3 March 2021

Microsoft patches 4 Exchange 0days actively exploited by Chinese hackers


Microsoft patches 4 Exchange 0days actively exploited by Chinese hackers

Microsoft has released a set of out-of-band security updates for it Exchange Server enterprise email product to fix a total of four zero day vulnerabilities that have been actively exploited in real-world attacks.

The vulnerabilities in question are CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065. All of them are described as an input validation error issue and allow remote code execution using specially crafted data sent to the Exchange server.

The affected Exchange Server versions include Microsoft Exchange Server 2013, Microsoft Exchange Server 2016, and Microsoft Exchange Server 2019. Microsoft Exchange Online is not impacted.

The culprit behind the attacks appears to be a China-linked state-sponsored hacker group known as Hafnium. Microsoft says the this APT primarily targets entities in the United States with the goal of stealing information from a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks and NGOs. Although the group is based in China, it conducts its operations primarily from leased virtual private servers (VPS) in the United States.

According to Microsoft and security firm Volexity that published its own report on the attacks, the above mentioned flaws were used as part of an attack chain. The attacker exploited these vulnerabilities to gain initial access to the target systems and install an ASPX web shell on the compromised servers, which allowed them steal data and perform additional malicious activities.

“Hafnium operators were also able to download the Exchange offline address book from compromised systems, which contains information about an organization and its users,” Microsoft added.

Volexity says it detected suspicious activity from two of its customers’ Microsoft Exchange servers in January 2021, which led to discovery of the attacks.

The Windows maker urges all customers to apply security patches for Exchange Server 0days as soon as possible.

Back to the list

Latest Posts

Cyber Security Week in Review: April 19, 2024

Cyber Security Week in Review: April 19, 2024

In brief: the LabHost PhaaS platform shut down, Russian military hackers attacked critical infrastructure in the US and Europe, and more.
19 April 2024
Ukrainian military personnel targeted via messaging apps and dating sites

Ukrainian military personnel targeted via messaging apps and dating sites

The threat actor employs a range of software in their malicious activities, including both commercial programs and  open-source tools.
18 April 2024
Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

This marks the first time Russian nation-state hackers have posed a direct threat to critical infrastructure in Western countries.
18 April 2024