Microsoft Exchange Server bug target of state-sponsored hackers

Must Read

NEC appoints former McKinsey’s SVP Aalok Kumar as President and CEO for India

NEC has appointed former Senior Vice President of & Company Aalok Kumar as the new President and Chief Executive Officer (CEO) of NEC Technologies India.

South Korean firm Lunit makes its AI-powered software to detect COVID-19 free

South Korea based medical AI software firm Lunit that develops AI-powered analysis of lung diseases via chest x-ray images said that it will be releasing its software online, free of charge, to help healthcare professionals manage coronavirus across the globe

Nutanix Objects 2.0 bolsters unstructured data storage, big data and analytics management

Hyperconverged infrastrucutre provider Nutanix said that the new release of have new features for big data and analytics applications, as well as unstructured data storage
Tech Observer Desk
Tech Observer Desk
TechObserver.in covers e-governance, enterprise IT, startups, telecom and consumer electronics.

LONDON: London-based said that several state-sponsored hacking groups are exploiting a vulnerability in Server that the company patched in February.

The company claimed that they have identified the vulnerability — CVE-2020-0688 — exploited in the wild by advanced persistent threat (APT) actors. The vulnerability was first discovered by an anonymous security researcher and reported to Microsoft by way of Trend Micro’s Zero Day Initiative.

“Two weeks after the security updates were released, the Zero Day Initiative published a blog post providing more details on the vulnerability. The post made it clear that an attacker could exploit a vulnerable if the three criteria are not met,” said the Threat Research team in a statement.

“The Microsoft Exchange Server had not been patched since February 11, 2020; The Exchange Control Panel (ECP) interface was accessible to the attacker and the attacker has a working credential that allows them to access the Exchange Control Panel in order to collect the ViewState Key,” the security researchers noted.

Volexity has observed multiple APT actors exploiting or attempting to exploit on-premise Exchange servers. In some cases, the attackers appear to have been waiting for an opportunity to strike with credentials that had otherwise been of no use.

Many organisations employ two-factor authentication (2FA) to protect their VPN, e-mail, etc., limiting what an attacker can do with a compromised password.

“This vulnerability gives attackers the ability to gain access to a significant asset within an organization with a simple user credential or old service account,” said security researchers.

Volexity has observed multiple APT actors exploiting or attempting to exploit on-premise Exchange servers.
Volexity has observed multiple APT actors exploiting or attempting to exploit on-premise Exchange servers. (Photo: Volexity)

This issue further underscores why changing passwords periodically is a good best practice, regardless of security measures like 2FA. Microsoft was yet to react to the Volexity report.

According to Volexity, the most obvious way to address this vulnerability is to apply the security updates made available from Microsoft on February 11, 2020. In addition, the company advised to place access control list (ACL) restrictions on the ECP virtual directory in IIS and/or via any web application firewall capability.

Cybersecurity firm said that it recommends that the ECP directory not be accessible to anyone that does not specifically need to access it. Ideally, this means disabling access from the Internet and even restricting which IPs within an organization can reach it.

- Advertisement -

Latest in TECH

South Korean firm Lunit makes its AI-powered software to detect COVID-19 free

South Korea based medical AI software firm Lunit that develops AI-powered analysis of lung diseases via chest x-ray images said that it will be releasing its software online, free of charge, to help healthcare professionals manage coronavirus across the globe
- Advertisement -SAP Hana

Related Articles