{"id":41868,"date":"2021-03-09T14:58:26","date_gmt":"2021-03-09T14:58:26","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=ce86dfc4ba2874c025fa3f6b52d66b9d"},"modified":"2021-03-09T14:58:26","modified_gmt":"2021-03-09T14:58:26","slug":"microsoft-was-warned-about-exchange-server-flaws-two-months-ago","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/microsoft-was-warned-about-exchange-server-flaws-two-months-ago\/","title":{"rendered":"Microsoft was warned about Exchange Server flaws two months ago"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/sabina-weston\">Sabina Weston<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">9 Mar, 2021<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p><a href=\"https:\/\/www.itpro.co.uk\/microsoft\">Microsoft<\/a>\u00a0was aware of the Exchange Server vulnerabilities two months prior to the\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/zero-day-exploit\/358760\/microsoft-exchange-zero-day-hack\">attack orchestrated by state-backed hackers<\/a>, having confirmed that it was initially notified in \u201cearly January\u201d.<\/p>\n<p>The tech giant made the statement to\u00a0<a href=\"https:\/\/www.itpro.co.uk\/cyber-security\">cyber security<\/a>\u00a0journalist Brian Krebs, who has compiled a basic timeline of the hack on his\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2021\/03\/a-basic-timeline-of-the-exchange-mass-hack\/\">blog<\/a>.\u00a0<\/p>\n<p><!--wysiwyg_see-related_plugin--><\/p>\n<p>\nKrebs\u2019 research shows that, on 5 January, Microsoft was first notified of two of the four\u00a0<a href=\"https:\/\/www.itpro.co.uk\/zero-day-exploit\">zero-day vulnerabilities<\/a>\u00a0by a researcher at security testing firm DevCore. On 2 February, cyber security solutions provider Volexity also reported the same two vulnerabilities to Microsoft, having witnessed attack traffic going back to 3 January.<\/p>\n<p>Warnings also came from Danish cyber security provider Dubex, which first witnessed clients being hit on 18 January. The company reported their incident response findings to Microsoft on 27 January.<\/p>\n<p>In a\u00a0<a href=\"https:\/\/www.dubex.dk\/aktuelt\/nyheder\/please-leave-an-exploit-after-the-beep\">blog post<\/a>, Dubex detailed how hackers took advantage of the\u00a0&#8216;unifying messaging&#8217; module in Exchange, which allows organisations to store voicemail and fax files, as well as emails, calendars, and contacts in users\u2019 mailboxes, in order to install\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/hacking\/358603\/microsoft-is-concerned-with-escalating-web-shell-attacks\">web shell<\/a>\u00a0backdoors.<\/p>\n<p>\u201cA unified messaging server also allows users access to voicemail features via smartphones, Microsoft Outlook and Outlook Web App. Most users and IT departments manage their voicemail separately from their email, and voicemail and email exist as separate inboxes hosted on separate servers. Unified Messaging offers an integrated store for all messages and access to content through the computer and the telephone,\u201d Dubex revealed.<\/p>\n<p>However, Dubex\u2019s CTO Jacob Herbst told KrebsOnSecurity that the company \u201cnever got a \u2018real\u2019 confirmation [from Microsoft] of the zero-day before the patch was released\u201d.<\/p>\n<p>The four zero-day vulnerabilities were ultimately patched on 2 March, a week earlier than previously planned. However, only a day later it was revealed that tens of thousands of Exchange servers had been compromised worldwide, with the number of victims increasing by the hour.<\/p>\n<p>Krebs questioned Microsoft\u2019s response timing, saying that the timeline illustrates that the company &#8220;had almost two months to push out the patch it ultimately shipped Mar. 2, or else help hundreds of thousands of Exchange customers mitigate the threat from this flaw before attackers started exploiting it indiscriminately\u201d.<\/p>\n<p><em>IT Pro<\/em>\u00a0has contacted Microsoft for comment but is yet to hear back from the company.<\/p>\n<p>The number of victims is estimated to be in the\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/hacking\/358799\/hundreds-of-thousands-of-victims-identified-in-microsoft-exchange-server\">hundreds of thousands<\/a>, with the European Banking Authority (EBA) becoming the latest major public body to be compromised by the hack.<\/p>\n<p>In a\u00a0<a href=\"https:\/\/www.eba.europa.eu\/cyber-attack-european-banking-authority\">statement<\/a>, the EBA said that it \u201cis working to identify what, if any, data was accessed\u201d, adding that it had \u201cdecided to take its email systems offline\u201d as a \u201cprecautionary measure\u201d.\u00a0<\/p>\n<p>Chinese\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/28170\/what-is-cyber-warfare\">state-sponsored hacking group<\/a>\u00a0Hafnium is believed to be behind the attack. <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Sabina Weston<\/p>\n<p>        9 Mar, 2021    <\/p>\n<p>      Microsoft\u00a0was aware of the Exchange Server vulnerabilities two months prior to the\u00a0attack orchestrated by state-backed hackers, having confirmed that it was initially notified in \u201cearly January\u201d&#8230;<\/p>\n","protected":false},"author":627,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-41868","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/627"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=41868"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41868\/revisions"}],"predecessor-version":[{"id":41869,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41868\/revisions\/41869"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=41868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=41868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=41868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}