Leveraging Technology to Succeed in Business View web version

That happened after a security researcher who goes by the name Orange Tsai at security testing firm DEVCORE spotted a pair of Exchange Security holes in early January 2021. He tweeted this "might be the most serious RCE [remote code execution] I have ever reported!"

Paired together, they're known as ProxyLogon (aka CVE-2021-26855), and they allow an attacker to easily bypass Exchange administration authentication and impersonate the admin. I'd call this about as serious as a heart attack for IT security. 

Adding insult to injury, these vulnerabilities have been present since at least Exchange 2010 rolled out the door. In short, every version of Exchange you're running in-house is vulnerable.

Other security companies spotted the trouble, too, and found that hackers were already using it. The Danish security firm Dubex reported in "Please Leave an Exploit After the Beep," that they'd found a victim in January with a "web shell" backdoor installed via the "unifying messaging" module. This is an Exchange component used for storing voicemail and faxes along with the usual mailbox's emails, calendars, and contacts.

A web shell is a malicious script that gives an enemy remote control of your server via a web browser. It turns out installing web shell backdoors has become quite common as the next move in Exchange attacks.

So even if you patched your Exchange Server on the first day a fix was available — March 2 — you might still be in trouble, because your server was already compromised and a web shell backdoor is still alive and causing mischief.

As Tyler Hudak, TrustedSec practice lead of Incident Response, told CSO, even if you acted quickly, "there's still a chance that your system could have been compromised. I think a lot of people are under the impression that, 'Oh, well, we patched them, we're ok.' Which really isn't the case."

So, are you ready to track down those compromises and fix them? I doubt it. True, Microsoft's latest update to its Microsoft Safety Scanner and Microsoft Support Emergency Response Tool (MSERT) can scan for web shells. But, as Microsoft admits, even that's "not guaranteed as complete mitigation for all possible exploitation of these vulnerabilities."

According to Check Point Research (CPR), attackers are actively exploiting the Exchange zero-day vulnerabilities. Indeed, by March 14, CSR reported there were thousands of successful attacks and the pace is quickening.

At the start, most of these attacks came from the Chinese advanced persistent threat (APT) group Hafnium, according to Microsoft. Since then, everyone's getting into the act. Researchers at cybersecurity company ESET have detected at least 10 hacking groups that compromised more than 5,000 email servers.

What do most of those servers have in common? They tend to be in-house, run by people who really aren't good at handling email servers.

I cut my teeth as an email administrator. When I started, we still fought over whether the future email addressing standard would be RFC-822 or X.400. To this day, I run my own email servers using Dovecot.

But that's me. I would never recommend any business run its on-premise email servers unless you have an expert on staff. Yes, I know many of you want to control your email,  but unless you're willing and able to devote lots of resources to managing and securing email, it's not a smart move. There are too many things that can go wrong.

That's especially true of Exchange, which tends to be tightly integrated with the Active Directory and the rest of the Windows IT stack.

Microsoft has tried to make it easy you to mitigate the Exchange problem with a new One-Click Microsoft Exchange On-Premises Mitigation Tool. With this tool, which has been tested on Exchange Server 2013, 2016, and 2019, you'll automatically mitigate CVE-2021-26855.

But don't think that will solve your local Exchange problems. The tool is essentially an interim fix for customers who aren't comfortable with complex patch/update processes or who haven't applied the on-premises Exchange security update. It's not a replacement for the update; it's just the fastest way to mitigate the highest risks to Internet-connected, on-premises Exchange Servers.

And, you'll need to do further Exchange fixes to protect your system as much as possible.

So, what should you do? If you're already using Exchange, patch it and then start looking for invaders within your IT walls. Chances are you'll find them. Be sure to read Defending Exchange servers under attack for good general guidance. You'll also want to keep your eyes open for new Exchange security guidance, because the trouble with Exchange is only beginning.

In the long run, it's best to stop running your own email servers. The truth is that nine times out of 10, cloud-based services are more secure than on-prem servers.

Replace them with a high-end business email service such as those provided by Microsoft 365 Business or Google Workspace. If that doesn't suit you, look for an affordable Managed Service Provider (MSP) that really knows its way around email.

If you absolutely must host your own servers, I suggest you look to open-source email mail transfer agents (MTA). They're usually more robust than Exchange. Some good ones, besides Dovecot, include Exim, Sendmail, or Postfix. If you do go this route, be darn sure you have an expert email administrator on staff.  

But, please, whatever else you do, don't try running your own Exchange servers anymore. It's just asking for trouble.

Why the Microsoft Exchange Server attack isn't going away soon

For some victims, patching and proper forensics will be difficult, plus new threat actors are now exploiting the same Exchange Server vulnerabilities. Read more

 

Microsoft provides Exchange Server defensive tool to help SMBs stymie zero-day attacks

The one-click tool is intended as a stopgap measure to protect vulnerable on-premises Exchange servers, deployed mainly by small and midsize businesses. Read more.

 

Chinese cyberespionage group hacks US organizations with Exchange zero-day flaws

Microsoft believes Chinese APT group Hafnium is using a set of previously unknown Exchange Server vulnerabilities to access mailbox contents and perform remote code execution. Read more.

 

Patch Exchange now, and test your Windows updates

If it weren't for some serious security issues involving on-premises Microsoft Exchange servers, I'd say things look pretty good for this month's batch of patches. Read more.

 

How to patch Exchange Server for the Hafnium zero-day attack

Admins in many businesses report indicators of compromise from an Exchange zero-day vulnerability. Don't assume you're not a target. Investigate for signs of the attack and patch now. Read more.

 
 
 

About the Author
Steven J. Vaughan-Nichols, aka sjvn, has been writing about the intersection of business and technology for over 30 years. He continues to scoop up awards for his valuable insights and practical guidance in highly technical publications, business & technology magazines, and mainstream newspapers.
 

Linkedin Facebook Twitter YouTube
Privacy Policy | Manage Your Subscriptions | Unsubscribe
Advertise with us! | More Newsletters | Our Brands
©2021 IDG Communications, Inc.
140 Kendrick Street
Building B
Needham, MA 02494