CISA Issues Warning Over Microsoft Exchange Server Vulnerabilities

Microsoft has warned that hackers are already using zero-day Exchange Server exploits to break into victims’ networks and steal data and that more attacks are likely to come.

Microsoft has given more details about how the vulnerabilities have already been exploited, starting with attacks in August.

In a small number of targeted attacks, the CVE-2022-41040 and CVE-2022-41082 vulnerabilities were linked to give attackers “hands-on-keyboard access.” These vulnerabilities were employed for surveillance into the Active Directory and to steal data. The names of the victims have not been made public.

For the attack to succeed, the intruder must be a confirmed user, but these credentials can be obtained through phishing scams, brute force, or buying stolen credentials.

Even though there are no clear signs yet of who is behind these attacks, Microsoft’s Security Threat Intelligence Team (MSTIC) suspects that these attacks are the work of a single group.

Microsoft says it is working on what it calls an “accelerated timeline” to fix the security hole, but the fix hasn’t come out yet.

Since the vulnerability has been made public, it is likely that hackers are already working to take advantage of it before a fix is available. As a result, Microsoft has warned that “overall exploitation of these vulnerabilities will increase.”

Previous Exchange Server flaws were used in a wide range of cyberattacks, such as ransomware operations and crypto-jacking attacks. This is because attackers rushed to take advantage of the flaws before organizations could apply the patch.

Another warning came from The United States Cybersecurity & Infrastructure Security Agency (CISA), which also stated that attackers could use the latest Microsoft Exchange Server flaws to illegally access and steal user data.

Even though there isn’t yet a patch, Microsoft has advised on how to deal with the threat, such as telling Exchange Server customers that non-admin users shouldn’t be able to access PowerShell remotely.

Keep Your Business Running on a Rock-Solid Data Center

Related Posts:

Keep Your Business Running on a Rock-Solid Data Center

Rely on 99% uptime powered by redundant Las Vegas and Dallas facilities built for nonstop performance.

Complete The Form Below To Subscribe To Our Newsletter

password managers guide
Ai & your business
home office security
it project planning guide
Cyber Security
guide to faster wifi
MFA vs 2FA
email security attacks
2024 cyber threats
cloud backup guide
cloud security
secure data
geek speak it terms guide
bigger cyber risk
cloudstrike
email signature security
whitepaper outsourced it
it contracts
choosing hardware
data backups testing
Cybersecurity Training Essentials
Voip vs Cloud