The Microsoft Exchange Server versions affected by these vulnerabilities are:
Exchange Server 2013
Exchange Server 2016
Exchange Server 2019
Note: Exchange Online is not affected
The vulnerabilities patched were CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065.
A Microsoft report indicated that the named vulnerabilities were being exploited in the wild by a new threat actor group Microsoft named HAFNIUM. According to Microsoft, HAFNIUM is a group assessed to be state-sponsored and operating out of China, based on observed victimology, tactics and procedures.
Per Microsoft’s report, "In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to email accounts, and allowed installation of additional malware to facilitate long-term access to victim environments."
On March 5, the scope of these attacks was reported by cybersecurity journalist Brian Krebs to be more widespread – at least 30,000 organizations across the United States and 100,000 organizations globally could be affected. Threat actors outside of HAFNIUM have also been reported to be attempting to exploit the zero-day vulnerabilities. The investigations into the attack scope are ongoing. At the time of this writing, Microsoft has not yet confirmed the full scope of the attacks.
Trustwave is not affected by these vulnerabilities and maintains its diligent and aggressive patch management program. Trustwave is continuing to conduct diligent investigations in order to further determine customer impact.
On March 16, Microsoft released a new,one-click mitigation tool, Microsoft Exchange On-Premises Mitigation Tool, to help customers who do not have dedicated security or IT teams to apply these security updates.
Microsoft has produced an additional series of security updates (SUs) that can be applied to some older and unsupported Microsoft Exchange Server Cumulative Updates (CUs). Per Microsoft, the availability of these updates does not mean that you don’t have to keep your environment current. This is intended only as a temporary measure to help you protect vulnerable machines right now. Users still need to update to the latest supported CU and then apply the applicable SUs.
More Security Actions Implemented by Trustwave:
Trustwave continues to aggressively seek for the addresses, directory structure, file names and file hashes associated with the hack within historical logs and hosts for MDR customers.
We recommend that all organizations aggressively apply endpoint detection and response (EDR) solutions across their entire environments in order to have full visibility into whether attackers are moving laterally inside the organization.
Trustwave has released rules updates for ModSecurity. The new rules are:
Microsoft Exchange Server - Post-Auth Arbitrary File Write to RCE CVE-2021-26855
Microsoft Exchange Server - Unauthenticated SSRF with proxylogon to Authentication Bypass to RCE CVE-2021-26855
Microsoft Exchange Server - Unauthenticated SSRF with anonresource to Authentication Bypass to RCE CVE-2021-2685
On March 9, Trustwave released an update for its Automated Vulnerability Management network scanners to detect the presence of the relevant Microsoft Exchange Server vulnerabilities.
On March 11, Trustwave pushed an IDS release with the following signatures related to Microsoft Exchange Server attacks:
6 new SLR Rules for Hafnium (MS Exchange Hafnium)
Triggers on multiple methods for detection including: HTTP POST requests seen in Hafnium SSRF attacks and ASP webshell requests including network artifacts, as well as hardcoded and variable filenames
4 new SLR Rules for other webshells (SportsBall, China Chopper, etc.); (MS Exchange Hafnium)
Triggers on known network artifacts for the webshells: SportsBall, China Chopper and reGeorg v1 and v2
1 new ET Rule for SportsBall webshell (MS Exchange Hafnium)
An Emerging Threats signature covering SportsBall
If you suspect you’ve been compromised, Trustwave Digital Forensics and Incident Response (DFIR) team can help. Click here to get in touch with this team immediately and for guidance on what initial steps to take.