Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Attacks Targeting Recent Microsoft Exchange Flaw Ramping Up

Multiple threat actors are already targeting Microsoft Exchange servers in an attempt to exploit a vulnerability fixed by Microsoft with its February 2020 Patch Tuesday updates.

Multiple threat actors are already targeting Microsoft Exchange servers in an attempt to exploit a vulnerability fixed by Microsoft with its February 2020 Patch Tuesday updates.

Tracked as CVE-2020-0688 and found in Microsoft Exchange 2010, 2013, 2016, and 2019, the issue exists because the server doesn’t create unique cryptographic keys at the time of installation, which allows an authenticated attacker to trick the server into deserializing malicious ViewState data.

A couple of weeks after Microsoft released patches to address the bug, Zero Day Initiative (ZDI) published additional information on the vulnerability and how it can be exploited, and attackers immediately started scanning for vulnerable servers.

Only unpatched systems are exposed to attackers, but exploitation requires other conditions to be met as well. Specifically, the attacker needs access to the Exchange Control Panel (ECP) interface and to have working credentials at hand to log in to the ECP.

Over the weekend, the National Security Agency (NSA) warned in a tweet of the existence of this vulnerability and the attackers’ ability to run commands on unpatched servers.

Last week, Rapid7 released a module to incorporate the exploit into the Metasploit penetration testing framework, and attacks targeting vulnerable Exchange installations are beginning to ramp up, Volexity says.

Multiple advanced persistent threat (APT) actors are either exploiting or attempting to exploit Exchange servers, sometimes using long-compromised credentials that proved of no use so far. IP addresses and the targeting of credentials supposedly known from previous breaches suggest APTs are behind the new incidents, Volexity explains.

“This vulnerability gives attackers the ability to gain access to a significant asset within an organization with a simple user credential or old service account. This issue further underscores why changing passwords periodically is a good best practice, regardless of security measures like 2FA,” the security firm says.

Advertisement. Scroll to continue reading.

The attackers attempted to exploit CVE-2020-0688 to run system commands in an effort to conduct reconnaissance, deploy webshell backdoors, and run in-memory post-exploitation tools.

Additionally, the security firm says multiple adversaries are attempting to brute-force credentials by leveraging Exchange Web Services (EWS), in preparation for attacks targeting this vulnerability. According to Volexity, brute-force attacks at certain organizations have increased in both frequency and intensity following the vulnerability disclosure.

Organizations can detect potential compromises by examining specific directories and resources, including Exchange Server Exception logs, Application Event logs, and IIS logs, as well as Outlook Web Anywhere (OWA) or the default IIS web directory.

“Fortunately, this vulnerability does require a compromised credential to exploit and, as a result, will stave off widespread automated exploitation such as those that often deploy cryptocurrency miners or ransomware. However, more motivated attackers now have a way to compromise a critical piece of the IT infrastructure if it is not updated,” Volexity concludes.

Related: Hackers Looking for Exchange Servers Affected by Recently Patched Flaw

Related: Microsoft Patches IE Zero-Day, 98 Other Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...