{"id":41717,"date":"2021-01-20T15:08:45","date_gmt":"2021-01-20T15:08:45","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=2958c01af1beed0bd016628443c99404"},"modified":"2021-01-20T15:08:45","modified_gmt":"2021-01-20T15:08:45","slug":"solarwinds-hackers-hit-malwarebytes-through-microsoft-exploit","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/solarwinds-hackers-hit-malwarebytes-through-microsoft-exploit\/","title":{"rendered":"SolarWinds hackers hit Malwarebytes through Microsoft exploit"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/keumars-afifi-sabet-0\">Keumars Afifi-Sabet<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">20 Jan, 2021<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p>Malwarebytes has said that the same state-backed cyber gang that <a href=\"https:\/\/www.itpro.co.uk\/security\/358111\/solarwinds-confirms-cyber-attack\"  data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/security\/358111\/solarwinds-confirms-cyber-attack\">attacked SolarWinds<\/a> in December was able to access internal emails by using an exploit in Microsoft 365.<\/p>\n<p>The hackers gained limited access to internal Malwarebytes emails, <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2021\/01\/malwarebytes-targeted-by-nation-state-actor-implicated-in-solarwinds-breach-evidence-suggests-abuse-of-privileged-access-to-microsoft-office-365-and-azure-environments\/\"  data-cke-saved-href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2021\/01\/malwarebytes-targeted-by-nation-state-actor-implicated-in-solarwinds-breach-evidence-suggests-abuse-of-privileged-access-to-microsoft-office-365-and-azure-environments\/\">according to CEO Marcin Kleczynski<\/a>, by abusing applications with privileged access to Microsoft 365 and Azure environments.<\/p>\n<p><span data-cke-copybin-start=\"1\">\u200b<\/span><\/p>\n<p>The security firm first became aware of the threat after the Microsoft Security Response Centre (MSRC) discovered unusual activity in a third-party application sat inside the Microsoft 365 suite. Microsoft had been\u00a0examining its Office 365 and Azure systems for signs of compromise at the time, while <a href=\"https:\/\/www.itpro.co.uk\/security\/358153\/microsoft-blocks-customer-access-to-malicious-solarwinds-binaries\">details of the SolarWinds attack were also\u00a0beginning to emerge<\/a>.<\/p>\n<p>The attackers demonstrated similar techniques and procedures to those used in the SolarWinds compromise. In this case, however, they abused a dormant email protection product within the firm\u2019s Office 365 tenant. This granted the attackers access to a limited subset of internal emails.<\/p>\n<p>The attackers, however, failed to access or compromise Malwarebytes\u2019 source code, and the company has declared that its products were safe to use at all times.<\/p>\n<p>\u201cWhile Malwarebytes does not use SolarWinds, we, like many other companies were recently targeted by the same threat actor,\u201d Kleczynski said.<\/p>\n<p>\u201cAfter an extensive investigation, we determined the attacker only gained access to a limited subset of internal company emails. We found no evidence of unauthorized access or compromise in any of our internal on-premises and production environments.\u201d<\/p>\n<p>The specific exploit mechanism is based on an Azure Active Directory flaw uncovered in 2019, which <a href=\"https:\/\/www.troopers.de\/troopers19\/agenda\/y3nswp\/\" >Fox-IT researcher Dirk-jan Mollema demonstrated<\/a> could be exploited to escalate privileges by assigning credentials to applications.<\/p>\n<p><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-008a\" >An early January report<\/a> published by the US Cybersecurity and Infrastructure Security Agency (CISA) also revealed how attackers may have obtained access to\u00a0Microsoft 365 apps by password spraying, in addition to exploiting administrative credentials.<\/p>\n<p>In the Malwarebytes attack, the hackers added a self-signed certificate with credentials to the service principal account. From there, they were able to authenticate using the key and make API calls to request emails through MSGraph.<\/p>\n<p>The SolarWinds breach was certainly <a href=\"https:\/\/www.itpro.co.uk\/security\/358164\/the-scariest-security-horror-stories-of-2020\" >one of the most significant security incidents<\/a> of last year and carries wide-reaching implications for the industry. Since the turn of the year, it\u2019s been revealed that the attackers <a href=\"https:\/\/www.itpro.co.uk\/security\/358216\/hackers-accessed-microsoft-source-code-in-solarwinds-attack\" >accessed Microsoft source code in the breach<\/a>, and had even first <a href=\"https:\/\/www.itpro.co.uk\/security\/358288\/solarwinds-hackers-breached-systems-september-2019\" >breached SolarWinds\u2019 systems<\/a> as far back as September 2019.<\/p>\n<p><span data-cke-copybin-end=\"1\">\u200b<\/span> <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Keumars Afifi-Sabet<\/p>\n<p>        20 Jan, 2021    <\/p>\n<p>      Malwarebytes has said that the same state-backed cyber gang that attacked SolarWinds in December was able to access internal emails by using an exploit in Microsoft 365.<br \/>\nThe hackers gaine&#8230;<\/p>\n","protected":false},"author":433,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-41717","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/433"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=41717"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41717\/revisions"}],"predecessor-version":[{"id":41718,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41717\/revisions\/41718"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=41717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=41717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=41717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}