• chevron_right

      How an unpatched Microsoft Exchange 0-day likely caused one of the UK’s biggest hacks ever

      news.movim.eu / ArsTechnica · Wednesday, 9 August, 2023 - 21:58

    Building with Microsoft logo.

    Enlarge / Building with Microsoft logo. (credit: Getty Images)

    It’s looking more and more likely that a critical zero-day vulnerability that went unfixed for more than a month in Microsoft Exchange was the cause of one of the UK’s biggest hacks ever—the breach of the country’s Electoral Commission, which exposed data for as many as 40 million residents.

    Electoral Commission officials disclosed the breach on Tuesday. They said that they discovered the intrusion last October when they found “suspicious activity” on their networks and that “hostile actors had first accessed the systems in August 2021.” That means the attackers were in the network for 14 months before finally being driven out. The Commission waited nine months after that to notify the public.

    The compromise gave the attackers access to a host of personal information, including names and addresses of people registered to vote from 2014 to 2022. Spokespeople for the Commission said the number of affected voters could be as high as 40 million. The Commission has not yet said what the cause of the breach or the means of initial entry was.

    Read 9 remaining paragraphs | Comments

    • chevron_right

      Microsoft Exchange servers worldwide hit by stealthy new backdoor

      news.movim.eu / ArsTechnica · Thursday, 30 June, 2022 - 21:57

    Microsoft Exchange servers worldwide hit by stealthy new backdoor

    Enlarge (credit: Getty Images)

    Researchers have identified stealthy new malware that threat actors have been using for the past 15 months to backdoor Microsoft Exchange servers after they have been hacked.

    Dubbed SessionManager, the malicious software poses as a legitimate module for Internet Information Services (IIS), the web server installed by default on Exchange servers. Organizations often deploy IIS modules to streamline specific processes on their web infrastructure. Researchers from security firm Kaspersky have identified 34 servers belonging to 24 organizations that have been infected with SessionManager since March 2021. As of earlier this month, Kaspersky said , 20 organizations remained infected.

    Stealth, persistence, power

    Malicious IIS modules offer an ideal means to deploy powerful, persistent, and stealthy backdoors. Once installed, they will respond to specifically crafted HTTP requests sent by the operator instructing the server to collect emails, add further malicious access, or use the compromised servers for clandestine purposes. To the untrained eye, the HTTP requests look unremarkable, even though they give the operator complete control over the machine.

    Read 5 remaining paragraphs | Comments