Security

Patches

Microsoft to enterprises: Patch your Exchange servers

If you want to keep the miscreants out, put the updates in, Redmond says


Microsoft is urging organizations to protect their Exchange servers from cyberattacks by keeping them updated and hardened, since online criminals are still going after valuable data in the email system.

Enterprises need to make sure to install the latest Cumulative Updates (CUs) and Security Updates (SUs) on the Exchange servers – and occasionally on Exchange Management Tools workstations – and to run manual tasks like enabling Extended Protection and certificate signing of PowerShell serialization payloads, according to the vendor's Exchange Team.

"Attackers looking to exploit unpatched Exchange servers are not going to go away," the group wrote in a blog post on Thursday. "There are too many aspects of unpatched on-premises Exchange environments that are valuable to bad actors looking to exfiltrate data or commit other malicious acts."

That includes critical and sensitive data often found in mailboxes stored on Exchange servers, as well as address books, which hold information miscreants can use for social engineering attacks. Such data also can include the structure of the organization and employees' titles and contact information, making phishing attacks much more effective.

In addition, "Exchange has deep hooks into and permissions within Active Directory, and in a hybrid environment, access to the connected cloud environment," they wrote.

There are reasons Exchange servers are a lure for cybercriminals, according to Chris Gonsalves, chief researcher officer for Channelnomics. One is the ubiquity of Microsoft in general, making it a target-rich environment.

"But as the recent [vulnerabilities] in Exchange servers have taught us – the ProxyNotShell stuff specifically – it goes beyond that," Gonsalves told The Register. "The attacks now are going after server-side weaknesses with forgery requests that are encrypted, essentially turning what had been a key form of data protection into a liability. It can be hard for defenders to see and thwart encrypted malicious traffic."

This should force vendors and enterprises to rethink visibility and decryption in the cause of defense.

"Meanwhile, any attacker with Shodan and a willingness to do bad things can find ample unpatched Exchange targets ready to receive malicious instructions and serve up unauthorized access to assets inside the perimeter," he said.

In November 2022's Patch Tuesday releases, Microsoft finally fixed the two aforementioned ProxyNotShell flaws that were being exploited earlier in the year. One is a remote code execution (RCE) bug, the other a server-side request forgery flaw. When used together, miscreants could run PowerShell commands and take over a compromised system.

In March 2021, Redmond issued out-of-band patches for four zero-days vulnerabilities, including one dubbed ProxyLogon, that were exploited the Hafnium threat group and almost a dozen other cybercrime gangs in attacks starting two months earlier.

Hundreds of thousands of servers at thousands of organizations in the US, UK, Europe, and South America were compromised in the attacks.

More recently, researchers with cybersecurity vendor Prodaft last year found in an investigation of FIN7 that the Russian threat group was exploiting vulnerabilities in Exchange with an automated attack system designed to steal data and determine if the victim organization was a good target for a ransomware attack, based on its financial information.

Such threats highlight the importance of keeping on-premises Exchange servers updated and hardened.

"We know that keeping your Exchange environment protected is critical, and we know it's never ending," the Exchange Team wrote. "Exchange Server CUs and SUs are cumulative, so you only need to install the latest available one. You install the latest CU, then see if any SUs were released after the CU was released. If so, install the most recent (latest) SU."

The group recommended running the Health Checker tool after installing an update to see what manual tasks need to be done. ®

Send us news
14 Comments

A year on, CISA realizes debunked vuln actually a dud and removes it from must-patch list

Apparently no one thought to check if this D-Link router 'issue' was actually exploitable

Two years on, 1 in 4 apps still vulnerable to Log4Shell

Lack of awareness still blamed for patching apathy despite it being among most infamous bugs of all time

Google submits complaints about Microsoft licensing to UK competition regulator

Now Microsoft has regulator breathing down its neck in three regions

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good

FTC wants Microsoft's relationship with OpenAI under the microscope

Hey Bing, how can I invest billions in a company but not break antitrust laws?

Microsoft partners with labor unions to shape and regulate AI

Redmond reassures AFL-CIO workers they won't be pushed out by technology

Experienced Copilot help is hard to find, warns Microsoft MVP

Almost nobody has used it, or knows it well, so beware of consultants bearing cred

Attacks abuse Microsoft DHCP to spoof DNS records and steal secrets

Akamai says it reported the flaws to Microsoft. Redmond shrugged

Microsoft's relationship with OpenAI now in competition regulator's sights

Has recent CEO, board shenanigans given rise to a merger situation? CMA is asking for a friend

Microsoft issues deadline for end of Windows 10 support – it's pay to play for security

Limited options will be available into 2028, for an undisclosed price

Microsoft confirms Smart App issue renaming everyone's printers to HP

Not only turning up uninvited, but telling folks they suddenly have a LaserJet

Creating a single AI-generated image needs as much power as charging your smartphone

PLUS: Microsoft to invest £2.5B in UK datacenters to power AI, and more