{"id":42609,"date":"2021-11-23T15:59:36","date_gmt":"2021-11-23T15:59:36","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=3e6f42443e365162963535fecd846a1c"},"modified":"2021-11-23T15:59:36","modified_gmt":"2021-11-23T15:59:36","slug":"hackers-use-squirrelwaffle-malware-to-hack-exchange-servers-in-new-campaign","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/hackers-use-squirrelwaffle-malware-to-hack-exchange-servers-in-new-campaign\/","title":{"rendered":"Hackers use SquirrelWaffle malware to hack Exchange servers in new campaign"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/rene-millman\">Rene Millman<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">23 Nov, 2021<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p>Hackers are using <span class=\"scayt-misspell-word\" data-scayt-word=\"ProxyShell\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5bc1d7083fdir\">ProxyShell<\/span> and <span class=\"scayt-misspell-word\" data-scayt-word=\"ProxyLogon\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5bbthjt5wvhxl\">ProxyLogon<\/span> exploits to break into Microsoft Exchange servers\u00a0in a new campaign to infect systems with malware, bypassing security measures by replying to pre-existing email chains.<\/p>\n<p><a href=\"https:\/\/www.itpro.com\/security\" data-cke-saved-href=\"https:\/\/www.itpro.com\/security\">Security<\/a> researchers at Trend Micro said investigations into several intrusions related to <span class=\"scayt-misspell-word\" data-scayt-word=\"Squirrelwaffle\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5dg9wj8fepq8d\">Squirrelwaffle<\/span> led to a deeper examination into the initial access of these attacks, according to a <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/k\/Squirrelwaffle-Exploits-ProxyShell-and-ProxyLogon-to-Hijack-Email-Chains.html\" data-cke-saved-href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/k\/Squirrelwaffle-Exploits-ProxyShell-and-ProxyLogon-to-Hijack-Email-Chains.html\">blog post<\/a>.<\/p>\n<p>Researchers said that <a href=\"https:\/\/blog.talosintelligence.com\/2021\/10\/squirrelwaffle-emerges.html\"  data-cke-saved-href=\"https:\/\/blog.talosintelligence.com\/2021\/10\/squirrelwaffle-emerges.html\">Squirrelwaffle first emerged<\/a>\u00a0as a new loader spreading through spam campaigns in September. The <a href=\"https:\/\/www.itpro.com\/malware\" data-cke-saved-href=\"https:\/\/www.itpro.com\/malware\">malware<\/a> is known for sending its malicious emails as replies to pre-existing email chains.<\/p>\n<p>The intrusions observed by researchers originated\u00a0from on-premise Microsoft Exchange Servers that appeared to be vulnerable to <span class=\"scayt-misspell-word\" data-scayt-word=\"ProxyLogon\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5eg7eic52xii5\">ProxyLogon<\/span> and <span class=\"scayt-misspell-word\" data-scayt-word=\"ProxyShell\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5eg6xb0pwofq4\">ProxyShell<\/span>.\u00a0According to researchers, there was evidence of the exploits on the vulnerabilities\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26855\"  data-cke-saved-href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26855\">CVE-2021-26855<\/a>,\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34473\"  data-cke-saved-href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34473\">CVE-2021-34473<\/a>, and\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34523\"  data-cke-saved-href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34523\">CVE-2021-34523<\/a>\u00a0in the <span class=\"scayt-misspell-word\" data-scayt-word=\"IIS\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5eg6de1ue0765\">IIS<\/span> Logs on three of the Exchange servers that were compromised in different intrusions.<\/p>\n<p>\u201cThe same <span class=\"scayt-misspell-word\" data-scayt-word=\"CVEs\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5ezts8on6820p\">CVEs<\/span> were used in <span class=\"scayt-misspell-word\" data-scayt-word=\"ProxyLogon\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5ezt6beaqxoe9\">ProxyLogon<\/span> (<span class=\"scayt-misspell-word\" data-scayt-word=\"CVE\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5ezrn16rt0oxv\">CVE<\/span>-2021-26855) and <span class=\"scayt-misspell-word\" data-scayt-word=\"ProxyShell\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5ezqae3pgyj8w\">ProxyShell<\/span> (<span class=\"scayt-misspell-word\" data-scayt-word=\"CVE\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5ezo4lp2t2sqk\">CVE<\/span>-2021-34473 and <span class=\"scayt-misspell-word\" data-scayt-word=\"CVE\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5ezm9eva3afp8\">CVE<\/span>-2021-34523) intrusions. Microsoft\u00a0released a patch for\u00a0<span class=\"scayt-misspell-word\" data-scayt-word=\"ProxyLogon\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5fuhu97eecpnt\">ProxyLogon<\/span>\u00a0in\u00a0<a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/05\/microsoft-exchange-server-vulnerabilities-mitigations-march-2021\/\"  data-cke-saved-href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/05\/microsoft-exchange-server-vulnerabilities-mitigations-march-2021\/\">March<\/a>; those who have applied the\u00a0<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/proxyshell-vulnerabilities-and-your-exchange-server\/ba-p\/2684705\"  data-cke-saved-href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/proxyshell-vulnerabilities-and-your-exchange-server\/ba-p\/2684705\">May or July<\/a>\u00a0updates are protected from\u00a0<span class=\"scayt-misspell-word\" data-scayt-word=\"ProxyShell\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5fufhtn0tn6al\">ProxyShell<\/span>\u00a0vulnerabilities,\u201d said researchers.<\/p>\n<p>In one case, all the internal users in the affected network received spam emails\u00a0sent as legitimate replies to existing email threads.<\/p>\n<p>\u201cAll of the observed emails were written in English for this spam campaign in the Middle East. While other languages were used in different regions, most were written in English. More notably, true account names from the victim\u2019s domain were used as sender and recipient, which raises the chance that a recipient will click the link and open the malicious Microsoft Excel spreadsheets,\u201d they said.<\/p>\n<p>In the same intrusion, researchers <span class=\"scayt-misspell-word\" data-scayt-word=\"analyzed\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5bwsgyorqqdn6\">analyzed<\/span> the email headers for the received malicious emails and found that the mail path was internal, indicating that the emails did not originate from an external sender, open mail relay, or any message transfer agent (<span class=\"scayt-misspell-word\" data-scayt-word=\"MTA\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5bwpatc06opgq\">MTA<\/span>).<\/p>\n<p>\u201cDelivering the malicious spam using this technique to reach all the internal domain users will decrease the possibility of detecting or stopping the attack, as the mail getaways will not be able to filter or quarantine any of these internal emails,\u201d they added.<\/p>\n<p>Researchers said that the hackers also did not drop or use tools for lateral movement after gaining access to the vulnerable Exchange servers in order to avoid detection. Additionally, no malware was executed on the Exchange servers to avoid triggering alerts before the malicious email could be spread across the environment.<\/p>\n<p>According to researchers, the recent <span class=\"scayt-misspell-word\" data-scayt-word=\"Squirrelwaffle\" data-wsc-lang=\"en_GB\" data-wsc-id=\"kwca5cn0gmxtxsrcd\">Squirrelwaffle<\/span> campaigns should make users wary of the different tactics used to mask malicious emails and files.<\/p>\n<p>\u201cEmails that come from trusted contacts may not be enough of an indicator that whatever link or file included in the email is safe,\u201d they warned. <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Rene Millman<\/p>\n<p>        23 Nov, 2021    <\/p>\n<p>      Hackers are using ProxyShell and ProxyLogon exploits to break into Microsoft Exchange servers\u00a0in a new campaign to infect systems with malware, bypassing security measures by replying to pre-exi&#8230;<\/p>\n","protected":false},"author":417,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-42609","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/417"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=42609"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42609\/revisions"}],"predecessor-version":[{"id":42610,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42609\/revisions\/42610"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=42609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=42609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=42609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}