Over 30,000 U.S. Organizations Hacked Through Microsoft Vulnerabilities

Reports show those affected run Web versions of Outlook and host them on their own computers instead of relying on cloud providers.

Over 30,000 U.S. Organizations Hacked Through Microsoft Vulnerabilities

According to a new report, the number of victims of the Chinese hacking group exploiting multiple vulnerabilities in Microsoft Exchange Server could be more than 30,000.

Unlike other recent large-scale cyber attacks like the compromise of the SolarWinds Orion IT management platform, the threat actors’ victims are wide-ranging and include small businesses and local municipalities, according to security blogger and researcher Brian Krebs.

Cybersecurity experts have been scrambling to grasp the scope of this attack, which is shaping up to be even larger and more widespread than the SolarWinds attack allegedly carried out by a nation-state group linked to Russia.

Microsoft last week released emergency security updates to fix the four vulnerabilities that hackers were exploiting to spy on victims’ email and potentially steal information, and the threat group has since ramped up their attacks on servers worldwide that remain unpatched, Krebs reported.

The hackers are adept at creating ways to access the victim servers even after they’ve left, including leaving behind a web shell, a tool that can be accessed from any browser that gives attackers administrative access.

According to Krebs, two anonymous cybersecurity experts who have briefed U.S. national security advisors on the attack said the Chinese hacking group thought to be responsible has seized control over “hundreds of thousands” of Microsoft Exchange Servers worldwide, with each victim system representing approximately one organization that uses Exchange to process email.

Meanwhile, Reuters also reported that the number of victims could be in the tens of thousands. The publication, citing people familiar with the U.S. government’s response, reported that the number of organizations compromised through these vulnerabilities is more than 20,000.

According to Reuters, one scan of connected devices showed only 10% of those vulnerable had installed the patches by Friday, though the number was rising. Since installing the patch doesn’t get rid of the back doors, U.S. officials are racing to determine how best to notify victims and support them.

Reuters also says all of those affected appear to run Web versions of email client Outlook and host them on their own machines instead of relying on cloud providers.

Microsoft — which calls the group HAFNIUM — and cybersecurity firm Volexity disclosed the vulnerabilities in blog posts last week. The attacks appear to have started as early as Jan. 6, when the U.S. was busy investigating the SolarWinds compromise and dealing with a riot and insurrection at the Capitol.

The vulnerabilities are tracked as CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 and are used as part of an attack chain that when used together, enable access to email accounts and installation of additional malware to facilitate long-term access to victim environments.

Microsoft has since released new mitigation guidance and a script for checking indicators of compromise.

This article originally ran in CS sister publication MyTechDecisions.com. Zachary Comeau is TD’s web editor.

Read More Articles Like This… With A FREE Subscription

Campus Safety magazine is another great resource for public safety, security and emergency management professionals. It covers all aspects of campus safety, including access control, video surveillance, mass notification and security staff practices. Whether you work in K-12, higher ed, a hospital or corporation, Campus Safety magazine is here to help you do your job better!

Get your free subscription today!

Subscribe Today!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters
Campus Safety Conference Registration Open Promo Campus Safety HQ