Thứ Hai, Tháng Một 30, 2023
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
No Result
View All Result
Home Tech

State-sponsored hackers have the ability to exploit MS Exchange in 0 days against ~10 organizations

1 Tháng Mười, 2022
in Tech
0
State-sponsored hackers have the ability to exploit MS Exchange in 0 days against ~10 organizations
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

Các bài viết liên quan:

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022

MS Exchange 0 days

On Friday, Microsoft revealed that a single operations group in August 2022 gained initial access and breached Exchange servers by chaining two newly disclosed zero-day vulnerabilities in a limited series of attacks against less than 10 organizations globally.

“These attacks installed the Chopper web shell to facilitate keyboard access, which attackers use to perform Active Directory reconnaissance and data theft,” Microsoft Threat Intelligence Center (MSTIC) said in a report Friday.

Microsoft further warned that the weaponization of security vulnerabilities will increase in the coming days, as malicious actors coordinate exploits into their toolkit, including deployments. ransomwaredue to the “high-access Exchange system given to the attacker.”

The tech giant attributed the ongoing attacks with average confidence to a state-sponsored organization, adding that it investigated the attacks when the Zero Day Initiative was launched. disclosed the vulnerabilities to the Microsoft Security Response Center (MSRC) earlier this month on September 8-9, 2022.

The two vulnerabilities are collectively known as ProxyNotShelldue to the fact that “it is the same path and SSRF/RCE pair” as ProxyShell but with authentication, a copy is proposed. patch Incomplete.

Issues, chained together to achieve remote code execution, are listed below:

CVE-2022-41040 – Request server-side security vulnerability Microsoft Exchange Server
CVE-2022-41082 – Microsoft Exchange Server Remote Code Execution Vulnerability

“Although these vulnerabilities require authentication, the authentication required to exploit could be that of a standard user,” Microsoft said. “Standard user credentials can be obtained through a variety of attacks, such as password spraying or purchasing through the cybercrime economy.”

These vulnerabilities were first discovered by Vietnamese cybersecurity company GTSC as part of an incident response effort for a customer in August 2022. A Chinese threat actor is suspected of being behind the attacks. intrusion.

This development comes as the U.S. Cybersecurity and Infrastructure Agency (CISA) has added two Microsoft Exchange Server zero-day vulnerabilities to the Known Exploited Vulnerabilities (KEV) category. requires federal agencies to apply patches by October 21, 2022.

Microsoft says it’s working on an “accelerated timeline” to come up with a fix for the omissions. It also published a script for the following URL Rewrite mitigation steps, which it claims is “successful in breaking current attack chains” –

Open IIS Manager Select Default Site In Features View, click URL Rewrite In the Actions pane on the right side, click Add Rule(s)… Select Request Blocking and click OK Add String” . * Autodiscover \ .json. * ‘. * Powershell. * And click Edit under Condition. Change the Condition input from {URL} to {REQUEST_URI}

As additional precautions, the company is urging companies to enforce multi-factor authentication (MFA), disable legacy authentication, and educate users about not accepting two-factor authentication prompts. element (2FA) is undesirable.

Travis Smith, vice president of malware threat research at Qualys, told The Hacker News: “Microsoft Exchange is a delicious target for threat actors to exploit for two main reasons.

“First, Exchange […] Being directly connected to the internet creates an attack surface that is accessible from anywhere in the world, greatly increasing the risk of being attacked. Second, Exchange is a mission-critical function – organizations cannot simply pull out or shut down email without severely impacting their business in a negative way. “

Related Posts

Previous Post

The movie will be the hottest on social networks

Next Post

How to send location via Zalo quickly

Megusta

Megusta

Related Posts

5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
Instruction how to use OBS streaming software

Features, settings and how to use OBS streaming software through 9 simple steps

25 Tháng Mười Hai, 2022
What is Trans woman?  What is Transgender Women?

What is Trans woman? What is Transgender Women?

23 Tháng Mười Hai, 2022
Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

22 Tháng Mười Hai, 2022
How to get 50 free coins of SkyJoy App to redeem

How to get 50 free coins of SkyJoy App to redeem

21 Tháng Mười Hai, 2022
Load More
Next Post
How to send location via Zalo quickly

How to send location via Zalo quickly

Trả lời Hủy

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

Bài viết mới

How to get travel insurance
Đời sống

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly
Phần mềm

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games
Software

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power
Software

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 
Tech

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software
Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022
W3Schools

Ads

Contact: [email protected]

DMCA.com Protection Status

Categories

  • Android
  • Cạm bẫy tâm lí
  • Chưa được phân loại
  • Đồ họa
  • Đời sống
  • Gen Z
  • Health
  • iOS
  • Kĩ năng mềm
  • News
  • Nhà mạng
  • Phần mềm
  • Phần mềm đồ họa
  • Review sách
  • Software
  • Tech
  • Thiết kế ảnh
  • Thiết kế video
  • Thủ thuật
  • Travel
  • Văn hóa Nam Bộ
  • Văn học
  • Window

Browse by Tag

ai là triệu phú android Apple browser Bullet Journal bản thân chai pin Chỉnh ảnh data domain download fshare game game show giả lập màu hosting IKEA ios khuyến mãi kinh doanh kiến thức kiểm tra pin messenger miễn phí mua sắm Máy ảnh mạng network nghệ thuật ngôn ngữ nhà Trần pin laptop quảng cáo tiếng anh trạng thái Trần Thủ Độ tên miền tắt hoạt động từ vựng video viettel window 10 word zalo Đơn giản

Recent News

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023

Trang tin nóng hổi - vừa thổi vừa xem

No Result
View All Result
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z

Trang tin nóng hổi - vừa thổi vừa xem