{"id":21072,"date":"2021-08-22T02:53:07","date_gmt":"2021-08-22T00:53:07","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=21072"},"modified":"2021-08-22T02:53:07","modified_gmt":"2021-08-22T00:53:07","slug":"angriffswelle-fast-2-000-exchange-server-ber-proxyshell-gehackt","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/08\/22\/angriffswelle-fast-2-000-exchange-server-ber-proxyshell-gehackt\/","title":{"rendered":"Wave of attacks, almost 2,000 Exchange servers hacked via ProxyShell"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/08\/22\/angriffswelle-fast-2-000-exchange-server-ber-proxyshell-gehackt\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]I have been waiting for this for a long time, but now the feared has happened. Since Friday, there has been a massive wave of attacks on unpatched Microsoft Exchange servers via the ProxyShell vulnerability. Huntres has already discovered over 1,900 hacked Exchange servers but which had a shell installed. Meanwhile, CERT-Bund also warns. Here is some information about the state of attack wave.<\/p>\n<p><!--more--><\/p>\n<h2>German CERT-Bund warns of attack wave<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/c2d21f7f7a864ea2ae3a1d4da786be9e\" width=\"1\" height=\"1\">I became aware of a wave of attacks on unpatched Microsoft Exchange servers running since Friday on Twitter via various sources. CERT-Bund has meanwhile issued the following <a href=\"https:\/\/twitter.com\/certbund\/status\/1429129101172953093\" target=\"_blank\" rel=\"noopener\">warning<\/a>.&nbsp; <\/p>\n<p><a href=\"https:\/\/twitter.com\/certbund\/status\/1429129101172953093\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Attacks on Exchange Server via ProxyShell \" alt=\"Attacks on Exchange Server via ProxyShell \" src=\"https:\/\/i.imgur.com\/iQTp8RQ.png\"><\/a><\/p>\n<p>The HuntressLabs of the security vendor in question discovered more than 140 webshells on more than 1900 unpatched machines running Microsoft Exchange within 48 hours. These 140+ webshells were found on Server 2013\/2016\/2019 versions of on-prem Exchange. It should be noted that most of the webshells are randomly named, but some have recurring patterns. The Exchange servers were infected using the ProxyShell.&nbsp; Huntress published the blog post <a href=\"https:\/\/www.huntress.com\/blog\/rapid-response-microsoft-exchange-servers-still-vulnerable-to-proxyshell-exploit\" target=\"_blank\" rel=\"noopener\">Microsoft Exchange Server still vulnerable to ProxyShell Exploit<\/a> exploit as of August 21, 2021, which is continuously updated.<\/p>\n<p>&nbsp;<a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1429052616852623365\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Exchange attack via Proxy Shell\" alt=\"Exchange attack via Proxy Shell\" src=\"https:\/\/i.imgur.com\/wYAHHa7.png\"><\/a><\/p>\n<p>Security researcher Kevin Beaumont published <a href=\"https:\/\/doublepulsar.com\/multiple-threat-actors-including-a-ransomware-gang-exploiting-exchange-proxyshell-vulnerabilities-c457b1655e9c\" target=\"_blank\" rel=\"noopener\">this article<\/a> on the topic at DoublePulsar (see also above <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1429052616852623365\" target=\"_blank\" rel=\"noopener\">tweet<\/a>). Other articles can be found at <a href=\"https:\/\/therecord.media\/almost-2000-exchange-servers-hacked-using-proxyshell-exploit\/\" target=\"_blank\" rel=\"noopener\">The Record<\/a>, and Bleeping Computer <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lockfile-ransomware-attacks-microsoft-exchange-with-proxyshell-exploits\/\" target=\"_blank\" rel=\"noopener\">reports here<\/a> that the FileLocker ransomware gang is attacking Exchange servers via ProxyShell exploit. Affected businesses include construction companies, fish processing plants, industrial machinery, auto repair shops, a small airport, and more. <\/p>\n<h2>The ProxyShell vulnerability<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/23ceb3b33d5e45248b3d9ef245b74115\" width=\"1\" height=\"1\">Taiwanese security researcher Orange Tsai of the DEVCORE team gave a presentation on Exchange vulnerabilities at BlackHat 2021 in early Augst. He showed how by combining old vulnerabilities (e.g. CVE-2021-34473, CVE-2021-34523 and CVE-2021-31207) that were closed by updates in April 2021, Microsoft Exchange servers can be attacked and taken over via exploits called ProxyLogon, ProxyOracle and ProxyShell.  <\/p>\n<p>I had written about the vulnerability in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/08\/08\/exchange-schwachstellen-droht-hafnium-ii\/\" target=\"_blank\" rel=\"noopener\">Exchange vulnerabilities: Will we see Hafnium II?<\/a> The recommendation was to update the on-premises Exchange servers to the latest patch level and to make sure that they are not accessible via the Internet (see also <a href=\"https:\/\/borncity.com\/win\/2021\/08\/13\/angriffe-auf-exchange-server-per-proxyshell-schwachstelle-rollen-an-13-8-2021\/\">Attacks on Exchange Server via ProxyShell vulnerability (8\/13\/2021)<\/a>). Already in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/03\/18\/exchange-proxylogon-news-patchstand-neuer-poc-und-neue-erkenntnisse-18-3-2021\/\">Exchange ProxyLogon News: Patch status, new PoC and new findings (03\/18\/2021)<\/a> I had then pointed out incipient attacks.&nbsp; <\/p>\n<p><strong>Similar articles<\/strong><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/03\/exchange-server-0-day-exploits-werden-aktiv-ausgenutzt-patchen\/\">Exchange server 0-day exploits are actively exploited<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/06\/wichtige-hinweise-microsofts-und-des-bsi-zum-exchange-server-sicherheitsupdate-mrz-2021\/\">Important notes from Microsoft regarding the Exchange server security update (March 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/06\/exchange-probleme-mit-ecp-nach-sicherheitsupdate-mrz-2021\/\">Exchange isues with ECP\/OWA search after installing security update (March 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/07\/neues-zum-exchange-hack-testtools-von-microsoft-co\/\">Exchange Hack News \u2013 Test tools from Microsoft and others<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/08\/microsoft-msert-hilft-bei-exchange-server-scans\/\">Microsoft MSERT helps to scan Exchange Servers<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/08\/cyber-angriff-auf-exchange-server-der-europische-bankenaufsichtsbehrde\/\">Cyber attack on Exchange server of the European Banking Authority<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/09\/exchange-hack-neue-patches-und-neue-erkenntnisse\/\">Exchange hack: new patches and new findings<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/16\/exchange-server-remote-code-execution-schwachstelle-cve-2020-16875\/\">Exchange Server: Remote Code Execution Vulnerability CVE-2020-16875<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/11\/exchange-hack-neue-opfer-neue-patches-neue-angriffe\/\">Exchange hack: new victims, new patches, new attacks<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/13\/neues-zur-proxylogon-hafnium-exchange-problematik-12-3-2021\/\">Update on ProxyLogon hafnium exchange issue (March 12, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/14\/gab-es-beim-exchange-massenhack-ein-leck-bei-microsoft\/\">Was there a leak at Microsoft in the Exchange mass hack?<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/15\/proxylogon-hack-repository-fr-betroffene-exchange-administratoren\/\">ProxyLogon hack: Administrator's Repository for affected Exchange systems<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/16\/microsoft-exchange-on-premises-one-click-mitigation-tool-eomt-freigegeben\/\">Microsoft Exchange (On-Premises) one-click Mitigation Tool (EOMT) released<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/17\/exchange-server-2013-sicherheitsupdate-fr-service-pack-1\/\">Security update for Exchange Server 2013 SP1; CUs for Exchange 2019 and 2016 (03\/16\/2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/18\/exchange-proxylogon-news-patchstand-neuer-poc-und-neue-erkenntnisse-18-3-2021\/\">Exchange ProxyLogon News: Patch status, new PoC and new findings (03\/18\/2021)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]I have been waiting for this for a long time, but now the feared has happened. Since Friday, there has been a massive wave of attacks on unpatched Microsoft Exchange servers via the ProxyShell vulnerability. Huntres has already discovered over &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/08\/22\/angriffswelle-fast-2-000-exchange-server-ber-proxyshell-gehackt\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[71,580,1547,22],"tags":[869,447,69,195],"class_list":["post-21072","post","type-post","status-publish","format-standard","hentry","category-computer","category-security","category-software","category-update","tag-exchange","tag-hack","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=21072"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21072\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=21072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=21072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=21072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}