We've got some information on the timeline (and a name) on one of the major exploits here:<p><a href="https://proxylogon.com/" rel="nofollow">https://proxylogon.com/</a><p>Some of the detail on where this is a mess -<p>The relevant security update is only offered for the latest (-1) Cumulative Update for Exchange. So you can open Windows Update and it will say "fully updated and secured", but you're not. Complicating matters, Cumulative Updates for Exchange 2019 have to be done from the licensing portal, with a valid logon.<p>So maybe you have a perfectly capable 24x7 tech team, but the guy who manages license acquisition is on leave today. This is how you may basically find yourself resorting to piracy to get this patched.
Bigger picture, what's the endgame here? It seems a lot of institutions handling sensitive work are considering air-gapping some or all of their networks at this point. Maybe that's even what has to happen.<p>Is there a means of fending off these attacks on the political front? If this same level of espionage was happening in person, there would be a kinetic response but it seems everyone is happy to just turn the other cheek.<p>These attacks have a very real impact. Copying others homework is a tried and true way to get a technological edge and in practical terms, it means a lot of research and development money is effectively wasted as it doesn't generate any returns.<p>Mind, I don't think there should be a violent response, but it's odd that even the threat of sanctions isn't made whenever this happens.
We are seriously looking at strategies for clean room rebuild of our IT infrastructure, potentially on a recurring basis via automation.<p>Obviously, you cant mitigate 0-day exploits in any situation where reasonable/expected network access is possible. But our concern, despite not being directly impacted by this, is that we may have accumulated malware over the past decade+ that has never been discovered. How many exploits exist in the wild which have never been documented or even noticed? Do we think it's at least one?<p>The thinking we are getting into is - If we nuke-from-orbit and then reseed from trusted backups on a recurring basis, any malware that gets installed via some side-channel would not be able to persist for as long as it traditionally would. Keeping backups pure via deterministic cryptographic schemes is far easier to work with than running 100+ security suites across your IT stack in hopes you find something naughty. It is incredibly hard for malware to hide in a well-normalized SQL database without SP or other programmatic features.<p>What if we built a new IT stack that was <i>designed</i> to be obliterated and reconstructed every 24 hours with latest patch builds each time? Surely many businesses could tolerate 1-2 hours of downtime overnight. It certainly works for the stock market. There really isn't a reason you need to give an attacker a well-managed private island to hide on for 10+ years at a time.
I remember this kind of thing happening all the time in the 90s and part of the 00s... It's just 10 to 1000 times worse now days since EVERYTHING is online now.
The United States Government should actively be trying to protect its businesses. They should create a three letter organization to do so. They should call it the National Security something or another.
"This is the real deal," tweeted Christopher Krebs, the former CISA director. "If your organization runs an OWA server exposed to the internet, assume compromise between 02/26-03/03."
Wow. Patching (or using cloud mail providers) would have mitigated the risk for this one...and many others in the past (and the future). The cleanup from this is big for those who were hit.<p>Launching attacks during major news events surely also helped the attackers stay under the radar for longer.
I patched my Exchange servers the morning this was announced, a few days ago. The patch takes about ten minutes per server, and does not require a reboot. If your server was a client facing one (CAS) users would have seen a brief outage in Outlook connectivity.<p>The patches were single file downloads, one for each version of Exchange, yes you needed to be on the latest Cumulative Update for Exchange, so if you weren't you really have no right running a production mail system...
I really wish the reports on hacks could treat attribution more seriously. Everytime a hack like this occurs it gets blamed on 'the Chinese', or 'the Russian', or 'the Iranians', without every showing any evidence to prove this. Attribution on the Internet is hard, like really hard. I want proof.<p>And if you don't have proof, or can't show me the proof, then don't just blame Americas enemies. It's sloppy and dangerous.
> Adair said he’s fielded dozens of calls today from state and local government agencies that have identified the backdoors in their Exchange servers and are pleading for help.<p>I can imagine they are sending an email to support@microsoft.com pleading for help. A future attacker would be well served to deny email to be sent to any mailbox @microsoft.com<p>EDIT: I'm now realizing that this follows the Microsoft-angle of the Solarwinds' attack. These customers are not going to be happy with $MS
Article focuses on US, but this is global.<p>> “It’s massive. Absolutely massive,” one former national security official with knowledge of the investigation told WIRED. “We’re talking thousands of servers compromised per
hour, globally.”
Slightly related, on BBC iPlayer is currently an interesting documentary series available called "China: A New World Order", which touches hacks like these a couple of times.
I wish the title was a bit more clear from the original post. This feels a little bit vague on purpose.<p>Microsoft Exchange server software , not to be confused with MS Outlook email software or the lesser Windows Mail software.
I'm curious to know why this did not affect Office 365 / Exchange Online.<p>I used to work for a law firm which ran on-premises Exchange, but had OWA running behind a VPN. I remember finding it extremely inconvenient at the time. But they're the ones laughing now.
Yet another superb reason not to run your internal company comms on a publicly accessible email server.<p>Or to replace email for internal use altogether. TMTP is a new protocol with that goal:<p><a href="https://mnmnotmail.org/" rel="nofollow">https://mnmnotmail.org/</a><p><a href="https://twitter.com/mnmnotmail" rel="nofollow">https://twitter.com/mnmnotmail</a>
How does Microsoft bear no financial liability for the many major security flaws in their for profit software? I’m sure they have clauses in their legal agreements, but come on...
There's a powershell script to check your server here: <a href="https://github.com/cert-lv/exchange_webshell_detection" rel="nofollow">https://github.com/cert-lv/exchange_webshell_detection</a>
Wonder what has changed. It was standard practice 15 years ago not to expose Microsoft Exchange (nor any other Microsoft product) directly to internet.
Scary! my university uses Microsoft for email, but I think they use the cloud hosted version but wonder how much code is shared between the versions. When I added it to the mail app on my iPhone, it mentioned it could wipe my device. Guess that's a default with the implementation but that is a turn off. So I ended up just installing the Outlook app instead since couldn't find imap support. I feel like on desktop, just using the web version or even adding it to my home screen would be another use but partly was hoping to just have all my accounts together.
Exchange Server 2010 patch is here <a href="https://www.microsoft.com/en-us/download/details.aspx?id=102774" rel="nofollow">https://www.microsoft.com/en-us/download/details.aspx?id=102...</a><p>Description: <a href="https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2010-service-pack-3-march-2-2021-kb5000978-894f27bf-281e-44f8-b9ba-dad705534459" rel="nofollow">https://support.microsoft.com/en-us/topic/description-of-the...</a>
MS, Solarwinds, ...<p>I suspect that the number of compromised software companies are much larger than these 2 companies. I'm almost certain that we will hear about others in the future. If you manage a software product I hope you are auditing the code regularly. You should also harden the security for it and who has access to the source code and its build no matter how unlikely you think you are a target.
They attribute the attack to a particular actor without providing any evidence to the public. A bug could exist that enables such an attack, but it's not proven any emails were ever even taken.<p>They did find a tool left behind it seems.<p>I am just increasingly skeptical of these hacking stories that have a nat sec angle on them after the previous ones have been shown to be mostly or entirely fraudulent years later.
I can't tell from the article, but was this vulnerability already being exploited but to a lesser extent or did the hackers apparently discover it as a result of the patch being released? If the latter, then maybe we need processes for patching faster than people can reverse engineer the patches.
What are the chances this was independently discovered and weaponized in the two months after the original report to MS? Can't help but wonder if the security researcher or MSRC were compromised or have a leak.
Exchange has been a security problem since 1998.
Surely there are open source solutions available that have better security?
Seems obvious, have I missed something?
Does anyone know how to check for malecious activity on exchange 2010? All the logs/tools explained in the articles do not exist befor exchange 2013
lol - don't run services you can't competently manage.<p>edit: this tweet restates this in a much nicer way:<p><a href="https://twitter.com/SwiftOnSecurity/status/1366867228914810880" rel="nofollow">https://twitter.com/SwiftOnSecurity/status/13668672289148108...</a><p>> If you're not an F50 running your own Exchange Server is organizational clownery at this point.
This needs to be considered an issue of national security and the US forces needs a 'Digital Force' more than they need a 'Space Force'.
lots of pentest jobs available<p><a href="https://startworkingremotely.com/jobs?q=pentest" rel="nofollow">https://startworkingremotely.com/jobs?q=pentest</a>
The cynic in me thinks it’s not a coincidence that the cloud office 365 was not affected.<p>Almost like a certain company would like to get its customers to migrate AD to Azure and Exchange to full office 365.