{"id":22181,"date":"2021-11-18T11:54:16","date_gmt":"2021-11-18T10:54:16","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=22181"},"modified":"2021-11-18T11:56:56","modified_gmt":"2021-11-18T10:56:56","slug":"warnung-cert-bund-usa-gb-vor-angriffen-auf-exchange-und-fortinet","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/11\/18\/warnung-cert-bund-usa-gb-vor-angriffen-auf-exchange-und-fortinet\/","title":{"rendered":"CERT-Federation, USA, GB warns about attacks on Exchange and Fortinet"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/11\/18\/warnung-cert-bund-usa-gb-vor-angriffen-auf-exchange-und-fortinet\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]German CERT-Bund currently warns against outdated Microsoft Exchange servers. In Germany, thousands of Exchange Servers 2010 with open OWA are still in operation. Security organizations in the United States and the United Kingdom are also sounding the alarm because Iranian hackers are probably attacking Microsoft Exchange servers and Fortinet products. In addition, the US-CERT has added four entries to the list of known exploits. The vulnerabilities can be closed by security updates.&nbsp; <\/p>\n<p><!--more--><\/p>\n<h2>German CERT-Bund warns against old Exchange installs<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg08.met.vgwort.de\/na\/4abed12ec0a64d659a339e23e6677f9c\" width=\"1\" height=\"1\">In a <a href=\"https:\/\/twitter.com\/certbund\/status\/1460942013256323072\" target=\"_blank\" rel=\"noopener\">tweet<\/a> German CERT-Bund warns, that over 8,000 Exchange 2010 servers are still running open OWA (Outlook Web App). This means that 15 percent of German Exchange servers have not received any security updates for several years. <\/p>\n<p><a href=\"https:\/\/twitter.com\/certbund\/status\/1460942013256323072\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"German CERT-Bund warning about Exchange\" alt=\"German CERT-Bund warning about Exchange\" src=\"https:\/\/i.imgur.com\/q8fJNkt.png\"><\/a><\/p>\n<p>The above German text says, that more than 8,000 or 15% of #Exchange servers with open #OWA in Germany are still running version 2010, even though support for these versions expired one or more years ago and, in principle, no more security updates are provided. <\/p>\n<h2>Iranian hackers target Exchange and Fortinet<\/h2>\n<p>he U.S. Cybersecurity &amp; Infrastructure Security Agency (CISA) has issued alert <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-321a\" target=\"_blank\" rel=\"noopener\">AA21-321A<\/a> warning of Iranian hacking attacks on Exchange and Fortinet. This cyber security alert is the result of analysis by the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Australian Cyber Security Centre (ACSC), and the United Kingdom's National Cyber Security Centre (NCSC) to highlight ongoing malicious cyber activity by an advanced persistent threat (APT) group that the FBI, CISA, ACSC, and NCSC believe is linked to the Iranian government. <\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-uk-warn-of-iranian-hackers-exploiting-microsoft-exchange-fortinet\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Cyber Warning\" alt=\"Cyber Warning\" src=\"https:\/\/i.imgur.com\/777F2gb.png\"><\/a><\/p>\n<p>The FBI and CISA have observed this Iranian government-sponsored APT group exploiting Fortinet vulnerabilities since at least March 2021 and a Microsoft Exchange ProxyShell vulnerability since at least October 2021 to first gain access to systems before conducting follow-on operations that include ransomware distribution. ACSC is also aware that this APT group has exploited the same Microsoft Exchange vulnerability in Australia.<\/p>\n<p>The Iranian government-sponsored APT actors are actively targeting a wide range of victims in several critical U.S. infrastructure sectors, including transportation and healthcare, as well as Australian organizations. According to FBI, CISA, ACSC, and NCSC assessments, actors are focused on exploiting known vulnerabilities rather than targeting specific sectors. These Iranian government-sponsored APT actors can use this access for follow-on operations such as data exfiltration or encryption, ransomware, and extortion.<\/p>\n<p>This advisory includes observed tactics and techniques, as well as indicators of compromise (IOCs) that the FBI, CISA, ACSC, and NCSC believe are likely related to these Iranian government-sponsored APT activities. Colleagues at Bleeping Computer have published an article on the subject <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-uk-warn-of-iranian-hackers-exploiting-microsoft-exchange-fortinet\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>The FBI, CISA, ACSC, and NCSC strongly recommend that critical infrastructure organizations apply the recommendations listed in the Remedial Actions section of this advisory to mitigate the risk of compromise by Iranian government-sponsored cyber actors.<\/p>\n<p>There is also <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/11\/16\/evolving-trends-in-iranian-threat-actor-activity-mstic-presentation-at-cyberwarcon-2021\/\" target=\"_blank\" rel=\"noopener\">an article <\/a>from Microsoft that points to trends in Iranian Thead attackers, as seen in the following <a href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1460643326756069379\" target=\"_blank\" rel=\"noopener\">tweet<\/a>. Furthermore, US-CERT has added four new CVEs to its <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/current-activity\/2021\/11\/17\/cisa-adds-four-known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener\">list of known exploits<\/a>.<\/p>\n<p><a href=\"https:\/\/twitter.com\/USCERT_gov\/status\/1461094505046806531\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Exploits\" alt=\"Exploits\" src=\"https:\/\/i.imgur.com\/8vxqvph.png\"><\/a><\/p>\n<p>These are the following vulnerabilities for which patches are available:<\/p>\n<table cellspacing=\"0\" cellpadding=\"2\" width=\"640\" border=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"127\"><strong>CVE Number<\/strong><\/td>\n<td valign=\"top\" width=\"350\"><strong>CVE Title<\/strong><\/td>\n<td valign=\"top\" width=\"162\"><strong>Remediation Due Date<\/strong><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"127\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22204\" target=\"_blank\" rel=\"noopener\">CVE-2021-22204<\/a><\/td>\n<td valign=\"top\" width=\"350\">Exiftool Remote Code Execution vulnerability<\/td>\n<td valign=\"top\" width=\"162\">12\/01\/2021<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"127\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-40449\" target=\"_blank\" rel=\"noopener\">CVE-2021-40449<\/a><\/td>\n<td valign=\"top\" width=\"350\">Microsoft Win32k Elevation of Privilege&nbsp;&nbsp;&nbsp; <\/td>\n<td valign=\"top\" width=\"162\">12\/01\/2021<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"127\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-42292\" target=\"_blank\" rel=\"noopener\">CVE-2021-42292<\/a><\/td>\n<td valign=\"top\" width=\"350\">Microsoft Excel Security Feature Bypass<\/td>\n<td valign=\"top\" width=\"162\">12\/01\/2021<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"127\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-42321\" target=\"_blank\" rel=\"noopener\">CVE-2021-42321<\/a><\/td>\n<td valign=\"top\" width=\"350\">Microsoft Exchange Server Remote Code Execution&nbsp;&nbsp;&nbsp; <\/td>\n<td valign=\"top\" width=\"162\">12\/01\/2021 <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>US-CERT warns that US authorities must install the security updates by December 1, 2021. Perhaps this is also a hint to administrators in other countries and organisations to check whether their own systems are patched in this regard.  <\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2021\/07\/14\/sicherheitsupdates-fr-exchange-server-juli-2021\/\">Security updates for Exchange Server (July 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/06\/29\/kumulative-exchange-updates-juni-2021-verffentlicht\/\">Cumulative Exchange CUs June 2021 released<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/04\/14\/exchange-server-security-update-kb5001779-13-april-2021\/\">Exchange Server Security Update KB5001779 (April 13, 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/03\/06\/exchange-probleme-mit-ecp-nach-sicherheitsupdate-mrz-2021\/\">Exchange isues with ECP\/OWA search after installing security update (March 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/17\/exchange-sicherheitsupdates-von-juli-2021-zerschieen-ecp-und-owa\/\">Exchange security updates from July 2021 breaks ECP and OWA<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/13\/exchange-2016-2019-outlook-probleme-durch-amsi-integration\/\">Exchange 2016\/2019: Outlook problems due to AMSI integration<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/22\/angriffswelle-fast-2-000-exchange-server-ber-proxyshell-gehackt\/\">Wave of attacks, almost 2,000 Exchange servers hacked via ProxyShell<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/29\/exchange-server-2016-2019-benutzerdefinierte-attribute-in-ecp-nach-cu-installation-juli-2021-nicht-mehr-aktualisierbar\/\">Exchange Server 2016-2019: Custom attributes in ECP no longer updatable after CU installation (July 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/30\/exchange-server-authentifizierungs-bypass-mit-proxytoken\/\">Exchange Server: Authentication bypass with ProxyToken<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/08\/08\/exchange-schwachstellen-droht-hafnium-ii\/\">Exchange vulnerabilities: Will we see Hafnium II?<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/13\/exchange-2016-2019-outlook-probleme-durch-amsi-integration\/\">Exchange 2016\/2019: Outlook problems due to AMSI integration<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/09\/27\/exchange-server-september-2021-cu-kommt-zum-28-9-2021-mit-microsoft-exchange-emergency-mitigation-service\/\">Exchange Server September 2021 CU comes Sept. 28 with Microsoft Exchange Emergency Mitigation Service<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/09\/29\/exchange-server-september-2021-cu-28-9-2021\/\">Exchange Server September 2021 CU (2021\/09\/28)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/10\/13\/sicherheitsupdates-fr-exchange-server-oktober-2021\/\">Security updates for Exchange Server (October 2021)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/10\/17\/tifanu-cup-2021-exchange-2019-und-iphone-gehackt\/\">Tianfu Cup 2021: Exchange 2019 and iPhone hacked<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/11\/06\/babuk-gang-nutzt-proxyshell-schwachstelle-in-exchange-fr-ransomware-angriffe\/\">Babuk gang uses ProxyShell vulnerability in Exchange for ransomware attacks<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/11\/10\/exchange-server-november-2021-sicherheitsupdates-schlieen-rce-schwachstelle-cve-2021-423\/\">Exchange Server November 2021 Security Updates Close RCE Vulnerability CVE-2021-423<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/11\/13\/bsi-cert-warnung-kompromittierte-exchange-server-werden-fr-e-mail-angriffe-missbraucht-nov-2021\/\">CERT warning: Compromised Exchange servers are misused for email attacks (Nov. 2021)<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2020\/12\/01\/us-cert-warnung-fortinet-ssl-vpns-absichern-passwrter-ndern\/\">US-CERT warning: Secure Fortinet SSL VPNs, change passwords<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/01\/28\/fortinet-closes-two-vulnerabilities-ssh-database-in-its-siem\/\">Fortinet closes two vulnerabilities (SSH, Database) in its SIEM<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2019\/11\/26\/fette-verschlsselungs-schwachstellen-in-fortinet-produkten\/\">Encryption vulnerabilities in Fortinet products<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2019\/08\/27\/ungepatchte-pulse-secure-und-fortinet-ssl-vpns-angegriffen\/\">Attacks on unpatched Pulse Secure and Fortinet SSL VPNs<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]German CERT-Bund currently warns against outdated Microsoft Exchange servers. In Germany, thousands of Exchange Servers 2010 with open OWA are still in operation. Security organizations in the United States and the United Kingdom are also sounding the alarm because Iranian &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/11\/18\/warnung-cert-bund-usa-gb-vor-angriffen-auf-exchange-und-fortinet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[869,69],"class_list":["post-22181","post","type-post","status-publish","format-standard","hentry","category-security","tag-exchange","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=22181"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22181\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=22181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=22181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=22181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}