March 29, 2021

Zero-Day vulnerabilities in Microsoft Exchange and their serious effects we do not know yet

MS Exchange gaps still threaten companies, public benefit organizations and many institutions. Although more than 90% of servers have been patched and vulnerabilities removed, the problem is that it is not known how many systems were already attacked before the vulnerability was removed.

Appropriate scripts and guides from Microsoft come to the rescue here, which describe the vulnerability and their removal, allow more or less probability to determine whether potential attackers accidentally exploited the vulnerability in our environments and what further steps should be taken – you can read it here HAFNIUM targeting Exchange Servers with 0-day exploits.

In one of the worst scenarios, after gaining access to the Exchange server, which was not difficult to exploit the vulnerability, attackers gain access to mailboxes, calendar, tasks, and contacts. Based on the obtained permissions, it starts further penetrating the company’s resources while hiding his presence. Therefore, there is a very high risk here related to the loss of confidentiality of information, leakage or destruction of data or blocking access to them and the entire infrastructure. It is also not difficult to imagine a different scenario in which – having access to the Exchange server – the attacker will impersonate a given company or person in the organization and spread his malicious activities, e.g. through phishing and harm our contractors and business partners.
It is significant that, apart from the confirmed many cases of exploiting the vulnerability in the server, we have not yet heard about any further actions of criminal groups.

However, more and more facts suggest that using this vulnerability allowed the REvil hackers group to launch a ransomware attack on Acer, which has been quite loud lately: REvil ransomware attack on Acer the most expensive in history.

This may suggest that in the future, criminals will want to sell the access for a targeted attack or to further surveillance and control a given organization for later monetization of hackers activities.
NaviRisk offer services for securing infrastructure elements and monitoring and managing vulnerabilities in the company’s ICT resources.

Read more:

How to deal with cyber risk in the era of Artificial Intelligence

When most people hear about cyber-attacks, they imagine suspended monitors, ransomware demands, ransomware and DDoS attacks that disrupt connectivity for hours or even days. But some experts fear that with the advent of widespread artificial intelligence in the hands of hackers – both lone wolves and states – we may be entering an era of […]

Cybersecurity Trends 2024

As in every other field of business and technological endeavor, artificial intelligence (AI) will have a transformative impact on both attack and defense. Its impact will be felt across every one of the trends in cybersecurity in 2024.   The cyber security trends that everybody should be on high alert for as we head into […]

Happy Holidays And All The Best In 2024

We Are NaviRisk and We Wish You Happy Holidays And All The Best In 2024   We look forward to another year of collaboration and shared accomplishments. Our unique competence will also work for you in 2024.


NaviRisk Sp. z o.o.

ul. Huculska 5/6
00-730 Warsaw

+48 605 19 11 19


Do you have any questions? Write to us!