Microsoft Multiple 0-Day Attack – Tenable Comment

Late yesterday Microsoft announced via a blog that they “detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks.” It appears the attacks are being attributed to a Chinese group known as HAFNIUM.

Experts Comments

March 03, 2021
Satnam Narang
Senior Research Engineer
Tenable

Four zero-day vulnerabilities in Exchange Server have been exploited in the wild by a nation-state threat actor called HAFNIUM. The fact that Microsoft chose to patch these flaws out-of-band rather than include them as part of next week’s Patch Tuesday release leads us to believe the flaws are quite severe even if we don’t know the full scope of those attacks.

 

While Microsoft says that HAFNIUM primarily targets entities within the United States, other researchers say they have seen these

.....Read More

Four zero-day vulnerabilities in Exchange Server have been exploited in the wild by a nation-state threat actor called HAFNIUM. The fact that Microsoft chose to patch these flaws out-of-band rather than include them as part of next week’s Patch Tuesday release leads us to believe the flaws are quite severe even if we don’t know the full scope of those attacks.

 

While Microsoft says that HAFNIUM primarily targets entities within the United States, other researchers say they have seen these vulnerabilities being exploited by different threat actors targeting other regions.

 

Based on what we know so far, exploitation of one of the four vulnerabilities requires no authentication whatsoever and can be used to potentially download messages from a targeted user’s mailbox. The other vulnerabilities can be chained together by a determined threat actor to facilitate a further compromise of the targeted organization’s network.

 

We expect other threat actors to begin leveraging these vulnerabilities in the coming days and weeks, which is why it is critically important for organizations that use Exchange Server to apply these patches immediately.

  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.