Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities

Por um escritor misterioso
Last updated 11 junho 2024
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
[UPDATE] March 8, 2021 – Since original publication of this blog, Volexity has now observed that cyber espionage operations using the SSRF vulnerability CVE-2021-26855 started occurring on January 3, 2021, three days earlier than initially posted. Volexity is seeing active in-the-wild exploitation of multiple Microsoft Exchange vulnerabilities used to steal e-mail and compromise networks. These attacks appear to have started as early as January 6, 2021. In January 2021, through its Network Security Monitoring service, Volexity detected anomalous activity from two of its customers' Microsoft Exchange servers. Volexity identified a large amount of data being sent to IP addresses it believed were not tied to legitimate users. A closer inspection of the IIS logs from the Exchange servers revealed rather alarming results. The logs showed inbound POST requests to valid files associated with images, JavaScript, cascading style sheets, and fonts used by Outlook Web Access (OWA). It was initially suspected the […]
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
Hunting down Microsoft Exchange 0-day
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
Defending Exchange servers under attack
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
Hunting down Microsoft Exchange 0-day
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
Microsoft Exchange exploitation: how to detect, mitigate, and stay calm
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
Detecting Microsoft Exchange Vulnerabilities - 0 + 8 Days Later…
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
Microsoft Exchange Archives - Security Affairs
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
ProxyNotShell: A Zero-Day Microsoft Exchange Exploit
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
OWASSRF: CrowdStrike Identifies New Method for Bypassing ProxyNotShell Mitigations
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
Microsoft Exchange 0-Day Vulnerabilities Mitigation Guide
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
Tactics, Techniques, and Procedures (TTPs) Used by HAFNIUM to Target Microsoft Exchange Servers
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
4 Zero-Day Bug in Microsoft Exchange Let Attackers
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
Threat Assessment: Active Exploitation of Four Zero-Day Vulnerabilities in Microsoft Exchange Server
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
Operation Exchange Marauder - SOC Prime
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
Collected Links For Hafnium – March 2021 Exchange Security Issue - 250 Hello
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day  Microsoft Exchange Vulnerabilities
Microsoft Exchange Server Attack Timeline: Discoveries and Mitigations

© 2014-2024 empresaytrabajo.coop. All rights reserved.