{"id":19204,"date":"2021-03-07T07:33:15","date_gmt":"2021-03-07T06:33:15","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=19204"},"modified":"2021-03-14T21:44:14","modified_gmt":"2021-03-14T20:44:14","slug":"neues-zum-exchange-hack-testtools-von-microsoft-co","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/03\/07\/neues-zum-exchange-hack-testtools-von-microsoft-co\/","title":{"rendered":"Exchange Hack News &#8211; Test tools from Microsoft and others"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/03\/07\/neues-zum-exchange-hack-testtools-von-microsoft-co\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]The Hafnium hacker group has probably managed to compromise hundreds of thousands of Exchange installations worldwide via vulnerabilities. A patch to close the vulnerabilities is available, but it may be too late. However, tools are now available from Microsoft and third parties to check Exchange instances for signs of the hack.<\/p>\n<p><!--more--><\/p>\n<h2>Hundreds of thousands of Exchange servers infiltrated<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg09.met.vgwort.de\/na\/fea185a0a57540cfac1db97d4ce128ee\" width=\"1\" height=\"1\">It appears that after the SolarWinds attack by suspected state-affiliated Russian attackers, the next security disaster has just been revealed. Hackers from the suspected state-affiliated Chinese hacking group Hafnium have been using vulnerabilities in on-premise Exchange servers to infiltrate for months. The vulnerability was not closed by security updates until March 2, 2021. I had reported about it in various blog posts (see end of article). And the Volexity blog (their security researchers discovered the attack and vulnerabilities) has <a href=\"https:\/\/www.volexity.com\/blog\/2021\/03\/02\/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">this post<\/a> on the subject. <a href=\"https:\/\/www.volexity.com\/blog\/2021\/03\/02\/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\">dieser Beitrag<\/a> zum Thema.<\/p>\n<p>The attackers' goal was to gain control of the victims' email and possibly access and infiltrate their network infrastructure via Active Directory permissions. Just a few days ago, I assumed that only a few US institutions and companies were targeted. <\/p>\n<p>It is now clear that mass scans were conducted on the Internet and that the hafnium group was aggressively trying to infiltrate vulnerable Exchange instances. In the blog post Important <a href=\"https:\/\/borncity.com\/win\/2021\/03\/06\/wichtige-hinweise-microsofts-und-des-bsi-zum-exchange-server-sicherheitsupdate-mrz-2021\/\">Important notes from Microsoft regarding the Exchange server security update (March 2021)<\/a>, I had mentioned the German BSI's warning that thousands of German Exchange installations had been hacked. The BSI has started to inform identified affected people by mail. <\/p>\n<p><a href=\"https:\/\/blog.rapid7.com\/content\/images\/2021\/03\/k2ZPbJJqeMYbseXDc4Nn9ZUIfULT9ACSnOAbAVLWMBkobEID0xZ_prpWzGAuDHg-y-6GfHi_bM3t4FZL55cUiQJlZcRYMRiEh6jHjNqyisx0u-g6eKP7nEgf4vj0UGslYQjw3VnL.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" title=\"Infizierte Exchange-Server\" alt=\"Infizierte Exchange-Server\" src=\"https:\/\/blog.rapid7.com\/content\/images\/2021\/03\/k2ZPbJJqeMYbseXDc4Nn9ZUIfULT9ACSnOAbAVLWMBkobEID0xZ_prpWzGAuDHg-y-6GfHi_bM3t4FZL55cUiQJlZcRYMRiEh6jHjNqyisx0u-g6eKP7nEgf4vj0UGslYQjw3VnL.png\" width=\"625\" height=\"505\"><\/a><br \/>Infected Exchange servers, Source: <a href=\"https:\/\/blog.rapid7.com\/2021\/03\/03\/rapid7s-insightidr-enables-detection-and-response-to-microsoft-exchange-0-day\/\" target=\"_blank\" rel=\"noopener\">Rapid7<\/a> &#8211; <a href=\"https:\/\/blog.rapid7.com\/content\/images\/2021\/03\/k2ZPbJJqeMYbseXDc4Nn9ZUIfULT9ACSnOAbAVLWMBkobEID0xZ_prpWzGAuDHg-y-6GfHi_bM3t4FZL55cUiQJlZcRYMRiEh6jHjNqyisx0u-g6eKP7nEgf4vj0UGslYQjw3VnL.png\" target=\"_blank\" rel=\"noopener\">Click to Zoom<\/a><\/p>\n<p>In <a href=\"https:\/\/blog.rapid7.com\/2021\/03\/03\/rapid7s-insightidr-enables-detection-and-response-to-microsoft-exchange-0-day\/\" target=\"_blank\" rel=\"noopener\">this article<\/a>, security vendor Rapid7&nbsp; in <a href=\"https:\/\/blog.rapid7.com\/2021\/03\/03\/rapid7s-insightidr-enables-detection-and-response-to-microsoft-exchange-0-day\/\" target=\"_blank\" rel=\"noopener\">diesem Artikel<\/a> assumes there are 170,000 Exchange servers at risk, though there are probably \"hot spots\" in the U.S. and Germany with more than 10,000 instances. The article also gives IP addresses that scan the Internet &#8211; and there is an analysis of how one might detect an infection. More information and analysis is provided in <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/\" target=\"_blank\" rel=\"noopener\">this Microsoft article<\/a>, as well as <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-062a\" target=\"_blank\" rel=\"noopener\">this US-CERT warning<\/a>.<\/p>\n<p>It's a terrible mess, because it likely have affected many small businesses where an Exchange server is bumming around (see also <a href=\"https:\/\/www.wired.com\/story\/china-microsoft-exchange-server-hack-victims\/\" target=\"_blank\" rel=\"noopener\">this Wired article<\/a>). Security researchers from the discovering security vendor Volexity consider the whole thing a ticking time bomb. And patching now won't help if the hafnium group has already installed a webshell as a backdoor.<\/p>\n<h2>Scan tools from Microsoft &amp; CERT<\/h2>\n<p>Microsoft has extended a long-standing PowerShell script known as Test-Hafnium, named <em>Test-ProxyLogon.ps1<\/em>, to detect the vulnerabilities now being exploited. The script and additional notes can be found on <a href=\"https:\/\/github.com\/microsoft\/CSS-Exchange\/tree\/main\/Security\" target=\"_blank\" rel=\"noopener\">GitHub<\/a>. <\/p>\n<p><a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1368276421156683785\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Test-ProxyLogon.ps1 \" alt=\"Test-ProxyLogon.ps1 \" src=\"https:\/\/i.imgur.com\/6crHN3M.png\"><\/a><\/p>\n<p>points out the PowerShell script <a href=\"https:\/\/github.com\/microsoft\/CSS-Exchange\/blob\/main\/Security\/\" target=\"_blank\" rel=\"noopener\">Test-ProxyLogon.ps1<\/a>in the above <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1368276421156683785\" target=\"_blank\" rel=\"noopener\">tweet<\/a> &#8211; <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/this-new-microsoft-tool-checks-exchange-servers-for-proxylogon-hacks\/\" target=\"_blank\" rel=\"noopener\">this article<\/a> has some more notes on the topic. Microsoft security researcher Kevin Beaumont points to an official Microsoft <a href=\"https:\/\/github.com\/microsoft\/CSS-Exchange\/blob\/main\/Security\/\" target=\"_blank\" rel=\"noopener\">nmap script<\/a> in the following <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1367994569476935680\" target=\"_blank\" rel=\"noopener\">tweet<\/a> that identifies whether systems are vulnerable to the Exchange vulnerabilities regardless of the CU\/SU situation. No authentication is required.<\/p>\n<p><a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1367994569476935680\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Microsoft nmap script for Exchange vulnerabilities\" alt=\"Microsoft nmap script for Exchange vulnerabilities\" src=\"https:\/\/i.imgur.com\/Vp1WvDd.png\"><\/a><\/p>\n<p>Microsoft nmap script for Exchange vulnerabilities<\/p>\n<p>CERT Latvia has also published a <a href=\"https:\/\/github.com\/cert-lv\/exchange_webshell_detection\" target=\"_blank\" rel=\"noopener\">script on GitHub<\/a> that can be used to check whether an Exchange server has been infected with a webshell. Catalin Cimpanu points out the issue in the following <a href=\"https:\/\/twitter.com\/campuscodi\/status\/1368243224951873547\" target=\"_blank\" rel=\"noopener\">tweet<\/a>. <\/p>\n<p><a href=\"https:\/\/twitter.com\/campuscodi\/status\/1368243224951873547\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Exchange test script (CERT Latvia)\" alt=\"Exchange test script (CERT Latvia)\" src=\"https:\/\/i.imgur.com\/10j4UKI.png\"><\/a><br \/>Exchange test script (CERT Latvia)<\/p>\n<p><strong>Similar articles<\/strong><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/03\/exchange-server-0-day-exploits-werden-aktiv-ausgenutzt-patchen\/\">Exchange server 0-day exploits are actively exploited<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/06\/wichtige-hinweise-microsofts-und-des-bsi-zum-exchange-server-sicherheitsupdate-mrz-2021\/\">Important notes from Microsoft regarding the Exchange server security update (March 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/06\/exchange-probleme-mit-ecp-nach-sicherheitsupdate-mrz-2021\/\">Exchange isues with ECP\/OWA search after installing security update (March 2021)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]The Hafnium hacker group has probably managed to compromise hundreds of thousands of Exchange installations worldwide via vulnerabilities. A patch to close the vulnerabilities is available, but it may be too late. However, tools are now available from Microsoft and &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/03\/07\/neues-zum-exchange-hack-testtools-von-microsoft-co\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[869],"class_list":["post-19204","post","type-post","status-publish","format-standard","hentry","category-security","tag-exchange"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/19204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=19204"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/19204\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=19204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=19204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=19204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}