The Exchange Server Hack: What to Know — And Do — In Its Aftermath
The Microsoft Exchange Server attack
In March of this year, Microsoft issued public warnings about zero-day attacks — first detected in January — on its Exchange Server software. The announcement coincided with the release of patches to address vulnerabilities. Governments, corporations, and all manner of other organizations use this software to manage communication and scheduling. So, when hackers exploited a previously unknown vulnerability, they gained access to sensitive data from schools, businesses, defense contractors, and government agencies all over the world. Exchange’s popularity makes it a rich target for cybercriminals, and we don’t yet know the extent of the breach. But this latest cyberattack — coming so quickly on the heels of the SolarWinds and Mimecast incidents — validates our collective, ongoing concerns about cybersecurity and data protection.
Why did the Exchange attack occur?
Microsoft Exchange Server manages contacts, email, calendars, scheduling, and collaboration for organizations of every size and sort. In the digital world, Exchange is everywhere — from personal accounts to domestic and international government agencies. Perhaps that’s why CNBC predicts, “The hack will probably stand out as one of the top cybersecurity events of the year.” One analysis puts the number of online servers affected at 99,000. And Krebs on Security says, “the vulnerabilities the attackers exploited have been in the Microsoft Exchange Server code base for more than ten years.” It’s alarming enough to know that hackers had both the means and opportunity to mount this attack, but things get more ominous when we examine their motives.
Microsoft calls the hack a nation-state cyberattack, and points the finger at “a state-sponsored threat actor” known as Hafnium. The group is based in China but uses virtual private servers (VPS) to operate within the United States. Their approach was three-fold:
According to The Wall Street Journal, as many as 250,000 Microsoft customers may have fallen victim to the Exchange Server breach. Most of those affected will have little information of value, but the hackers likely gained access to some sensitive intelligence data. And while the software patches prevent new access, they do nothing to address established web shells. Hackers with existing remote access are still set up to spear phish at will.
Recommended by LinkedIn
What is spear phishing?
Spear phishing is a social engineering campaign targeted at specific people and/or organizations. Hackers spoof trusted contact accounts to send messages that solicit a particular action from the recipient. Spear phishing campaigns can be customized to each organization. Hackers can monitor emails to identify key targets — or even perform an account takeover (ATO) and use your email address to launch new attacks. Whether it’s wiring money or clicking a bogus link that unleashes malware, the hacker wants the end-user to do something. Imagine receiving an email requesting the corporate credit card number — from your boss. Or an embarrassing message from the CEO — with photo attachments.
The Exchange hack exposed its original targets to this type of attack — which is bad enough — but it’s the potential ripple effect that has cybersecurity experts concerned. Every original victim has contacts outside their organization, and those contacts have their own external contacts who have their own external contacts, and so on and so forth. Add that to the authentic appearance — and 70% open rate — of spear phishing emails, and you begin to understand the scope of the problem.
How to prevent a spear phishing attack
Take immediate action to mitigate the risk of a spear phishing attack. TechRepublic provides several solid suggestions:
Concerned about gaps in your cybersecurity protection? Talk with the IT experts at SecureNation.
The attack surfaces for cyberattacks and the resulting risks for companies are increasing strongly! Nevertheless, we have the solution for that! Contact us to have more information!
This is probably the largest "hack" of internal systems in one nation-state attack. This will continue to be a problem for businesses and Microsoft for quite a while. There may never be a full accounting of data that has been and continues to be lost from this Incident.
The human factor, before even AI, but alas kill off all humans, implement AI, the real thing not script/software driven automation and watch them turn into the flawed humans beings that were their creators.
Thanks Jon Davis loving the article, especially the whole HERE'S what TO do! I love seeing the problem described AND some well sorted options for how to fix!