Security News > 2021 > March > As attacks on Exchange servers escalate, Microsoft investigates potential PoC exploit leak

Microsoft Exchange servers around the world are still getting compromised via the ProxyLogon and three other vulnerabilities patched by Microsoft in early March.
A. Human operated ransomware attacks are utilizing the Microsoft Exchange vulnerabilities to exploit customers.
The source of the Microsoft Exchange exploit still unknown.
Microsoft is reportedly investigating whether those who created the exploit might have obtained a "Proof of concept" attack code that the company distributed on February 23 to 80 or so security partners through its Microsoft Active Protections Program.
Microsoft Security Team says that on-premises Exchange servers are most often used by small and medium-sized businesses, "Although larger organizations with on-premises Exchange servers have also been affected."
Microsoft has released Exchange On-Premises Mitigation Tool, which quickly performs the initial steps for mitigating the ProxyLogon flaw on any Exchange server and attempts to remediate found compromises.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/tLAkZ4lHpTk/
Related news
- Qilin ransomware claims attack at Lee Enterprises, leaks stolen data (source)
- Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks (source)
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks (source)
- Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail (source)
- New ClickFix attack deploys Havoc C2 via Microsoft Sharepoint (source)
- Over 37,000 VMware ESXi servers vulnerable to ongoing attacks (source)
- Microsoft isn't fixing 8-year-old shortcut exploit abused for spying (source)
- Microsoft Exchange Online outage affects Outlook web users (source)
- Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility (source)
- Microsoft: Exchange Online bug mistakenly quarantines user emails (source)