CRN
  • Home
  • News
  • Security

Attackers searching for vulnerable Microsoft Exchange servers: Huntress

By Steven Burke on Aug 23, 2021 6:53AM
Attackers searching for vulnerable Microsoft Exchange servers: Huntress

In The Spotlight

Introducing the CRN State of the MSP report

IoT Explained: What is the Internet of Things in Australia (June 2022)

Come to CRN's CyberSecurity Live Event!

See who was at Channel Meets: UC in Sydney

Threat researcher Huntress is warning MSPs of on-premise Microsoft Exchange Server ProxyShell vulnerabilities that could be exploited by cybercriminals as early as this weekend.

Huntress has seen 140-plus webshells on Microsoft Exchange Server 2013, 2016, and 2019. The threat researcher said it has uncovered 1,900 plus unpatched boxes in 48 hours.

“Attackers are actively scanning for vulnerable Microsoft Exchange servers and abusing the latest line of Microsoft Exchange vulnerabilities that were patched earlier this year,” said Huntress threat hunter John Hammond in a blog posted on Thursday.

The Exchange Server on-premise alert comes just five months after Huntress alerted MSPs to the scope and scale of a blockbuster Microsoft Exchange on premises breach that was initiated by Chinese state sponsored hackers.

At that time, Huntress revealed that the scope and scale of the on premise Exchange server exploit was much greater than Microsoft initially indicated.

“Back in March of this year, we saw multiple zero-day exploits being used to attack on-premises Exchange servers – and it looks like we’re not out of the woods yet,” said Hammond in Thursday’s blog post. “Those who have not patched since April or May are not safe and could still be exploited.”

Huntress is recommending that MSPs update the latest security patch, “monitor for new indicators of compromise and stay up to date on new information as it is released.” Huntress has promised to update the latest post with new findings as it gets them.

Hackers are exploiting vulnerabilities in ProxyShell to “install a backdoor for later access and post-exploitation,” said Hammond. “This ProxyShell attack uses three chained Exchange vulnerabilities to perform unauthenticated remote code execution.”

Huntress said its team has sent out over 100 incident reports related to the on premise Exchange server exploit on Tuesday and Wednesday alone.

Hammond said it is “imperative” that Exchange servers are updated with the latest patches. “As a minimum, please ensure that you have the July 2021 updates installed,” he wrote. “You can view the installed hotfixes by running the command systeminfo in an administrative command prompt.”

Huntress CEO Kyle Hanslovan in a Twitter post urged MSPs and customers to “keep your Exchange servers safe” this weekend.

“Huntress Labs has seen 140-plus webshells across 1,900 unpatched boxes in 48hrs,” he tweeted. “Impacted orgs thus far include building mfgs (manufacturers), seafood processors, industrial machinery, auto repair shops, a small residential airport and more.”

Additional reporting by Michael Novinson

This article originally appeared at crn.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © 2018 The Channel Company, LLC. All rights reserved.
Tags:
cybersecurity exchange servers huntress microsoft security vulnerability

Partner Content

How to prepare for the increasing demand for cloud-ready partners
Promoted Content
How to prepare for the increasing demand for cloud-ready partners
Tradewinds has turned unified communications into an easier upsell
Promoted Content
Tradewinds has turned unified communications into an easier upsell
Microsoft, Yealink and Alloy’s roadshows fire up the Australian channel
Promoted Content
Microsoft, Yealink and Alloy’s roadshows fire up the Australian channel
Is business nbn Enterprise Ethernet the future of business connectivity for MSPs?
Promoted Content
Is business nbn Enterprise Ethernet the future of business connectivity for MSPs?
Why rock-solid MSPs services require unified infrastructure monitoring
Promoted Content
Why rock-solid MSPs services require unified infrastructure monitoring

Sponsored Whitepapers

How vulnerability scans identify & protect against cyberthreats before criminals locate them
How vulnerability scans identify & protect against cyberthreats before criminals locate them
Monitoring & automation: A primer for MSPs
Monitoring & automation: A primer for MSPs
Endpoint Detection and Response
Endpoint Detection and Response
How to put your infrastructure into overdrive
How to put your infrastructure into overdrive
MSPs: Stack your solutions
MSPs: Stack your solutions
By Steven Burke
Aug 23 2021
6:53AM
0 Comments

Related Articles

  • Nation-state, ransomware groups using Log4j flaw
  • SolarWinds hackers access Microsoft AD Servers
  • AWS veteran Charlie Bell to join Microsoft as cybersecurity lead
  • Microsoft finds Office files used in attack attempts
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

What customers have said about their MSPs

What customers have said about their MSPs

TPG Telecom launches WA private cloud region

TPG Telecom launches WA private cloud region

State of the MSP

State of the MSP

Sydney's FullCRM shakes up leadership team

Sydney's FullCRM shakes up leadership team

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.