March 29, 2021
Zero-Day vulnerabilities in Microsoft Exchange and their serious effects we do not know yet
MS Exchange gaps still threaten companies, public benefit organizations and many institutions. Although more than 90% of servers have been patched and vulnerabilities removed, the problem is that it is not known how many systems were already attacked before the vulnerability was removed.
Appropriate scripts and guides from Microsoft come to the rescue here, which describe the vulnerability and their removal, allow more or less probability to determine whether potential attackers accidentally exploited the vulnerability in our environments and what further steps should be taken – you can read it here HAFNIUM targeting Exchange Servers with 0-day exploits.
In one of the worst scenarios, after gaining access to the Exchange server, which was not difficult to exploit the vulnerability, attackers gain access to mailboxes, calendar, tasks, and contacts. Based on the obtained permissions, it starts further penetrating the company’s resources while hiding his presence. Therefore, there is a very high risk here related to the loss of confidentiality of information, leakage or destruction of data or blocking access to them and the entire infrastructure. It is also not difficult to imagine a different scenario in which – having access to the Exchange server – the attacker will impersonate a given company or person in the organization and spread his malicious activities, e.g. through phishing and harm our contractors and business partners.
It is significant that, apart from the confirmed many cases of exploiting the vulnerability in the server, we have not yet heard about any further actions of criminal groups.
However, more and more facts suggest that using this vulnerability allowed the REvil hackers group to launch a ransomware attack on Acer, which has been quite loud lately: REvil ransomware attack on Acer the most expensive in history.
This may suggest that in the future, criminals will want to sell the access for a targeted attack or to further surveillance and control a given organization for later monetization of hackers activities.
NaviRisk offer services for securing infrastructure elements and monitoring and managing vulnerabilities in the company’s ICT resources.
Read more:
January 20, 2026
Investigations in local operations – when headquarters need clarity on the ground
In international organizations, some of the most serious risks arise far from headquarters. They develop within local subsidiaries, branches or operational units, where management autonomy is high and direct oversight is limited. From our experience at NaviRisk, investigations are frequently commissioned by international owners, boards or headquarters in response to concerns related to local management […]
January 20, 2026
Fraud, Digital Footprint and Brand Protection – How to Safeguard Your Company
Learn how to prevent fraud, monitor digital footprint, and protect your brand. Proactive risk management improves security, reputation, and trust. In the digital era, every company faces unique challenges. Risks are increasingly complex, dynamic, and dependent on business context, industry, and scale. At NaviRisk, we work broadly across risk management, security, and organizational resilience. In our […]
December 31, 2025
Cyber Threat Intelligence Analyst
At NaviRisk, we help international clients navigate complex risks by providing comprehensive analytical, systemic, and advisory support. As our company continues to grow dynamically, we are looking for a motivated and dedicated professional to join our team at our Warsaw office. About the role: We are seeking a Cyber Threat Intelligence Analyst to support […]