Fraud Management & Cybercrime , Governance & Risk Management , IT Risk Management

DearCry Ransomware Targets Unpatched Exchange Servers

On-Premises Exchange Servers May Have Been Hacked Since January, Experts Warn
DearCry Ransomware Targets Unpatched Exchange Servers
Source: Microsoft, Bleeping Computer

Ransomware-wielding attackers have begun to exploit a serious proxy-logon flaw in unpatched versions of Microsoft Exchange running on premises, Microsoft reports. Hackers have exploited the flaw to access vulnerable servers, crypto-lock files and demand a ransom from victims in return for the promise of a decryption tool.

See Also: Every Second Counts: 6-Step Ransomware Remediation Guide

News of the attack campaign follows Microsoft on March 2 issuing emergency patches to fix four zero-day flaws in Microsoft Exchange, which is one of the most widely used pieces of IT infrastructure in the world.

"Because we are aware of active exploits of related vulnerabilities in the wild," Microsoft said in its March 2021 Exchange Server Security Updates alert, which it continues to update, "our recommendation is to install these updates immediately to protect against these attacks."

In the wake of that warning, IT and incident response teams have been scrambling not just to get the patches installed, but to verify that the flaws were not used against them before the patches came to light. The U.S. Cybersecurity and Infrastructure Security Agency also issued an emergency directive ordering agencies to immediately investigate whether they had been compromised.

When Microsoft first began releasing security updates last week, it warned that a Chinese APT group called Hafnium, which it had never previously described, appeared to have been exploiting the flaws in recent months. But security firm ESET on Wednesday reported that on Jan. 3, at least three APT groups had begun to exploit the flaws before they were reported to Microsoft by a security researcher on Jan. 5. On Wednesday, ESET said it now believes at least 10 APT groups have been exploiting the flaws.

Security researchers have been warning all organizations using on-premises Exchange that until they patch the four zero-day flaws, they remain at serious risk of attacks from nation-states, criminals or others.

Such warnings gained extra impetus Wednesday, when independent security researcher Nguyen Jang posted to GitHub a proof-of-concept attack tool that chained together two of the four flaws to exploit Exchange servers. His attack tool was later removed from GitHub, which is owned by Microsoft.

Ransomware-Wielding Attackers Spotted

On Friday, Phillip Misner, a security manager at Microsoft, warned that a previously unseen group has been hitting unpatched Exchange servers with ransomware that's been dubbed DearCry, aka DoejoCrypt.

That followed Bleeping Computer first warning of the DearCry attacks on Thursday, after a victim of the attacks posted to Bleeping Computer's forum that their Exchange server had been exploited via the proxy-logon flaw, and DearCry ransomware dropped.

On Thursday, Michael Gillespie (@demonslay335), a security researcher at Emsisoft who created and runs the free ID Ransomware service, said that on Tuesday, users of his site began to submit samples of the ransomware for identification. He initially worried that there had been a "swarm" of attacks, but he later revised that assessment to say that so far, only six systems were known to have been infected.

Multiple security researchers, including James Quinn, a malware researcher at Binary Defense, have noted that DearCry "disables the service msupdate'" before commencing encryption, although it's not clear why. Researchers say encrypted files have a 'DEARCRY!' header added inside the file, and the extension ".CRYPT" appended to their filename.

Bleeping Computer reports that one victim of the DearCry campaign received a $16,000 ransom demand.

DearCry ransom note (Source: Bleeping Computer)

After Misner warned that Microsoft had been seeing DearCry-dropping attackers exploiting Exchange flaws, he confirmed that it was the same campaign that Gillespie had spotted.

Misner said the DearCry attackers have been exploiting the now-patched proxy-logon Exchange flaw - CVE-2021-26855 - patched last week by Microsoft. The other three flaws that have also been patched by Microsoft are CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065.

'We Aren't Surprised'

In other words, attackers seeking illicit profits have now begun to target organizations that have yet to patch Exchange.

“We aren’t surprised by this development," Matt Lock, technical director at security firm Varonis, tells Information Security Media Group. "The Exchange proxy-logon vulnerability has been used by hacker groups in the wild for about two months, and we know ransomware is a quick way to make some money from these."

It's also likely that attackers have been exfiltrating data. "We also have to assume that data is being taken, and the payloads being dropped will have instructions about how and where to send this," he says, so that attack groups can post samples of exfiltrated data to data leak sites to add pressure on victims to pay.

Security experts expect other crime gangs to quickly join the fray. "Though broad exploitation of the Microsoft Exchange vulnerabilities has already begun, many targeted organizations may have more to lose as this capability spreads to the hands of criminal actors who are willing to extort organizations and disrupt systems," says Ben Read, director of analysis at FireEye's Mandiant threat intelligence group.

Human-Operated Ransomware Campaigns

Microsoft says the DearCry ransomware is being used not for low-level, automated attacks, but instead as part of more advanced, human-operated ransomware campaigns. This refers to attacks that typically involve hackers gaining remote access to a victim's network - often by exploiting weak Remote Desktop Protocol or via phishing attacks - and then reconnoitering. Attackers may search for sensitive data and exfiltrate it or attempt to gain administrator-level access to an organization's Active Directory before pushing crypto-locking malware to as many endpoints as possible - as quickly as possible.

"This vulnerability allows a threat actor to navigate to getting system-level access, so the ability to laterally move to other machines has also been made easy," says Varonis' Lock.

"You could argue this is the perfect storm: system-level access to data, without requiring internal access, without knowing any credentials and without the need for any phishing activity," he says. "You’d be mad not to assume you’ve been breached, if you have an on-premises Exchange server.”

APT Attacks Began in January

As noted, Microsoft on March 2 issued its emergency patches for the four zero-day flaws in Exchange.

Microsoft says it first learned of the flaws on Jan. 5 after they were directly reported by security researcher Cheng-Da Tsai - also known as Orange Tsai (@orange_8361) - who works for the Taipei City, Taiwan-based consultancy Devcore.

As organizations scramble to patch on-premises Exchange, security experts say they must assume they have been hacked - potentially beginning in early January, if not before - until they can prove otherwise.

"Any organization running an on-premises Exchange server should assume that they are compromised," says Mandiant's Read.

That goes even for organizations that have already applied patches, experts say, because known attacks began before patches were issued.

For any organizations using Microsoft Exchange on premises that recently applied patches, Kevin Beaumont, a security researcher at Microsoft, says he "strongly recommends" they run a free tool, released by Microsoft, to help locate and delete any web shells - aka stealthy software providing remote access - that attackers may have dropped, and "which can persist even after patching."

Experts say they expect to see many more organizations exploited, beyond what may already be thousands that have been hacked. "We have seen entities around the world impacted, and this includes some in the United Kingdom," Read says. "While we have not observed a focus on any specific sectors from this activity, our assessment is that the attackers are engaged in mass scanning and deployment, and this effort could allow them to select targets of the greatest intelligence value."

About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.