On March 12, 2021 , Microsoft tweeted that there are still around 82,000 Microsoft Exchange servers at risk, due to not having received the patch. However, due to not updating in a timely manner, many of those servers are still leaking. A number of ransomware were deployed by the attackers in the interim on previously infected servers.
On March 22 , Microsoft announced that on 92% of its on-premises list of algeria whatsapp phone numbers Microsoft Exchange servers, the effects of the hack had been corrected or mitigated.
On April 12 , CISA added two Malware Analysis Reports (MARs) to Alert AA21-062A: Mitigation of Vulnerabilities in Microsoft Exchange Server . Microsoft continued to mitigate related issues in the April 2021 security update .
Since the attacks used 4 zero-day vulnerabilities, linking them together to gain administrator access on the affected servers, they managed to install backdoors . Therefore, it is very important for any on-premise Microsoft Exchange Server to not only apply the patch but also to fix any effects or persistence (by implementing Microsoft and other independent IoC guidelines ).
Mailfence was not affected
Mailfence offers connectivity using the ActiveSync protocol Our implementation of Exchange ActiveSync (EAS) uses Microsoft specifications , but it is a synchronization protocol that has nothing to do with Exchange servers. They just have the word “exchange” in their name, but that is by coincidence. We do not share any code at all with the on-premise Microsoft Exchange Server (or any of their services). Therefore, our service is not impacted.
Current status of Microsoft Exchange Server hacking
-
- Posts: 26
- Joined: Mon Dec 09, 2024 4:32 am