpoint
  4. Behind The Boss with Wendy Taccetta
  5. Dell And The Intel vPro® Platform Enable Advanced Remote Management
  6. Most Influential Channel Chiefs: Women Should Embrace ‘Confidence,’ ‘Become An Agent Of Change’
  7. Energize Your Digital Strategy With Dell Technologies
  8. Exclusive: Axonius Partner Community Driving 50 Percent Of New Business
  9. WatchGuard Cloud Security Services Help Grow MSP Busiensses
  10. Lenovo is Channel-First In 2021
  11. Two Mins With Former Boston Bruin, FutureVault CISO
  12. A Smarter AI Infrastructure with NetApp and NVIDIA
  13. Small Business Recovery in 2021
  14. Evolving Your Solutions To Meet Customer Needs
  15. What Makes A Channel Chief Most Influential
  16. Cyber Threat Report: How To Turn Endpoints Into Fortresses
  17. A Smarter Way Forward For The Data Center
  18. Cybersecurity Corner: Bitglass’ Latest Report Finds Hospital Breaches Increased By 50% Last Year
  19. Rob Cato: Lenovo Will Focus On Services-Led Transformation In 2021
  20. Why Supply Chain Security Is Critical For The Channel

TRENDING STORIES

  1. Microsoft Exchange Server Attacked By Chinese Hackers
  2. IBM CEO Arvind Krishna’s ‘Deeply, Deeply Passionate’ Plan To Make IBM-Red Hat No. 1 In Hybrid Cloud,
  3. Verizon Outage Hits East Coast As Users Begin Work
  4. TPG Capital To Buy Thycotic For $1.4B, Merge It With Rival Centrify: Report
  5. Why Dell’s Stock Jumped 189% In One Year

SPONSORED RESOURCES

FROM OUR ADVERTISERS

Left
Right

Dell TechnologiesDell Technologies Storage Learning CenterTrend MicroTrend Micro Learning CenterBlackBerryBlackBerry Learning CenterApplication IntegrationDell TechnologiesDell Technologies Cloud Learning CenterHitachi VantaraHitachi VantaraChannel Chief ShowcaseDell TechnologiesDell Technologies Hybrid Cloud Learning CenterSophosSophos Cybersecurity Learning CenterCradlepoint5g for BusinessStorageCraftDisaster Recovery Learning CenterHubStorCloud BackupMimecastMimecasteSentireManaged Detection and ResponseAcerRemote WorkforceTenableCyber RiskVMwareNPDIndustry TrendsComcast BusinessComcast Business Learning CenterEPOSEPOSWasabiWasabiCarboniteCloud StorageCysuranceCyber InsuranceVeeamVeeamSherwebSherwebVertivEdge Computing Learning CenterFujifilmFujifilmAPC by Schneider ElectricDigital Services for Edge Learning CenterSymantecSymantec Business Security Learning CenterComm100Collaboration & CommunicationsSmart 3rd Party3rd Party MaintenanceWebrootWebroot Learning CenterDell TechnologiesDell Technologies Server Learning Center

SUBSCRIBE

CRN Magazines

SIGN ME UPUnique industry intelligence, management strategies and forward-looking insight delivered bi-monthly.

CRN Newsletters

SIGN ME UPIT channel news with the solution provider perspective you know and trust sent to your inbox.

CRN Lists & Awards

SIGN ME UPReceive notification when applications open for lists and awards.
APPLY

CRN Applications

APPLY NOWApply For Tech Elite 250
APPLY NOWApply For Women of the Channel

CAREERSPRIVACY POLICYTERMS OF SERVICE

SHARE, LIKE, FOLLOW CRN
Facebook
LinkedIn
Twitter
YouTube

   © 2021 The Channel Company
All rights reserved.


Source
https://www.crn.com/news/security/microsoft-exchange-server-attacked-by-chinese-hackers

Leave a Reply

Your email address will not be published. Required fields are marked *