Commentary: Proxyshell Flaws Warning Could Spell Trouble For Unprepared Organisations

BACKGROUND:

Following warnings from CISA* of malicious cyber actors targeting ProxyShell vulnerabilities, there is growing concerned more government and organization systems could be exposed.

Subscribe
Notify of
guest

1 Expert Comment
Most Voted
Newest Oldest
Inline Feedbacks
View all comments
Claire Tills
Claire Tills , Senior Research Engineer
InfoSec Expert
August 24, 2021 10:27 am

<p><span lang=\"EN-GB\">Attackers began scanning for servers vulnerable to the ProxyShell attack chain almost as soon as Orange Tsai’s presentation went live. Given the popularity of its predecessor, ProxyLogon, with attackers, we knew exploitation was coming. These vulnerabilities are likely popular because of the ubiquity of Microsoft Exchange — threat actors know they have a higher potential for successful attacks by targeting services like this. The former success of attacks leveraging ProxyLogon also draws attackers to ProxyShell, relying on attacks and tactics known to work.<br /><br />ProxyShell is now being used to deploy the LockFile ransomware and I expect other actors will integrate it into their attacks. The threat is certainly real, as <a href=\"https://us-cert.cisa.gov/ncas/current-activity/2021/08/21/urgent-protect-against-active-exploitation-proxyshell\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https://www.google.com/url?q=https://us-cert.cisa.gov/ncas/current-activity/2021/08/21/urgent-protect-against-active-exploitation-proxyshell&source=gmail&ust=1629886422145000&usg=AFQjCNFSfyou1j2R3kx0tToeDaFKbSDXnw\">CISA</a> warned organizations over the weekend of in-the-wild exploitation. To protect against attacks, organizations should ensure they’re applying the patches released in April and May for Microsoft Exchange Servers.</span></p>

Last edited 1 year ago by Claire Tills
Information Security Buzz
1
0
Would love your thoughts, please comment.x
()
x