Breaking Down the Real Meaning of an XDR Solution
Read More Darcula Phishing-as-a-Service platform has been taking over the world since early 2024.
Want to stay ahead of threats in 2025? This research report is all you need to stay updated.
Over the last week, there has been an influx of updated information regarding the critical ProxyLogon vulnerabilities which have impacted Microsoft Exchange Servers globally. Estimates of vulnerable and impacted servers number in the tens of thousands with new adversaries, tactics, and tools being observed targeting these systems.
In the aftermath of yet another wide-spread hack here are the top 5 concerns and assessments Fidelis Threat intelligence team would like our customers and industry intelligence teams to know and consider as of 10 March 2021.
Continue reading for more information about this top 5 list and what you should know now.
1. The ProxyLogon (name given to the recent set of 0day-vulnerabilities for MS Exchange Server) threat is no longer a patch/update issue but is now an incident response issue.
2. Attacks and campaigns are not isolated to only one adversary group, but rather a plethora of different campaigns with varying post-compromise intent and payloads
3. Some adversaries named in ongoing attempts against ProxyLogon exploitation have been observed reusing older or open-sourced tactics or tools
4. Although response and clean-up take precedence over attribution of named adversary groups at this time, the breadth and depth of access and compromise requires review of possible adversary courses of actions based off past activity
5. In-depth technical reports and exploit proof of concept (POC), which was released to GitHub and subsequently removed by Microsoft, may exasperate the risk against MS Exchange Servers
While not every single environment or organization is confirmed to be impacted or targeted, Fidelis TRT assesses that that attempted exploitation or interrogation of your environments for these vulnerabilities should be considered as a Most Likely Course of Action (MLCOA) due to the length of time the threats have been present as well as recent public release of the exploit’s POC. It is important to consider that exploitation of the 0-day ProxyLogon vulnerabilities does not necessarily constitute a full compromise. There are several steps and processes that were involved beyond the initial compromise of vulnerable Microsoft Exchange Servers in order to achieve varying levels of access, persistence, discovery and execution or exfiltration. Previous major breaches have also proved that failures at multiple levels of defense and detection, not just the initial compromise or vulnerability exploitation, resulted in major impact of confidentiality, integrity, and/or availability. A defense in depth and risk-focused approach is an important consideration to ensure known and future threats are mitigated where possible.
Jon Belanger is a seasoned Sr. Analyst in Threat Research with a passion for unraveling the intricate world of cybersecurity. Over the years, Jon has honed his skills through hands-on experience and a commitment to staying ahead of the ever-evolving threat landscape.
See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.