Microsoft Exchange Server Hacked Via ProxyShell Exploits

Share post:

Threat actors are actively exploiting Microsoft Exchange servers using the ProxyShell vulnerability to install backdoors for later access.

According to a recent update released by security researcher Kevin Beaumont and NCC Group vulnerability researcher Rich Warren, ProxyShell is an attack that uses three linked Microsoft Exchange vulnerabilities to execute unauthenticated remote code.

Devcore Principal Security Researcher, Orange Tsai revealed that the ProxyShell exploits use Microsoft Exchange’s AutoDiscover feature to conduct an SSRF attack. Warren’s example, shared with BleepingComputer, showed that the web shells consist of a simple authentication-protected script that threat actors can use to upload files to the compromised Microsoft Exchange server.

Since threat actors are already exploiting vulnerable Microsoft Exchange servers, Beaumont advises administrators to perform Azure Sentinel queries to confirm whether or not their devices have been scanned, and advises those who have recently updated their Microsoft Exchange server to do so immediately.

For more information, read the original story in BleepingComputer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Controversial expansion of US surveillance powers nears Senate vote

The US Senate is poised to vote on a significant expansion of Section 702 of the Foreign Intelligence...

Russian-linked hackers target U.S. and European water systems

A Russian military-affiliated hacking group, Sandworm, is suspected of coordinating recent cyberattacks on water utilities in the U.S.,...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways