March 29, 2021
Zero-Day vulnerabilities in Microsoft Exchange and their serious effects we do not know yet
MS Exchange gaps still threaten companies, public benefit organizations and many institutions. Although more than 90% of servers have been patched and vulnerabilities removed, the problem is that it is not known how many systems were already attacked before the vulnerability was removed.
Appropriate scripts and guides from Microsoft come to the rescue here, which describe the vulnerability and their removal, allow more or less probability to determine whether potential attackers accidentally exploited the vulnerability in our environments and what further steps should be taken – you can read it here HAFNIUM targeting Exchange Servers with 0-day exploits.
In one of the worst scenarios, after gaining access to the Exchange server, which was not difficult to exploit the vulnerability, attackers gain access to mailboxes, calendar, tasks, and contacts. Based on the obtained permissions, it starts further penetrating the company’s resources while hiding his presence. Therefore, there is a very high risk here related to the loss of confidentiality of information, leakage or destruction of data or blocking access to them and the entire infrastructure. It is also not difficult to imagine a different scenario in which – having access to the Exchange server – the attacker will impersonate a given company or person in the organization and spread his malicious activities, e.g. through phishing and harm our contractors and business partners.
It is significant that, apart from the confirmed many cases of exploiting the vulnerability in the server, we have not yet heard about any further actions of criminal groups.
However, more and more facts suggest that using this vulnerability allowed the REvil hackers group to launch a ransomware attack on Acer, which has been quite loud lately: REvil ransomware attack on Acer the most expensive in history.
This may suggest that in the future, criminals will want to sell the access for a targeted attack or to further surveillance and control a given organization for later monetization of hackers activities.
NaviRisk offer services for securing infrastructure elements and monitoring and managing vulnerabilities in the company’s ICT resources.
Read more:
August 22, 2024
OSINT Passport: Comprehensive Digital Footprint Analysis of Your Organization
In today’s world, where the volume of data in the digital space is growing exponentially, open sources are crucial for more than just information. They also represent potential backdoors for data leaks, the creation of compromising materials, and the acquisition of a comprehensive picture of individuals or companies. NaviRisk offers a complete overview of an […]
July 16, 2024
The number of cyber attacks on businesses is growing
The number of cyber attacks on businesses is growing. That’s an increase of several hundred percent for certain types of threats that give criminals remote access to a computer. Criminals are getting smarter and are not limiting themselves to standard phishing campaigns. Companies are being attacked five times more often than a year ago with […]
July 4, 2024
The New Law on the Protection of Whistleblowers is getting closer to coming into force
The New Law on the Protection of Whistleblowers is getting closer to coming into force. It will result in huge changes for entrepreneurs in Poland and the need to implement tools to handle intake. An experienced advisor such as NaviRisk will be needed to help manage whistleblower cases because companies face large fines for […]