Yesterday as I settled down to a honeymoon dinner on the Kohala coast with my wife, I saw a notification on my iPhone: "China-Linked Hack Hits Tens of Thousands of U.S. Microsoft Customers." With early reports of 250,000 or more U.S. organizations running Microsoft Exchange being hacked, it was clear a quick response from us was in order. This post lays out the attack in simple terms, who is affected, and what to do about it.
SEE ALSO: Major Microsoft Exchange Hacks Spotted in the Wild
There were four zero-day exploits used as part of the attack chain. A zero-day is an unknown flaw in a system that's exploited before a fix becomes available from its creator. When multiple zero-days are strung together, it's called an attack chain. Also known as a cyber kill chain, an attack chain is a way to understand the sequence of events involved in an attack on an organization’s IT environment. All of the zero-days in this attack require the ability to make a connection to an Exchange email server on port 443 (HTTPS). It's important to note the attacks leveraged weaknesses in Microsoft's HTTPS port and not its SMTP port 25. If you are a Paubox customer running Microsoft Exchange that leverages our Inbound Security as part of Paubox Email Suite Plus or Premium, you'd know that we become the sole MX record for your organization's domain name(s). We also work with you to restrict incoming SMTP connections on port 25 so that they are only accepted from the Paubox platform. Due to the nature of Hafnium exploiting weaknesses in port 443 of Microsoft Exchange and not port 25, Paubox did not provide protection against this attack. As it stands today, it appears that if you run Exchange, the only way to have guarded against this attack was if:
These are the four zero-day attacks used. It should be noted all of them used HTTPS port 443:
According to Microsoft, customers of cloud-based Microsoft 365 are not affected by this attack.
The Microsoft post March 2021 Exchange Server Security Updates is a good place to start.
Microsoft published a script on GitHub that can be used to detect if your Exchange server has been compromised. Volexity was credited by Microsoft for first reporting the vulnerabilities. According to Volexity President Steven Adair, "Even if you patched the same day Microsoft published its patches, there’s still a high chance there is a web shell on your server. The truth is, if you’re running Exchange and you haven’t patched this yet, there’s a very high chance that your organization is already compromised.”
Further reading: