UPDATE: Exploitation of MS Exchange Vulnerabilities

NJCCIC Alert

Original Release Date: 3/11/2021

Summary

On March 2, 2021, Microsoft reported that several vulnerabilities – referred to collectively as “ProxyLogon” – in on-premises Microsoft Exchange servers were being exploited by threat actors, including the HAFNIUM group. Since then, the exploitation of these vulnerabilities has become widespread and indiscriminate. Furthermore, proof-of-concept code was published to exploit these vulnerabilities, which will likely contribute to an increased targeting of vulnerable servers.

Recommendations

The NJCCIC highly advises organizations with on-premises Microsoft Exchange servers to patch vulnerable systems as soon as possible and search their network for signs of compromise using associated indicators of compromise (IOCs). Recommendations, IOCs, and additional details, including tactics, techniques, and procedures (TTPs), can be found in the NJCCIC Alert: Widespread Exploitation of Microsoft Exchange Vulnerabilities.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.