Blogs & Stories

SpiderLabs Blog

Attracting more than a half-million annual readers, this is the security community's go-to destination for technical breakdowns of the latest threats, critical vulnerability disclosures and cutting-edge research.

Trustwave's Action Response to the Microsoft Exchange Server Zero-Day Vulnerabilities and Attacks


This blog post was updated March 17 to include information on new Trustwave IDS updates and the Microsoft Exchange On-Premises Mitigation Tool.

This blog post was updated March 9 to include more information about Trustwave network scanner protections available.

What Happened:

Microsoft patched four zero-day vulnerabilities in Microsoft Exchange Server on March 2.

The Microsoft Exchange Server versions affected by these vulnerabilities are:

  • Exchange Server 2013
  • Exchange Server 2016
  • Exchange Server 2019
  • Note: Exchange Online is not affected

The vulnerabilities patched were CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065.

A Microsoft report indicated that the named vulnerabilities were being exploited in the wild by a new threat actor group Microsoft named HAFNIUM. According to Microsoft, HAFNIUM is a group assessed to be state-sponsored and operating out of China, based on observed victimology, tactics and procedures.

Per Microsoft’s report, "In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to email accounts, and allowed installation of additional malware to facilitate long-term access to victim environments."

On March 5, the scope of these attacks was reported by cybersecurity journalist Brian Krebs to be more widespread – at least 30,000 organizations across the United States and 100,000 organizations globally could be affected. Threat actors outside of HAFNIUM have also been reported to be attempting to exploit the zero-day vulnerabilities. The investigations into the attack scope are ongoing. At the time of this writing, Microsoft has not yet confirmed the full scope of the attacks.

Trustwave is not affected by these vulnerabilities and maintains its diligent and aggressive patch management program. Trustwave is continuing to conduct diligent investigations in order to further determine customer impact.

Recommendations and Resources:

More Security Actions Implemented by Trustwave:

  • Trustwave continues to aggressively seek for the addresses, directory structure, file names and file hashes associated with the hack within historical logs and hosts for MDR customers.
  • We recommend that all organizations aggressively apply endpoint detection and response (EDR) solutions across their entire environments in order to have full visibility into whether attackers are moving laterally inside the organization.
  • Trustwave has released rules updates for ModSecurity. The new rules are:
    • Microsoft Exchange Server - Post-Auth Arbitrary File Write to RCE CVE-2021-26855
    • Microsoft Exchange Server - Unauthenticated SSRF with proxylogon to Authentication Bypass to RCE CVE-2021-26855
    • Microsoft Exchange Server - Unauthenticated SSRF with anonresource to Authentication Bypass to RCE CVE-2021-2685
  • On March 9, Trustwave released an update for its Automated Vulnerability Management network scanners to detect the presence of the relevant Microsoft Exchange Server vulnerabilities.
  • On March 11, Trustwave pushed an IDS release with the following signatures related to Microsoft Exchange Server attacks:
    •   6 new SLR Rules for Hafnium (MS Exchange Hafnium)
      • Triggers on multiple methods for detection including: HTTP POST requests seen in Hafnium SSRF attacks and ASP webshell requests including network artifacts, as well as hardcoded and variable filenames
    • 4 new SLR Rules for other webshells (SportsBall, China Chopper, etc.); (MS Exchange Hafnium)
      • Triggers on known network artifacts for the webshells: SportsBall, China Chopper and reGeorg v1 and v2
    • 1 new ET Rule for SportsBall webshell (MS Exchange Hafnium)
      • An Emerging Threats signature covering SportsBall
  • If you suspect you’ve been compromised, Trustwave Digital Forensics and Incident Response (DFIR) team can help. Click here to get in touch with this team immediately and for guidance on what initial steps to take.