Latest Stories

Stay up-to-date with everything at Approach

Blog article

Microsoft Exchange Server: security vulnerability

Publication date

15.03.2021

A critical Microsoft Exchange vulnerability is being exploited—learn how Hafnium gains access, the risks involved, and urgent steps to secure your servers!

Microsoft Exchange Server
Attack on Microsoft Exchange Server: an urgent critical vulnerability detected

Microsoft Exchange Server was subject to an attack by Hafnium which has since been detected. Now that the exploit has been made public and the attack mechanisms are known, there is an increased risk of other malicious users taking advantage of this vulnerability for monetary gain.

In the attacks observed, the threat actor used first and foremost these vulnerabilities to access on-premise Exchange servers. It enabled then access to email accounts and allowed installation of additional malware to facilitate long-term access to victim environments. All this could be done without any need for authentication.

What action should be taken at this stage?

Several security updates have been released by Microsoft for Microsoft Exchange Server to address vulnerabilities that have been exploited in targeted attacks on a small scale.

STEP 1 – Check your Exchange version and install the recommended patches.

STEP 2 – Investigate for exploitation, persistence, or evidence of lateral movement to determine if you’ve already been compromised.


This is aimed at your IT department as well as your security department.
In conclusion, all the critical and official information can be found here 👇

What is the reason for the emergency?

Hafnium originally used a targeted exploit to access data but now that the attack mechanisms are known, it can be exploited for monetary gain through ransomware attacks by any ill intended hackers and organizations.

The ransomware creates encrypted copies of the targeted files by using an encryption key embedded in its binary. It then deletes the original versions of the targeted files. As a result, victims may be able to recover some data due to this encryption behaviour.

 

Would you like to stay up to date with the latest trheats? It’s huge time to subscribe to our SOC newsletter.

OTHER STORIES

Cybercriminals keep evolving—uncover the latest malware delivery tricks, evasion tactics, and real-world attack chains to stay ahead in cyber security.
DNS over HTTPS (DoH) boosts privacy but opens new security risks—learn how cybercriminals exploit it and how enterprises can stay protected.
SSH security is at risk with the Terrapin attack—learn how it exploits vulnerabilities, weakens encryption, and what steps you need to take to stay protected.

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?