https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/

Advertisement
RSS Feed Subscribe to RSS
Twitter Follow me on Twitter
Facebook Join me on Facebook
[9]

Krebs on Security

In-depth security news and investigation

Brian Krebs

About the Author
Advertising/Speaking
---------------------------------------------------------------------
05
Mar 21

At Least 30,000 U.S. Organizations Newly Hacked Via Holes in
Microsoft's Email Software

At least 30,000 organizations across the United States -- including a
significant number of small businesses, towns, cities and local
governments -- have over the past few days been hacked by an unusually
aggressive Chinese cyber espionage unit that's focused on stealing
email from victim organizations, multiple sources tell
KrebsOnSecurity. The espionage group is exploiting four
newly-discovered flaws in Microsoft Exchange Server email software,
and has seeded hundreds of thousands of victim organizations
worldwide with tools that give the attackers total, remote control
over affected systems.

[exchange]

On March 2, Microsoft released emergency security updates to plug
four security holes in Exchange Server versions 2013 through 2019
that hackers were actively using to siphon email communications from
Internet-facing systems running Exchange.

In the three days since then, security experts say the same Chinese
cyber espionage group has dramatically stepped up attacks on any
vulnerable, unpatched Exchange servers worldwide.

In each incident, the intruders have left behind a "web shell," an
easy-to-use, password-protected hacking tool that can be accessed
over the Internet from any browser. The web shell gives the attackers
administrative access to the victim's computer servers.

Speaking on condition of anonymity, two cybersecurity experts who've
briefed U.S. national security advisors on the attack told
KrebsOnSecurity the Chinese hacking group thought to be responsible
has seized control over "hundreds of thousands" of Microsoft Exchange
Servers worldwide -- with each victim system representing
approximately one organization that uses Exchange to process email.

Microsoft said the Exchange flaws are being targeted by a previously
unidentified Chinese hacking crew it dubbed "Hafnium," and said the
group had been conducting targeted attacks on email systems used by a
range of industry sectors, including infectious disease researchers,
law firms, higher education institutions, defense contractors, policy
think tanks, and NGOs.

Microsoft's initial advisory about the Exchange flaws credited
Reston, Va. based Volexity for reporting the vulnerabilities.
Volexity President Steven Adair said the company first saw attackers
quietly exploiting the Exchange bugs on Jan. 6, 2021, a day when most
of the world was glued to television coverage of the riot at the U.S.
Capitol.

But Adair said that over the past few days the hacking group has
shifted into high gear, moving quickly to scan the Internet for
Exchange servers that weren't yet protected by those security
updates.

"We've worked on dozens of cases so far where web shells were put on
the victim system back on Feb. 28 [before Microsoft announced its
patches], all the way up to today," Adair said. "Even if you patched
the same day Microsoft published its patches, there's still a high
chance there is a web shell on your server. The truth is, if you're
running Exchange and you haven't patched this yet, there's a very
high chance that your organization is already compromised."

Reached for comment, Microsoft said it is working closely with the
U.S. Cybersecurity & Infrastructure Security Agency (CISA), other
government agencies, and security companies, to ensure it is
providing the best possible guidance and mitigation for its
customers.

"The best protection is to apply updates as soon as possible across
all impacted systems," a Microsoft spokesperson said in a written
statement. "We continue to help customers by providing additional
investigation and mitigation guidance. Impacted customers should
contact our support teams for additional help and resources."

Adair said he's fielded dozens of calls today from state and local
government agencies that have identified the backdoors in their
Exchange servers and are pleading for help. The trouble is, patching
the flaws only blocks the four different ways the hackers are using
to get in. But it does nothing to undo the damage that may already
have been done.

By all accounts, rooting out these intruders is going to require an
unprecedented and urgent nationwide clean-up effort. Adair and others
say they're worried that the longer it takes for victims to remove
the backdoors, the more likely it is that the intruders will follow
up by installing additional backdoors, and perhaps broadening the
attack to include other portions of the victim's network
infrastructure.

Security researchers have published a tool on Microsoft's Github code
repository that lets anyone scan the Internet for Exchange servers
that have been infected with the backdoor shell.

KrebsOnSecurity has seen portions of a victim list compiled by
running this tool, and it is not a pretty picture. The backdoor web
shell is verifiably present on the networks of thousands of U.S.
organizations, including banks, credit unions, non-profits,
telecommunications providers, public utilities and police, fire and
rescue units.

"It's police departments, hospitals, tons of city and state
governments and credit unions," said one source who's working closely
with federal officials on the matter. "Just about everyone who's
running self-hosted Outlook Web Access and wasn't patched as of a few
days ago got hit with a zero-day attack."

Another government cybersecurity expert who participated in a recent
call with multiple stakeholders impacted by this hacking spree
worries the cleanup effort required is going to be Herculean.

"On the call, many questions were from school districts or local
governments that all need help," the source said, speaking on
condition they were not identified by name. "If these numbers are in
the tens of thousands, how does incident response get done? There are
just not enough incident response teams out there to do that
quickly."

When it released patches for the four Exchange Server flaws on
Tuesday, Microsoft emphasized that the vulnerability did not affect
customers running its Exchange Online service (Microsoft's
cloud-hosted email for businesses). But sources say the vast majority
of the organizations victimized so far are running some form of
Internet-facing Microsoft Outlook Web Access (OWA) email systems in
tandem with Exchange servers internally.

"It's a question worth asking, what's Microsoft's recommendation
going to be?," the government cybersecurity expert said. "They'll say
'Patch, but it's better to go to the cloud.' But how are they
securing their non-cloud products? Letting them wither on the vine."

The government cybersecurity expert said this most recent round of
attacks is uncharacteristic of the kinds of nation-state level
hacking typically attributed to China, which tends to be fairly
focused on compromising specific strategic targets.

"Its reckless," the source said. "It seems out of character for
Chinese state actors to be this indiscriminate."

Microsoft has said the incursions by Hafnium on vulnerable Exchange
servers are in no way connected to the separate SolarWinds-related
attacks, in which a suspected Russian intelligence group installed
backdoors in network management software used by more than 18,000
organizations.

"We continue to see no evidence that the actor behind SolarWinds
discovered or exploited any vulnerability in Microsoft products and
services," the company said.

Nevertheless, the events of the past few days may well end up far
eclipsing the damage done by the SolarWinds intruders.

This is a fast-moving story, and likely will be updated multiple
times throughout the day. Stay tuned.

[92]

Tags: Hafnium, Microsoft Exchange server flaws, Steven Adair,
Volexity

This entry was posted on Friday, March 5th, 2021 at 4:07 pm and is
filed under Latest Warnings, The Coming Storm, Time to Patch. You can
follow any comments to this entry through the RSS 2.0 feed. You can
skip to the end and leave a comment. Pinging is currently not
allowed.

4 comments

 1. [091d] Mahhn
    March 5, 2021 at 4:58 pm

    Thanks to you and one other site, we ensured our safety the day
    this was announced. Confirmed this morning by tools we were not
    effected. Patching has gone from waiting a few days to see if it
    breaks things to, tying to patch before it's even been announced
    lol. Thanks for the heads up.

    Reply
 2. [f7e8] Mat
    March 5, 2021 at 5:35 pm

    US is filled with such reporters, attorneys, useless executives/
    CISOs who have no idea what Security Engineering is but with just
    bunch of non-sense certifications.

    Send them to Russia and China to get trained.

    Reply
 3. [e8e8] John
    March 5, 2021 at 5:48 pm

    Microsoft also released a patch for Exchange 2010.

    Reply
 4. [b883] daniel
    March 5, 2021 at 5:56 pm

    Posted @ 4:07PM on a Friday afternoon. Thank you Brian.

    -admins and security engineers everywhere

    Reply

Leave a comment

Click here to cancel reply.

Name (required)[                      ]

Email (required)[                      ]

Website[                      ]

Comment
[                                                                      ]
[                                                                      ]
[                                                                      ]
[                                                                      ]
[                                                                      ]
[                                                                      ]
[                                                                      ]
[                                                                      ]
[                                                                      ]
[                                                                      ]

[Submit Comment] 

[                                             ]
[                                             ]
[                                             ]
[                                             ]
[                                             ]
[                                             ]
[                                             ]
[                                             ]
Advertisement
[46]

  * [                    ] [search_mag]

[97]


  * Mailing List

    Subscribe here
  * Recent Posts

      + At Least 30,000 U.S. Organizations Newly Hacked Via Holes in
        Microsoft's Email Software
      + Three Top Russian Cybercrime Forums Hacked
      + Microsoft: Chinese Cyberspies Used 4 Exchange Server Flaws to
        Plunder Emails
      + Payroll/HR Giant PrismHR Hit by Ransomware?
      + Is Your Browser Extension a Botnet Backdoor?
  * 
  * All About Skimmers

    All About Skimmers

    Click image for my skimmer series.

  * Donate to Krebs On Security
  * Spam Nation

    Spam Nation

    A New York Times Bestseller!

  *  
  * The Value of a Hacked PC

    valuehackedpc

    Badguy uses for your PC

  * Tools for a Safer PC

    Tools for a Safer PC

    Tools for a Safer PC

  * The Pharma Wars

    The Pharma Wars

    Spammers Duke it Out

  * Badguy Uses for Your Email

    Badguy Uses for Your Email

    Your email account may be worth far more than you imagine.

  * eBanking Best Practices

    eBanking Best Practices

    eBanking Best Practices for Businesses

  * Most Popular Posts

      + Sextortion Scam Uses Recipient's Hacked Passwords (1076)
      + Online Cheating Site AshleyMadison Hacked (798)
      + Sources: Target Investigating Data Breach (620)
      + Trump Fires Security Chief Christopher Krebs (534)
      + Cards Stolen in Target Breach Flood Underground Markets (445)
      + Reports: Liberty Reserve Founder Arrested, Site Shuttered
        (416)
      + Was the Ashley Madison Database Leaked? (376)
      + DDoS-Guard To Forfeit Internet Space Occupied by Parler (374)
      + True Goodbye: 'Using TrueCrypt Is Not Secure' (363)
      + Who Hacked Ashley Madison? (361)
  * Category: Web Fraud 2.0

    Criminnovations

    Innovations from the Underground

  * [shreddedID-copy-285x189]

    ID Protection Services Examined

  * Is Antivirus Dead?

    Is Antivirus Dead?

    The reasons for its decline

  * The Growing Tax Fraud Menace

    The Growing Tax Fraud Menace

    File 'em Before the Bad Guys Can

  * Inside a Carding Shop

    Inside a Carding Shop

    A crash course in carding.

  * Beware Social Security Fraud

    Beware Social Security Fraud

    Sign up, or Be Signed Up!

  * How Was Your Card Stolen?

    How Was Your Card Stolen?

    Finding out is not so easy.

  * Krebs's 3 Rules...

    Krebs's 3 Rules...

    ...For Online Safety.

---------------------------------------------------------------------

(c) 2021 Krebs on Security.  Powered by WordPress.  Privacy Policy