Exchange Zero-Day Exploits
The security community has detected multiple exploits actively being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to email accounts, and allowed installation of additional malware to facilitate long-term access to victim environments. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to HAFNIUM, a group assessed to be state-sponsored and operating out of China, based on observed victimology, tactics and procedures.
We are sharing this information with our customers and the security community to emphasize the critical nature of these vulnerabilities and the importance of patching all affected systems immediately to protect against these exploits and prevent future abuse across the ecosystem. This blog also continues our mission to elevate awareness of the sophisticated tactics and techniques.
The related IOCs are curated list from community intelligence, live observations and confirmed attacks.
Vulnerabilities
- CVE-2021-26855: Microsoft Exchange Server Remote Code Execution Vulnerability. This vulnerability is part of an attack chain. The initial attack requires the ability to make an untrusted connection to Exchange server port 443.
- CVE-2021-26857: Microsoft Exchange Server Remote Code Execution Vulnerability. This vulnerability is part of an attack chain. The initial attack requires the ability to make an untrusted connection to Exchange server port 443.
- CVE-2021-26858: Microsoft Exchange Server Remote Code Execution Vulnerability. This vulnerability is part of an attack chain. The initial attack requires the ability to make an untrusted connection to Exchange server port 443.
- CVE-2021-27065: Microsoft Exchange Server Remote Code Execution Vulnerability. This vulnerability is part of an attack chain. The initial attack requires the ability to make an untrusted connection to Exchange server port 443.
Actions
We strongly urge customers to update on-premises systems immediately. Exchange Online is not affected.
Microsoft also released a powershell script that can be used to hunt for indicators of compromise.
NMAP Detection Script and Powershell Scanning Script
Yara APT Hafnium
Curated List of Webshells Found
Indicators of Compromise
To identify possible historical activity relating to the authentication bypass and RCE activity, IIS logs from Exchange servers can be examined for the following:
POST /owa/auth/Current/
POST /ecp/default.flt
POST /ecp/main.css
POST /ecp/<single char>.js
IP Addresses
- 103.77.192.219
- 104.140.114.110
- 104.250.191.110
- 108.61.246.56
- 149.28.14.163
- 157.230.221.198
- 167.99.168.251
- 185.250.151.72
- 192.81.208.169
- 203.160.69.66
- 211.56.98.146
- 125.254.43.18
- 80.92.205.81
- 165.232.154.116
- 182.18.152.105
- 86.34.111.111
- 86.105.18.116
Webshell Hashes
1b75f163ca9b9240bf4b37ad92bc7556b40a17e27c2b8ed5c8991385fe07d17d0
2097549cf7d0f76f0d99edf8b2d91c60977fd6a96e4b8c3c94b0b1733dc026d3e
32b6f1ebb2208e93ade4a6424555d6a8341fd6d9f60c25e44afe11008f5c1aad1
465149e036fff06026d80ac9ad4d156332822dc93142cf1a122b1841ec8de34b5
5511df0e2df9bfa5521b588cc4bb5f8c5a321801b803394ebc493db1ef3c78fa1
64edc7770464a14f54d17f36dc9d0fe854f68b346b27b35a6f5839adf1f13f8ea
7811157f9c7003ba8d17b45eb3cf09bef2cecd2701cedb675274949296a6a183d
81631a90eb5395c4e19c7dbcbf611bbe6444ff312eb7937e286e4637cb9e72944
UNC2640
Indicator | Type | MD5 |
help.aspx | File: Web shell | 4b3039cf227c611c45d2242d1228a121 |
iisstart.aspx | File: Web shell | 0fd9bffa49c76ee12e51e3b8ae0609ac |
UNC2643
Indicator | Type | MD5/Note |
Cobalt Strike BEACON | File: Shellcode | 79eb217578bed4c250803bd573b1015 |