Microsoft Patches Four Zero-Day Flaws in Exchange

Attackers Used Flaws to Download Full Contents of Email Accounts
Microsoft Patches Four Zero-Day Flaws in Exchange

Microsoft issued emergency software patches on Tuesday for four zero-day vulnerabilities in its Exchange email server, one of the most widely used pieces of enterprise infrastructure.

See Also: OnDemand Webinar | Cloud applications: A Zero Trust approach to security in Healthcare

The company says it believes the flaws have been exploited by a China-based group it calls Hafnium, which is seeking to gain persistent access to email systems. Microsoft typically issues patches for Windows and other products on the second Tuesday of every month, but it makes exceptions for security vulnerabilities that are deemed particularly dangerous.

Although Microsoft describes the attacks as "limited and targeted," there are already indications that many other hacking groups are mounting attacks hoping to catch slow-patching organizations off guard. The flaws appear to have been exploited since at least early January.

Microsoft says it has never publicly discussed Hafnium before. The group has been targeting infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks and nongovernment organizations, according to a blog post from Tom Burt, corporate vice president for customer security and trust at Microsoft.

"Even though we’ve worked quickly to deploy an update for the Hafnium exploits, we know that many nation-state actors and criminal groups will move quickly to take advantage of any unpatched systems," Burt writes.

Full Contents of Email Accounts Stolen

There's a sense of urgency around not only patching, but also for organizations to examine their systems to ensure they've not been compromised. Other security companies have already seen attackers exploiting the flaws.

"FireEye has observed these vulnerabilities being exploited in the wild, and we are actively working with several impacted organizations," says Charles Carmakal, senior vice president and CTO of FireEye Mandiant. "In addition to patching as soon as possible, we recommend organizations also review their systems for evidence of exploitation that may have occurred prior to the deployment of the patches."

Microsoft says two companies, Volexity and Dubex, contributed to its analysis through observations of attacks, and Volexity published its own insights.

Volexity, a computer forensics firm that specializes in incident response and memory analysis, expounded on the abnormal behavior it saw on the systems of two of its clients in January. The attackers used the vulnerabilities to "steal the full contents of several user mailboxes," according to a blog post.

Volexity says it detected anomalous activity with its customers as early as Jan. 6, which means attackers have been active for at least two months but likely longer.

Microsoft says the latest malicious activity is not related to the SolarWinds supply chain attack. The U.S. government believes Russia's SVR intelligence agency infiltrated SolarWinds' software update infrastructure, planting malware that was then distributed to 18,000 organizations (see: House SolarWinds Hearing Focuses on Updating Cyber Laws).

Lateral Movement Possible

The vulnerabilities only affect the on-premises version of Exchange, where an organization has chosen to host the application itself. It does not affect Exchange online or the cloud-based version, according to Microsoft's technical advisory.

The vulnerabilities are CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065. The systems affected are Exchange Server 2010 RU31 for Service Pack 2, 2013 CU 23, 2016 CU 18 and CU 19; and 2019 CU7 and CU8.

Descriptions of the vulnerabilities from the Center for Internet Security's advisory

Microsoft has published indicators of compromise so organizations can check if they may have been attacked. Also, it has released advanced hunting queries for Azure Sentinel and product detections and queries for Microsoft Defender for Endpoint.

Microsoft spelled out how the attackers gained access to email. The group would gain access to an Exchange server either through stolen passwords or the newly disclosed vulnerabilities. The group would put a web shell on the server, which allowed for persistent access.

The group would command that shell using virtual private servers within the United States to mask the malicious activity while data is exfiltrated, Microsoft says.

Volexity also pointed out a larger risk that goes beyond Exchange. Within several organizations, the company observed CVE-2021-26855, which is the server-side request forgery flaw, chained together with another remote execution flaw on the targeted Exchange services.

"In all cases of RCE, Volexity has observed the attacker writing webshells (ASPX files) to disk and conducting further operations to dump credentials, add user accounts, steal copies of the Active Directory database (NTDS.DIT), and move laterally to other systems and environments," Volexity writes.

Volexity says the RCE flaw "appears to reside within the use of the Set-OabVirtualDirectory ExchangePowerShell cmdlet. Evidence of this activity can be seen in Exchange’s ECP Server logs."


About the Author

Jeremy Kirk

Jeremy Kirk

Managing Editor, Security and Technology, ISMG

Kirk is a veteran journalist who has reported from more than a dozen countries. Based in Sydney, he is Managing Editor for Security and Technology for Information Security Media Group. Prior to ISMG, he worked from London and Sydney covering computer security and privacy for International Data Group. Further back, he covered military affairs from Seoul, South Korea, and general assignment news for his hometown paper in Illinois.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.