Vulnerability

Exchange Zero-Day Exploits

The security community has detected multiple exploits actively being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to email accounts, and allowed installation of additional malware to facilitate long-term access to victim environments. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to HAFNIUM, a group assessed to be state-sponsored and operating out of China, based on observed victimology, tactics and procedures.

We are sharing this information with our customers and the security community to emphasize the critical nature of these vulnerabilities and the importance of patching all affected systems immediately to protect against these exploits and prevent future abuse across the ecosystem. This blog also continues our mission to elevate awareness of the sophisticated tactics and techniques.

The related IOCs are curated list from community intelligence, live observations and confirmed attacks.

Vulnerabilities

  • CVE-2021-26855: Microsoft Exchange Server Remote Code Execution Vulnerability. This vulnerability is part of an attack chain. The initial attack requires the ability to make an untrusted connection to Exchange server port 443.
  • CVE-2021-26857: Microsoft Exchange Server Remote Code Execution Vulnerability. This vulnerability is part of an attack chain. The initial attack requires the ability to make an untrusted connection to Exchange server port 443.
  • CVE-2021-26858: Microsoft Exchange Server Remote Code Execution Vulnerability. This vulnerability is part of an attack chain. The initial attack requires the ability to make an untrusted connection to Exchange server port 443.
  • CVE-2021-27065: Microsoft Exchange Server Remote Code Execution Vulnerability. This vulnerability is part of an attack chain. The initial attack requires the ability to make an untrusted connection to Exchange server port 443.

Actions

We strongly urge customers to update on-premises systems immediately. Exchange Online is not affected.

Microsoft also released a powershell script that can be used to hunt for indicators of compromise.

NMAP Detection Script and Powershell Scanning Script

Yara APT Hafnium

Curated List of Webshells Found

Indicators of Compromise

To identify possible historical activity relating to the authentication bypass and RCE activity, IIS logs from Exchange servers can be examined for the following:

  • POST /owa/auth/Current/
  • POST /ecp/default.flt
  • POST /ecp/main.css
  • POST /ecp/<single char>.js

IP Addresses

  • 103.77.192.219
  • 104.140.114.110
  • 104.250.191.110
  • 108.61.246.56
  • 149.28.14.163
  • 157.230.221.198
  • 167.99.168.251
  • 185.250.151.72
  • 192.81.208.169
  • 203.160.69.66
  • 211.56.98.146
  • 125.254.43.18
  • 80.92.205.81
  • 165.232.154.116
  • 182.18.152.105
  • 86.34.111.111
  • 86.105.18.116

Webshell Hashes

  • 1b75f163ca9b9240bf4b37ad92bc7556b40a17e27c2b8ed5c8991385fe07d17d0
  • 2097549cf7d0f76f0d99edf8b2d91c60977fd6a96e4b8c3c94b0b1733dc026d3e
  • 32b6f1ebb2208e93ade4a6424555d6a8341fd6d9f60c25e44afe11008f5c1aad1
  • 465149e036fff06026d80ac9ad4d156332822dc93142cf1a122b1841ec8de34b5
  • 5511df0e2df9bfa5521b588cc4bb5f8c5a321801b803394ebc493db1ef3c78fa1
  • 64edc7770464a14f54d17f36dc9d0fe854f68b346b27b35a6f5839adf1f13f8ea
  • 7811157f9c7003ba8d17b45eb3cf09bef2cecd2701cedb675274949296a6a183d
  • 81631a90eb5395c4e19c7dbcbf611bbe6444ff312eb7937e286e4637cb9e72944

UNC2640

IndicatorTypeMD5
help.aspxFile: Web shell4b3039cf227c611c45d2242d1228a121
iisstart.aspxFile: Web shell0fd9bffa49c76ee12e51e3b8ae0609ac

UNC2643

IndicatorTypeMD5/Note
Cobalt Strike BEACONFile: Shellcode79eb217578bed4c250803bd573b1015

Links