Connect with us

News

Exploits In Microsoft Exchange Used To Breach Over 30,000 Organizations

Published

on

exploit in microsoft exchange used to breach over 30000 organizations

Over 30,000 entities, including local governments, small businesses, defense contractors, and education institutions, have been breached because of unpatched exploits in Microsoft Exchange, reported journalist and investigative reporter Brian Krebs on his blog, KrebsOnSecurity.

“In each incident, the intruders have left behind a ‘web shell,’ an easy-to-use, password-protected hacking tool that can be accessed over the Internet from any browser. The web shell gives the attackers administrative access to the victim’s computer servers,” Krebs wrote.

According to Microsoft, the attack was orchestrated by notorious Chinese hacking group Hafnium, and they started on January 6th, the day when rioters stormed the United States Capitol in a violent attack against the 117th United States Congress.

Microsoft released emergency security updates to patch the vulnerabilities on March 2nd, which means that the attackers had nearly two months to infiltrate vulnerable systems. The tech giant has been working closely with the U.S. Cybersecurity & Infrastructure Security Agency (CISA), as well as other public and private organizations, to secure all unpatched servers running Exchange Server 2013, 2016, or 2019 (Exchange Online hasn’t been affected).

“The best protection is to apply updates as soon as possible across all impacted systems,” said Microsoft spokesperson in a written statement. “We continue to help customers by providing additional investigation and mitigation guidance. Impacted customers should contact our support teams for additional help and resources.”

Also Read: Dubai Police Use Futuristic Technology To Read Murder Suspect’s Mind

While most known victims of the attacks were located in the United States, breaches related to the Microsoft Exchange vulnerabilities were also detected on the other side of the Atlantic. For example, the Prague municipality and the Czech Ministry for Labor and Social Affairs were forced to shut down some of their systems and install emergency patches. No data was stolen during the attack, said Czech government officials.

Attacks like this one highlight the importance of timely patching and modern intrusion detection tools, which are able to detect unusual activity while it’s still time to act.

Advertisement

📢 Get Exclusive Monthly Articles, Updates & Tech Tips Right In Your Inbox!

JOIN 17K+ SUBSCRIBERS

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

News

NASA Forms New Partnership With Saudi Space Agency

The pair will collaborate on the Center for Space Futures, advancing space tech by bringing together public and private stakeholders.

Published

on

nasa forms new partnership with saudi space agency
Saudi Space Agency

Saudi Arabia’s space industry is on the brink of substantial expansion after generating $400 million in revenue in 2022, according to a report by the Saudi Communications, Space and Technology Commission.

Now, in a new venture with NASA, plans for a “Center for Space Futures” are set to further drive the Kingdom’s aspirations of becoming a leading player in space exploration and technology.

The partnership between NASA and Saudi Arabia goes beyond economic advantages. The pair have already cooperated on preliminary work for the Artemis II lunar mission, which is slated for a September 2025 launch and aims to land astronauts near the moon’s South Pole.

Also Read: Plans Underway For Massive Middle East Autonomous Freight Network

During a visit to the capital, Riyadh, NASA Administrator Bill Nelson emphasized in a TV interview the broader objectives of the collaboration, which encompass “returning to the moon and then [to] Mars” while utilizing space exploration to glean important insights into climate change. The NASA spokesman also reiterated the space agency’s dedication to collaborating with Saudi Arabia on other future ventures.

Continue Reading

#Trending