A global attack on the popular Microsoft Exchange email server system has become a global crisis.

This hack became public knowledge on March 2, 2021, with Microsoft releasing multiple software patches to address vulnerabilities that hackers were exploiting.   Microsoft and other groups are referring to the originating hacking group as “Hafnium.”

Here’s a comprehensive article from Bloomberg: Hackers Breach Microsoft Customers Becomes Global Cybersecurity Crisis – Bloomberg

On March 5th, Microsoft released tools to help investigate if your server has been affected by this breach.

Turn Key Solutions is URGENTLY recommending everyone to do 3 things if you run a Microsoft Exchange Server:

  1. Pull up your Cyber Security Incident Response plan
  2. If your organization runs an in-house Microsoft Exchange Server, apply the patches right now.     Here’s the article for them – Multiple Security Updates Released for Exchange Server – updated March 5, 2021 – Microsoft Security Response CenterOf note, our technical team has found a few issues where the patches can need a bit of extra attention to apply correctly and not hang the exchange server up for hours.
  3. Run the investigation tools and scripts to search for indicators that your system was compromised.   See Microsoft’s guidance here – HAFNIUM targeting Exchange Servers with 0-day exploits – Microsoft Security

If you need help with any of the above, call us today – we’re under the hood working with many other organizations right now, and we’d be glad to help you.

Related Posts - TKS Blog

TKS Newsletter - 2024 December
Here's our December 2024 Newsletter Read the full PDF version here: The TKS Sentinel - December Issue In this month's edition, we discuss: Ransomware Threats PDF Hijacking ...
Read more
5 New Trends from a Study on the State of AI at Work
5 New Trends of AI At Work
The pace of technological advancement is accelerating. This is not news to anyone wading through the ChatGPT craze. Artificial intelligence (AI) is at the forefront...
Read more
zero trust protections
Zero Trust Cybersecurity: Essential for Keeping Your Data Secure
As cyber threats become increasingly sophisticated, businesses can no longer rely solely on traditional methods to protect their data. Hackers are no longer trying to...
Read more
voice technology options
Harnessing the Power of Voice Technology
Voice technology is quickly becoming one of the most valuable tools for businesses seeking to improve customer interactions, streamline operations, and cut costs. With...
Read more