Recent from talks
Nothing was collected or created yet.
2021 Microsoft Exchange Server data breach
View on Wikipedia
| Date | |
|---|---|
| Location | Global |
| Type | Cyberattack, data breach |
| Cause | Microsoft Exchange Server zero-day vulnerabilities[4] |
| First reporter | Microsoft (public disclosure)[3] |
| Suspects | Hafnium,[5][6] and at least nine others.[7] |
A global wave of cyberattacks and data breaches began in January 2021 after four zero-day exploits were discovered in on-premises Microsoft Exchange Servers, giving attackers full access to user emails and passwords on affected servers, administrator privileges on the server, and access to connected devices on the same network. Attackers typically install a backdoor that allows the attacker full access to impacted servers even if the server is later updated to no longer be vulnerable to the original exploits. As of 9 March 2021[update], it was estimated that 250,000 servers fell victim to the attacks, including servers belonging to around 30,000 organizations in the United States, 7,000 servers in the United Kingdom,[8] as well as the European Banking Authority, the Norwegian Parliament, and Chile's Commission for the Financial Market (CMF).[9][10][11][12][13][14]
On 2 March 2021, Microsoft released updates for Microsoft Exchange Server 2010, 2013, 2016 and 2019 to patch the exploit; this does not retroactively undo damage or remove any backdoors installed by attackers. Small and medium businesses, local institutions, and local governments are known to be the primary victims of the attack, as they often have smaller budgets to secure against cyber threats and typically outsource IT services to local providers that do not have the expertise to deal with cyber attacks.[15]
On 12 March 2021, Microsoft announced the discovery of "a new family of ransomware" being deployed to servers initially infected, encrypting all files, making the server inoperable and demanding payment to reverse the damage.[16] On 22 March 2021, Microsoft announced that in 92% of Exchange servers the exploit has been either patched or mitigated.[17]
Background
[edit]Microsoft Exchange is a widely used email server software and a frequent target for cyberattacks on business networks. According to Microsoft, its environment allows attackers to misuse built-in administrative tools or scripts for malicious purposes.[18] Microsoft Exchange has previously been targeted by nation-state threat actors.[19][20]
On 5 January 2021, security testing company DEVCORE reported the vulnerability to Microsoft, which Microsoft confirmed on 8 January.[21] On 6 January 2021, cybersecurity company Volexity detected the first known breach of a Microsoft Exchange Server instance.[1] By late January, Volexity detected a breach that allowed attackers to access data from two of its customers and reported the vulnerability to Microsoft. Following Microsoft's notification of the breach, Volexity reported that the hackers became less discreet in anticipation of a patch.[22]
On 2 March 2021, cybersecurity company ESET reported observing multiple threat actors, in addition to Hafnium, exploiting the vulnerabilities.[4] On 10 March 2021, Wired reported that following the patch, additional threat actors were likely to reverse engineer the fix to target unpatched servers. Analysts at two security firms reported observing signs that attackers were preparing to deploy cryptomining software on affected servers.[23]
On 10 March 2021, security researcher Nguyen Jang posted proof-of-concept code to Microsoft-owned GitHub demonstrating how the exploit works, consisting of 169 lines of code. The program was intentionally written with errors, allowing security researchers to understand the exploit while preventing malicious actors from using the code to access servers. Later that day, GitHub removed the code, stating that it "contains proof-of-concept code for a recently disclosed vulnerability that is being actively exploited".[24][25] On 13 March, another group independently published exploit code, which required minimal modification to function. The CERT Coordination Center's Will Dormann stated that the "exploit is completely out of the bag by now".[26]
The attacks came shortly after the 2020 United States federal government data breach, which also involved the compromise of Microsoft's Outlook web application and supply chain. Microsoft stated that there was no connection between the two incidents.[27]
Perpetrator
[edit]Microsoft said that the attack was initially perpetrated by the Hafnium, a Chinese state-sponsored hacking group (advanced persistent threat) that operates out of China.[5][22][6][26] Hafnium is known to install the web shell China Chopper.[26] Microsoft identified Hafnium as "a highly skilled and sophisticated actor" that historically has mostly targeted "entities in the United States for the purpose of exfiltrating information from a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks and NGOs."[28] Announcing the hack, Microsoft stated that this was "the eighth time in the past 12 months that Microsoft has publicly disclosed nation-state groups targeting institutions critical to civil society."[28] As of 12 March 2021, there were, in addition to Hafnium, at least nine other distinct groups exploiting the vulnerabilities, each different styles and procedures.[7][29]
The Chinese government denied involvement, calling the accusations "groundless."[22][30]
In a July 19, 2021 joint statement, the US, UK, EU, NATO, and other Western nations accused the Ministry of State Security (MSS) of perpetrating the Exchange breach, along with other cyberattacks, "attributing with a high degree of confidence that malicious cyber actors affiliated with PRC’s MSS conducted cyber espionage operations utilizing the zero-day vulnerabilities in Microsoft Exchange Server disclosed in early March 2021."[31][32][33][34]
Methodology
[edit]Hackers took advantage of four separate zero-day vulnerabilities to compromise Microsoft Exchange servers' Outlook Web Access (OWA),[2] giving them access to victims' entire servers and networks as well as to emails and calendar invitations,[4] only at first requiring the address of the server, which can be directly targeted or obtained by mass-scanning for vulnerable servers; the attacker then uses two exploits, the first allowing an attacker to connect to the server and falsely authenticate as a standard user. With that, a second vulnerability can then be exploited, escalating that user access to administrator privileges.[35][36] The final two exploits allow attackers to upload code to the server in any location they wish,[36] that automatically runs with these administrator privileges. Attackers then typically use this to install a web shell, providing a backdoor to the compromised server,[37] which gives hackers continued access to the server as long as both the web shell remains active and the Exchange server remains on.[29]
Through the web shell installed by attackers, commands can be run remotely. Among the actions observed are the downloading of all emails from servers, downloading the passwords and email addresses of users as Microsoft Exchange stores these unencrypted in memory, adding users, adding further backdoors to affected systems, accessing other systems in the network that are unsusceptible to the original exploit, and installing ransomware.[38] As patching the Exchange server against the exploit does not retroactively remove installed backdoors, attackers continue to have access to the server until the web shell, other backdoors and user accounts added by attackers are removed.[39]
On 27 and 28 February 2021, there was an automated attack, and on 2 and 3 March 2021, attackers used a script to return to the addresses to drop a web shell to enable them to return later.[29] Referring to the week ending 7 March, CrowdStrike co-founder Dmitri Alperovitch stated: "Every possible victim that hadn't patched by mid-to-end of last week has already been hit by at least one or several actors".[40] After the patch was announced, the tactics changed when using the same chain of vulnerabilities.[29][41]
Microsoft Exchange Server versions of 2010, 2013, 2016 and 2019 were confirmed to be susceptible, although vulnerable editions are yet to be fully determined.[42] Cloud-based services Exchange Online and Office 365 are not affected.[43]
Impact
[edit]Hackers have exploited the vulnerabilities to spy on a wide range of targets, affecting an estimated 250,000 servers.[11][44] Tom Burt, Microsoft's vice president for Customer Security & Trust, wrote that targets had included disease researchers, law offices, universities, defense contractors, non-governmental organizations, and think tanks.[28][9][45]
Automatic updates are typically disabled by server administrators to avoid disruption from downtime and problems in software,[46] and are by convention installed manually by server administrators after these updates are tested with the existing software and server-setup;[47] as smaller organizations often operate under a smaller budget to do this in-house or otherwise outsource this to local IT providers without expertise in cybersecurity, this is often not done until it becomes a necessity, if ever. This means small and medium businesses, and local institutions such as schools and local governments are known to be the primary victims of the attack as they are more likely to not have received updates to patch the exploit. Rural victims are noted to be "largely on their own", as they are typically without access to IT service providers.[15] On 11 March 2021, Check Point Research revealed that in the prior 24 hours "the number of exploitation attempts on organizations it tracks tripled every two to three hours."[48][49]
Check Point Research has observed the United States as being the most attacked country with 17% of all exploit attempts, followed by Germany with 6%, the United Kingdom and the Netherlands both at 5%, and Russia with 4% of all exploits; government/military is the most targeted sector with 23% of exploit attempts, followed by manufacturing at 15%, banking and financial services at 14%, software vendors with 7% and healthcare at 6%.[26][50]
The attack was discovered after attackers were discovered downloading all emails belonging to specific users on separate corporate Exchange servers.[38] An undisclosed Washington think tank reported attackers sending convincing emails to contacts in a social engineering attack that encouraged recipients to click on a link.[45] On 11 March 2021, Norway's parliament, the Storting, reported being a victim of the hack, stating that "data has been extracted."[51]
The European Banking Authority also reported that it had been targeted in the attack,[10] later stating in a press release that the scope of impact on its systems was "limited" and that "the confidentiality of the EBA systems and data has not been compromised".[52]
Security company ESET identified "at least 10" advanced persistent threat groups compromising IT, cybersecurity, energy, software development, public utility, real estate, telecommunications and engineering businesses, as well as Middle Eastern and South American governmental agencies. One APT group was identified deploying PowerShell downloaders, using affected servers for cryptocurrency mining.[7] Cybereason CEO Lior Div noted that APT group Hafnium "targeted small and medium-sized enterprises ... The assault against Microsoft Exchange is 1,000 times more devastating than the SolarWinds attack."[53]
On 12 March 2021, Microsoft Security Intelligence announced "a new family of ransomware" called DearCry being deployed to the servers that had been initially infected, encrypting device contents, making servers unusable and demanding payment to recover files.[16] Microsoft stated: "There is no guarantee that paying the ransom will give you access to your files."[54]
On 18 March 2021, an affiliate of ransomware cybergang REvil claimed they had stolen unencrypted data from Taiwanese hardware and electronics corporation Acer, including an undisclosed number of devices being encrypted, with cybersecurity firm Advanced Intel linking this data breach and ransomware attack to the Microsoft Exchange exploits. Advanced Intel detected one of Acer's Microsoft Exchange servers first being targeted on 5 March 2021. REvil has demanded a $50 million U.S. dollar ransom, claiming if this is paid they would "provide a decryptor, a vulnerability report, and the deletion of stolen files", and stating that the ransom would double to $100 million U.S. dollars if not paid on 28 March 2021.[55]
Responses
[edit]On 2 March 2021, the Microsoft Security Response Center (MSRC) publicly posted an out-of-band Common Vulnerabilities and Exposures (CVE) release, urging its clients to patch their Exchange servers to address a number of critical vulnerabilities.[3] On 15 March, Microsoft released a one-click PowerShell tool, The Exchange On-Premises Mitigation Tool, which installs the specific updates protecting against the threat, runs a malware scan which also detects installed web shells, and removes threats that were detected; this is recommended as a temporary mitigation measure, as it does not install other available updates.[56]
On 3 March 2021, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive forcing government networks to update to a patched version of Exchange. On 8 March, CISA tweeted what NBC News described as an "unusually candid message" urging "ALL organizations across ALL sectors" to address the vulnerabilities.[57][58]
Other official bodies expressing concerns included the White House, Norway's National Security Authority and the Czech Republic's Office for Cyber and Information Security.[59][60] On 7 March 2021, CNN reported that the Biden administration was expected to form a task force to address the breach;[61] the Biden administration has invited private-sector organizations to participate in the task force and will provide them with classified information as deemed necessary. U.S. National Security Advisor Jake Sullivan stated that the U.S. is not yet in a position to attribute blame for the attacks.[48]
In July 2021, the Biden administration, along with a coalition of Western allies, formally blamed China for the cyber attack. The administration highlighted the ongoing threat of from Chinese hackers, but did not accompany the condemnation with any form of sanctions. According to White House press secretary Jen Psaki, the administration is not ruling out future consequences for China.[62]
See also
[edit]References
[edit]- ^ a b c Krebs, Chris (5 March 2021). "At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft's Email Software". Krebs on Security. Archived from the original on 5 March 2021. Retrieved 10 March 2021.
- ^ a b Greenberg, Andy (5 March 2021). "Chinese Hacking Spree Hit an 'Astronomical' Number of Victims". Wired. ISSN 1059-1028. Retrieved 10 March 2021.
- ^ a b c "Multiple Security Updates Released for Exchange Server". Microsoft Security Response Center. 2 March 2021. Retrieved 10 March 2021.
- ^ a b c Collier, Kevin (3 March 2021). "U.S. issues warning after Microsoft says China hacked its mail server program". NBC News. Archived from the original on 3 March 2021. Retrieved 10 March 2021.
- ^ a b "Microsoft accuses China over email cyber-attacks". BBC News. 3 March 2021. Retrieved 10 March 2021.
- ^ a b "HAFNIUM targeting Exchange Servers with 0-day exploits". Microsoft Security. 2 March 2021. Retrieved 10 March 2021.
- ^ a b c "More hacking groups join Microsoft Exchange attack frenzy". BleepingComputer. 10 March 2021. Archived from the original on 10 March 2021. Retrieved 11 March 2021.
- ^ "Microsoft hack: 3,000 UK email servers remain unsecured". BBC News. 12 March 2021. Retrieved 12 March 2021.
- ^ a b Murphy, Hannah (9 March 2021). "Microsoft hack escalates as criminal groups rush to exploit flaws". Financial Times. Retrieved 10 March 2021.
- ^ a b O'Donnell, John (8 March 2021). "European banking regulator EBA targeted in Microsoft hacking". Reuters. Retrieved 10 March 2021.
- ^ a b Duffy, Clare (10 March 2021). "Here's what we know so far about the massive Microsoft Exchange hack". CNN. Retrieved 10 March 2021.
- ^ "Chile's bank regulator shares IOCs after Microsoft Exchange hack". BleepingComputer. Retrieved 17 March 2021.
- ^ "Comisión para el Mercado Financiero sufrió vulneración de ciberseguridad: no se conoce su alcance". BioBioChile - La Red de Prensa Más Grande de Chile (in Spanish). 14 March 2021. Retrieved 17 March 2021.
- ^ V, Vicente Vera. "CMF desestima "hasta ahora" el secuestro de datos tras sufrir ciberataque". Diario Financiero (in Spanish). Retrieved 17 March 2021.
- ^ a b "America's small businesses face the brunt of China's Exchange server hacks". TechCrunch. 10 March 2021. Archived from the original on 17 March 2021. Retrieved 12 March 2021.
- ^ a b "Microsoft warns of ransomware attacks as Exchange hack escalates". IT PRO. 12 March 2021. Archived from the original on 12 March 2021. Retrieved 12 March 2021.
- ^ "Microsoft: 92% of vulnerable Exchange servers are now patched, mitigated". www.msn.com. Retrieved 29 March 2021.
- ^ "How attackers target and exploit Microsoft Exchange servers". Help Net Security. 25 June 2020. Retrieved 14 March 2021.
- ^ Cimpanu, Catalin (9 March 2020). "Multiple nation-state groups are hacking Microsoft Exchange servers". ZDNet. Archived from the original on 9 March 2020. Retrieved 14 March 2021.
- ^ Cimpanu, Catalin (7 May 2019). "Russian cyberspies are using one hell of a clever Microsoft Exchange backdoor". ZDNet. Archived from the original on 8 May 2019. Retrieved 14 March 2021.
- ^ Krebs, Brian (8 March 2021). "A Basic Timeline of the Exchange Mass-Hack". Krebs on Security. Archived from the original on 8 March 2021. Retrieved 10 March 2021.
- ^ a b c Kevin, Collier (9 March 2021). "'Really messy': Why the hack of Microsoft's email system is getting worse". NBC News.
- ^ Newman, Lily Hay (10 March 2021). "It's Open Season for Microsoft Exchange Server Hacks". Wired. ISSN 1059-1028. Retrieved 10 March 2021.
- ^ "New PoC for Microsoft Exchange bugs puts attacks in reach of anyone". BleepingComputer. 14 March 2021. Archived from the original on 14 March 2021. Retrieved 15 March 2021.
- ^ Claburn, Thomas (12 March 2021). "Microsoft's GitHub under fire after disappearing proof-of-concept exploit for critical Microsoft Exchange vuln". The Register. Archived from the original on 12 March 2021. Retrieved 15 March 2021.
- ^ a b c d "Exchange Cyberattacks Escalate as Microsoft Rolls One-Click Fix". threatpost.com. 16 March 2021. Archived from the original on 16 March 2021. Retrieved 16 March 2021.
- ^ "Microsoft hack: White House warns of 'active threat' of email attack". BBC News. 6 March 2021. Retrieved 10 March 2021.
- ^ a b c Burt, Tom (2 March 2021). "New nation-state cyberattacks". Microsoft On the Issues. Archived from the original on 2 March 2021. Retrieved 10 March 2021.
- ^ a b c d "Hafnium timeline solidifies: A drizzle in February, a deluge in March". SC Media. 8 March 2021. Retrieved 10 March 2021.
- ^ "Foreign Ministry Spokesperson Wang Wenbin's Regular Press Conference on March 3, 2021". Ministry of Foreign Affairs of the People's Republic of China. 3 March 2021. Archived from the original on 3 March 2021. Retrieved 10 March 2021.
- ^ Fried, Ina (19 July 2021). "U.S. and key allies accuse China of Microsoft Exchange cyberattacks". Axios. Retrieved 19 July 2021.
- ^ Tucker, Eric (19 July 2021). "Microsoft Exchange hack caused by China, US and allies say". Associated Press. Retrieved 19 July 2021.
- ^ Kanno-Youngs, Zolan; Sanger, David E. (19 July 2021). "U.S. Formally Accuses China of Hacking Microsoft". The New York Times. Retrieved 19 July 2021.
- ^ Liptak, Kevin (19 July 2021). "US blames China for hacks, opening new front in cyber offensive". CNN. Retrieved 19 July 2021.
- ^ "ProxyLogon". ProxyLogon (in Chinese (Taiwan)). Retrieved 11 March 2021.
- ^ a b "Critical Microsoft Exchange flaw: What is CVE-2021-26855? | UpGuard". www.upguard.com. Retrieved 16 March 2021.
- ^ "Microsoft says China-backed hackers are exploiting Exchange zero-days". TechCrunch. 2 March 2021. Retrieved 10 March 2021.
- ^ a b "Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities | Volexity". www.volexity.com. 2 March 2021. Archived from the original on 2 March 2021. Retrieved 11 March 2021.
- ^ "30,000 U.S. organizations breached by cyber espionage group Hafnium". Security Magazine. 9 March 2021. Archived from the original on 13 April 2021. Retrieved 10 March 2021.
- ^ "Criminal hacking groups piling on to escalating Microsoft Exchange crisis". AppleInsider. 9 March 2021. Archived from the original on 9 March 2021. Retrieved 11 March 2021.
- ^ "Four new hacking groups have joined an ongoing offensive against Microsoft's email servers". MIT Technology Review. 6 March 2021. Archived from the original on 6 March 2021. Retrieved 10 March 2021.
- ^ Hollister, Sean (8 March 2021). "Microsoft was warned months ago — now, the Hafnium hack has grown to gigantic proportions". The Verge. Archived from the original on 8 March 2021. Retrieved 10 March 2021.
- ^ Novet, Jordan (9 March 2021). "Microsoft's big email hack: What happened, who did it, and why it matters". CNBC. Retrieved 15 March 2021.
- ^ O'Donnell, John (8 March 2021). "European banking regulator EBA targeted in Microsoft hacking". Reuters. Retrieved 10 March 2021.
- ^ a b "Victims of Microsoft hack scramble to plug security holes". CBS News. 9 March 2021.
- ^ Leonhard, Woody (11 December 2017). "It's time: Make sure Windows Auto Update is turned off". Computerworld. Retrieved 16 March 2021.
- ^ Tulloch, Mitch (1 August 2005). "Automatic Updates for Servers?". TechGenix. Retrieved 16 March 2021.
- ^ a b Fung, Brian; Marquardt, Alex. "White House warns organizations have 'hours, not days' to fix vulnerabilities as Microsoft Exchange attacks increase". KMOV.com. Retrieved 13 March 2021.
- ^ "Exploits on Organizations Worldwide Tripled every Two Hours after Microsoft's Revelation of Four Zero-days". Check Point Software. 11 March 2021. Retrieved 13 March 2021.
- ^ "Exploits on Organizations Worldwide Grow Tenfold after Microsoft's Revelation of Four Zero-days". Check Point Software. 11 March 2021. Retrieved 16 March 2021.
- ^ "New cyberattack on the Storting" (Press release). 11 March 2021.
- ^ "Cyber-attack on the European Banking Authority – UPDATE 3". European Banking Authority. 9 March 2021. Retrieved 11 March 2021.
- ^ Whitney, Lance (8 March 2021). "How the Microsoft Exchange hack could impact your organization". TechRepublic. Archived from the original on 9 March 2021. Retrieved 11 March 2021.
- ^ "Ransom:Win32/DoejoCrypt.A". Microsoft Security Intelligence. 11 March 2021. Archived from the original on 12 March 2021. Retrieved 12 March 2021.
- ^ "Computer giant Acer hit by $50 million ransomware attack". BleepingComputer. 19 March 2021. Archived from the original on 19 March 2021. Retrieved 20 March 2021.
- ^ "Microsoft tool provides automated Exchange threat mitigation". iTnews. 16 March 2021. Archived from the original on 16 March 2021. Retrieved 16 March 2021.
- ^ @USCERT_gov (9 March 2021). "CISA announcement" (Tweet) – via Twitter.
- ^ "Remediating Microsoft Exchange Vulnerabilities". Cybersecurity and Infrastructure Security Agency. Archived from the original on 9 March 2021. Retrieved 10 March 2021.
- ^ Murphy, Hannah (5 March 2021). "White House warns of 'large number' of victims in Microsoft hack". Financial Times.
- ^ Vavra, Shannon (5 March 2021). "Victims of Microsoft Exchange Server zero-days emerge". CyberScoop. Archived from the original on 5 March 2021. Retrieved 10 March 2021.
- ^ Marquardt, Alex (6 March 2021). "Biden administration expected to form task force to deal with Microsoft hack linked to China". CNN. Archived from the original on 7 March 2021. Retrieved 10 March 2021.
- ^ Tucker, Eric (19 July 2021). "Microsoft Exchange hack caused by China, Us and allies say". AP News. Archived from the original on 19 July 2021. Retrieved 3 September 2021.
2021 Microsoft Exchange Server data breach
View on GrokipediaBackground
Vulnerabilities in On-Premises Exchange Servers
The 2021 Microsoft Exchange Server data breach stemmed from four zero-day vulnerabilities in on-premises installations of Exchange Server versions 2013, 2016, and 2019, which enabled unauthenticated remote code execution and unauthorized access when chained together.[9] [1] These flaws primarily affected self-hosted servers exposed to the internet, as organizations managed patching and configuration independently, unlike Microsoft-managed Exchange Online services, which remained unaffected due to centralized controls.[9] Exploitation activity was detected as early as January 2021, with Microsoft releasing security updates on March 2, 2021, to address the issues.[1] The initial entry point was CVE-2021-26855, a server-side request forgery (SSRF) vulnerability in the Exchange backend that permitted unauthenticated attackers to craft arbitrary HTTP requests authenticated as the Exchange Server itself, bypassing standard authentication mechanisms.[1] [5] This flaw, rated critical with a CVSS score of 9.1, allowed attackers to relay requests to internal endpoints, facilitating further compromise without valid credentials.[3] Once authenticated via CVE-2021-26855, attackers leveraged post-authentication arbitrary file write vulnerabilities CVE-2021-26858 and CVE-2021-27065, which enabled writing files to server paths with SYSTEM privileges, such as deploying web shells for persistent access.[1] CVE-2021-26858 targeted Exchange PowerShell components, while CVE-2021-27065 affected broader file handling, both requiring prior authentication but allowing arbitrary content placement when combined with the SSRF entry.[1] Complementing these was CVE-2021-26857, an insecure deserialization vulnerability in the Unified Messaging service that permitted remote code execution (RCE) under SYSTEM context after authentication, potentially standalone or chained for immediate privilege escalation.[1] [9] The chain—SSRF for access, file writes for persistence, and deserialization for execution—enabled comprehensive server compromise, including data exfiltration from mailboxes, without user interaction.[1] All vulnerabilities were patched in cumulative updates (e.g., KB5000871 for Exchange 2016/2019), emphasizing the risks of unpatched, internet-facing on-premises deployments.[9]Historical Context of Exchange Server Usage
Microsoft Exchange Server, first released as version 4.0 on August 6, 1996, emerged as a successor to Microsoft Mail 3.5, providing integrated email, calendaring, and collaboration features for Windows NT Server environments.[10] Designed primarily for enterprise use, it quickly gained traction among organizations seeking a robust, on-premises solution for managing internal communications, leveraging Active Directory integration from Exchange 2000 onward to support large-scale deployments with features like Outlook Web Access (OWA) for remote email retrieval.[11] By the early 2000s, Exchange had become a dominant platform in corporate settings, powering millions of mailboxes due to its scalability and compatibility with Microsoft's ecosystem, though it required significant administrative overhead for patching, maintenance, and security hardening.[12] Prior to 2021, on-premises Exchange installations remained prevalent despite the introduction of cloud alternatives like Exchange Online in 2011 as part of Office 365. According to market analysis, on-premises deployments accounted for approximately 33% of worldwide Exchange mailboxes in 2021, with the remainder shifting to cloud-based services.[13] This persistence stemmed from organizations' needs for direct control over data residency, customization of server configurations, and integration with legacy or proprietary systems that cloud services could not fully replicate without hybrid setups.[14] Sectors such as government, finance, and healthcare favored on-premises setups to meet stringent regulatory requirements for data sovereignty and auditability, where cloud migration risked non-compliance or vendor lock-in.[15] The architectural choice of exposing on-premises Exchange servers to the internet—often via OWA or other protocols for remote access—facilitated widespread adoption but introduced inherent risks, as these systems depended on organizations' timely application of security updates rather than centralized cloud protections.[16] Versions like Exchange 2010, 2013, and 2016, which predated the 2021 breach, saw extended use beyond their mainstream support dates in resource-constrained environments, amplifying vulnerability exposure due to incomplete patching ecosystems compared to Microsoft's managed cloud infrastructure.[10] This historical reliance on self-managed servers underscored a trade-off: enhanced operational autonomy at the cost of uniform security enforcement, contributing to the broad attack surface exploited in subsequent incidents.[17]Perpetrators
Identification of HAFNIUM
On March 2, 2021, Microsoft publicly identified HAFNIUM as a state-sponsored threat actor responsible for exploiting multiple zero-day vulnerabilities in on-premises Microsoft Exchange Server software, marking the first attribution of the ongoing campaign that had begun earlier in the year.[1][18] The designation "HAFNIUM" was assigned by Microsoft's Threat Intelligence Center (MSTIC) based on observed tactics, techniques, and procedures (TTPs), including the chaining of four specific vulnerabilities—CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065—to enable remote code execution, data exfiltration, and persistence via web shells.[1][19] MSTIC assessed HAFNIUM with high confidence as operating out of Hainan province in China, characterizing it as a sophisticated group focused on acquiring intelligence and secrets rather than purely disruptive operations.[18][1] The initial detection of the exploits predated Microsoft's announcement, with cybersecurity firm Volexity identifying active in-the-wild attacks as early as January 6, 2021, during incident response for affected customers, and notifying Microsoft on February 2, 2021.[20][21] Volexity's analysis revealed attackers using the vulnerabilities to deploy web shells for email harvesting and network reconnaissance, prompting coordinated disclosure that informed Microsoft's emergency patches released the same day as their HAFNIUM attribution.[20][1] While Volexity did not initially name the actor, their telemetry aligned with Microsoft's later profiling of HAFNIUM's operations, which involved targeting a range of sectors such as professional services, telecommunications, and high-tech manufacturing across the United States, Europe, Japan, and Hong Kong.[1] HAFNIUM's identification relied on indicators of compromise (IOCs) shared by Microsoft, including specific IP addresses, domains, and web shell artifacts like the "China Chopper" variant, which facilitated post-exploitation activities.[1][7] Subsequent U.S. government assessments, including from the Cybersecurity and Infrastructure Security Agency (CISA), corroborated HAFNIUM's role in the initial limited and targeted attacks, distinguishing it from opportunistic copycat exploitation by other actors that surged after public disclosure.[5] Microsoft's attribution emphasized HAFNIUM's restraint in avoiding widespread disruption to maintain access for intelligence gathering, consistent with patterns observed in prior Chinese state-linked campaigns.[1][18]Attribution to Chinese State Actors
Microsoft identified the primary actor exploiting the zero-day vulnerabilities in on-premises Microsoft Exchange Servers as HAFNIUM, a group conducting operations from leased virtual private servers in the United States and Hong Kong, with assessments indicating nation-state capabilities and a China-based origin.[1] HAFNIUM's tactics, including the chaining of four vulnerabilities (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) to deploy web shells for persistent access, were described by Microsoft as targeted espionage rather than widespread disruption, with initial detections traced to attacks beginning in January 2021.[1] On July 19, 2021, the United States government, joined by allies including the United Kingdom, Canada, and the European Union, formally attributed the Exchange Server compromises to malicious cyber actors affiliated with China's Ministry of State Security (MSS), expressing high confidence based on shared infrastructure, tools, and techniques observed across multiple operations.[22] This attribution encompassed not only HAFNIUM's initial exploits but also subsequent mass exploitation by other actors, with U.S. agencies like the Cybersecurity and Infrastructure Security Agency (CISA) specifying PRC-affiliated actors as responsible for the activity detected since early 2021.[5] The joint statement highlighted the MSS's role in global cyber espionage, linking the breaches to broader patterns of targeting government, diplomatic, and critical sector entities for intelligence collection.[22] Attribution relied on forensic indicators such as IP addresses, malware signatures, and operational patterns matching known Chinese state-sponsored advanced persistent threats (APTs), including overlaps with groups like APT40, though HAFNIUM was tracked as a distinct entity with MSS ties.[1][23] Private sector analyses corroborated these links through code similarities in web shells and backdoors to prior Chinese operations, while public evidence included victim notifications and shared indicators of compromise (IOCs) released by Microsoft and CISA.[1][5] China denied involvement, claiming the accusations lacked evidence and attributing global cyber issues to U.S. actions, but no independent verification contradicted the allied assessments.[24] Subsequent U.S. indictments of Chinese nationals tied to MSS further reinforced patterns of state-directed hacking, though specific charges focused on related espionage rather than the Exchange incidents alone.[25]Exploitation Methods
Zero-Day Vulnerabilities Chained
The 2021 Microsoft Exchange Server data breach exploited a chain of four zero-day vulnerabilities, designated CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065, collectively referred to as ProxyLogon, to achieve unauthenticated remote code execution on unpatched on-premises servers running Exchange 2013, 2016, or 2019.[1][26] These flaws were actively targeted in limited attacks as early as January 2021, prior to Microsoft's disclosure and patching on March 2, 2021.[1][4] The chain initiated with CVE-2021-26855, a server-side request forgery (SSRF) vulnerability in the Exchange backend that permitted attackers to proxy arbitrary HTTP requests through the server, bypassing authentication and enabling access to internal resources or impersonation of the Exchange server itself by forging valid MAPI over HTTP requests.[1][4] This initial vector allowed unauthenticated retrieval of mailbox data, NTLM authentication hashes, or session tokens, setting the stage for deeper compromise without requiring valid user credentials.[26] Following SSRF exploitation, attackers chained CVE-2021-26857, an insecure deserialization vulnerability in the Unified Messaging service, to execute arbitrary code with SYSTEM privileges; this required the prior authentication bypass from CVE-2021-26855 to reach the vulnerable endpoint.[1][4] The deserialization flaw processed untrusted data in a manner that allowed remote code execution, effectively granting full server control once triggered.[26] To establish persistence, the chain incorporated CVE-2021-26858 and CVE-2021-27065, both post-authentication arbitrary file write vulnerabilities in the Exchange PowerShell module; these enabled writing malicious files, such as ASPX web shells, to any server path under SYSTEM permissions, facilitating ongoing access, data exfiltration, and deployment of additional tools like credential dumpers.[1][4] In practice, actors like HAFNIUM leveraged this full sequence to install lightweight web shells (e.g., China Chopper variants) via the file writes, which executed commands received over HTTP POST requests for reconnaissance and lateral movement.[26] This methodical chaining underscored the vulnerabilities' interdependence, where each built upon the prior for escalating impact from information disclosure to persistent foothold.[1]Deployment of Web Shells and Backdoors
Attackers exploited a chain of zero-day vulnerabilities—CVE-2021-26855 for server-side request forgery enabling unauthenticated access, CVE-2021-26857 for arbitrary code execution via insecure deserialization, and CVE-2021-26858 or CVE-2021-27065 for arbitrary file writes—to establish initial remote code execution on vulnerable Exchange servers.[1] Once code execution was achieved, typically through the w3wp.exe process handling Outlook Web App (OWA) requests, perpetrators wrote lightweight web shells directly to disk in web-accessible directories, granting persistent remote access without authentication.[1] [27] Common deployment locations includedC:\inetpub\wwwroot\aspnet_client\system_web\4_0_30319\, %PROGRAMFILES%\Microsoft\Exchange Server\V15\FrontEnd\HttpProxy\owa\auth\, and Offline Address Book (OAB) virtual directories modified via PowerShell cmdlets like Set-OabVirtualDirectory.[1] [27] Web shells, often ASPX files under 30 bytes, were named variants such as web.aspx, help.aspx, document.aspx, or obfuscated forms like Chack[Word][Country abbreviation].aspx, exploiting the file write primitives to place executable code in paths served by IIS.[1] [28] These shells, exemplified by the China Chopper variant, operated via HTTP POST requests with embedded commands, using split client-server logic and authentication keys (e.g., "NO9BxmCXw0JE" or "Ananas") to execute system commands, harvest credentials, or facilitate further payload delivery.[27]
Beyond initial web shells, actors established deeper persistence through backdoors like PowerShell remoting tools (e.g., Nishang's Invoke-PowerShellTcpOneLine or PowerCat) invoked via the shells, enabling lateral movement and credential dumping from LSASS using tools such as Procdump.[1] Some campaigns deployed batch scripts (e.g., xx.bat or test.bat) alongside shells for automated credential theft or scheduled tasks/WMI subscriptions for fileless execution, as observed in non-state actor follow-on attacks like Lemon Duck mining operations.[28] In total, security firms detected over 26,000 web shells across approximately 14,000 unique compromised servers by mid-March 2021, with clustered deployment timestamps indicating automated scanning and exploitation waves from late January onward.[29]
These mechanisms allowed attackers to maintain access for data exfiltration, such as mailbox exports via Exchange PowerShell snap-ins or compressed archives with 7-Zip, often compressing gigabytes of email content before outbound transfer.[1] Variants like DoejoCrypt or Pydomer extended functionality to ransomware or Cobalt Strike beacons, highlighting the web shells' role as a versatile pivot for espionage or commoditization.[28]
Immediate Impacts
Scale of Compromised Systems
The 2021 Microsoft Exchange Server data breach initially involved targeted exploitation by the Chinese state-sponsored group HAFNIUM, which Microsoft identified as using zero-day vulnerabilities against a limited number of on-premises Exchange servers starting as early as January 2021.[1] These early attacks focused on high-value targets, including organizations in the U.S., Europe, and Asia, but did not immediately scale to widespread compromise due to the covert nature of the intrusions.[1] Following Microsoft's public disclosure and patching of the vulnerabilities on March 2, 2021, opportunistic actors rapidly scanned and exploited unpatched servers globally, dramatically expanding the breach's scope. Cybersecurity analysis indicated that hundreds of thousands of servers were probed within hours of the announcement, with web shells and other indicators of compromise deployed on vulnerable systems.[30] By March 5, 2021, at least 30,000 U.S. organizations had been newly compromised, representing a subset of broader worldwide activity that included small businesses, governments, and other entities.[30] Estimates placed the total number of affected servers at approximately 250,000 globally by early March, though some analyses suggested up to 400,000 servers bore signs of exploitation or vulnerability exposure.[31][32] The disparity in figures reflects challenges in attribution, as initial HAFNIUM intrusions blended with secondary attacks by botnets like Lemon Duck and ransomware groups, complicating precise counts of unique victims.[28] As of March 12, 2021, Microsoft reported over 82,000 Exchange servers remained unpatched and exposed to the internet, underscoring the ongoing risk even after patches were available.[21] Affected systems spanned versions 2013, 2016, and 2019, predominantly on-premises installations, with victims concentrated in sectors reliant on self-hosted email infrastructure.[5]Types of Data Accessed and Stolen
The primary data accessed and stolen during the 2021 Microsoft Exchange Server breach consisted of email-related content from compromised on-premises servers, including messages, attachments, and associated metadata within user mailboxes.[1] Attackers exploited the chained zero-day vulnerabilities (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) to achieve remote code execution and arbitrary read privileges, enabling them to impersonate authenticated users and query mailbox data via legitimate Exchange Web Services (EWS) endpoints.[20] This allowed systematic enumeration of mailboxes and retrieval of contents without triggering overt alerts, as the operations mimicked normal API calls.[20] HAFNIUM, the state-sponsored group leading the initial targeted intrusions starting in January 2021, focused on exfiltrating this email data for intelligence gathering, often compressing the harvested mailbox files (using techniques like ZIP archiving) before outbound transmission to external servers.[7] Federal assessments confirmed that actors collected, compressed, and staged mailbox data for transfer, with exfiltration patterns indicating espionage rather than widespread destruction or monetization in HAFNIUM's operations.[7] Volexity's analysis of early compromises revealed attackers dumping entire mailboxes, including historical emails dating back years, to capture sensitive communications from organizations in sectors such as infectious disease research, law firms, higher education, defense contractors, and policy think tanks.[20] Following Microsoft's March 2, 2021 disclosure, opportunistic actors expanded exploitation, but the core data accessed remained email-centric, with some instances involving credential harvesting from mailbox configurations or Active Directory dumps enabled by server-side execution.[28] No verified reports indicated routine theft of non-email data, such as broader file shares or databases, as the vulnerabilities were confined to Exchange processes; however, persistent access via web shells occasionally led to lateral movement for additional reconnaissance.[28] The breach affected an estimated 250,000 servers globally, with email exfiltration volumes varying by victim but prioritizing high-value targets for HAFNIUM.[20]Organizational and User Responses
Microsoft's Patching Efforts
On March 2, 2021, Microsoft released out-of-band security updates for on-premises installations of Exchange Server 2010, 2013, 2016, and 2019 to address four zero-day vulnerabilities exploited by HAFNIUM, including CVE-2021-26855 (server-side request forgery), CVE-2021-26857 (post-authentication arbitrary file write), CVE-2021-26858 (post-authentication arbitrary file read), and CVE-2021-27065 (post-authentication arbitrary file deletion).[9][1] These updates were made available via the Microsoft Download Center and Windows Update, with Microsoft urging immediate application to all affected servers to block further exploitation.[33] To assist in detecting prior compromises, Microsoft published indicators of compromise (IOCs) derived from log analysis and released a PowerShell script on March 4, 2021, for scanning Exchange log files for signs of HAFNIUM activity, such as anomalous requests to endpoints like /autodiscover/autodiscover.json.[1] Additional mitigation guidance followed on March 5, 2021, recommending backend cookie validation and disabling specific application pools (e.g., ECP and OAB) as interim measures for unpatched systems.[34] On March 15, 2021, Microsoft introduced a one-click mitigation tool to automate patch installation and basic remediation steps, followed by updated investigation guidance on March 16, 2021, including enhanced tools for responders to identify webshells and backdoors. Microsoft integrated detection for the vulnerabilities into Microsoft Defender Antivirus and the Microsoft Safety Scanner (MSERT), updating signatures to identify related malware and webshells.[34] By March 22, 2021, Microsoft reported that approximately 92% of internet-facing, vulnerable on-premises Exchange servers had applied the patches or implemented mitigations, based on telemetry from exposed systems.[35] These efforts focused exclusively on on-premises deployments, as Exchange Online was unaffected due to its cloud-based architecture and proactive mitigations.[1]Victim Organization Remediation Challenges
Victim organizations encountered substantial hurdles in detecting and remediating compromises from the 2021 Microsoft Exchange Server exploits, as many systems had been breached weeks or months prior to Microsoft's March 2, 2021, patch release, necessitating forensic scans beyond simple patching.[1] Identifying indicators of compromise (IOCs) such as web shells (e.g., China Chopper variants) and anomalous log entries required analyzing Exchange IIS logs for specific patterns like requests to/owa/auth/ or encoded payloads, a process demanding specialized tools and expertise that smaller entities often lacked. Microsoft provided an Exchange On-Premises Mitigation Tool and IOC scanner to automate detection of persistence mechanisms, but running these across potentially thousands of servers strained IT resources, with incomplete scans risking missed artifacts like scheduled tasks or Cobalt Strike beacons deployed for lateral movement.[1]
Patching itself posed technical barriers, particularly for servers on outdated cumulative updates (CUs), as the zero-day fixes for Exchange 2013, 2016, and 2019 versions required first applying the latest CU, which could involve hours of downtime, compatibility testing, and rollback risks in production environments.[36] Organizations in hybrid setups—integrating on-premises Exchange with Microsoft 365—faced added complexity in isolating affected components without disrupting cloud synchronization or authentication flows, exacerbating remediation timelines amid ongoing exploitation by opportunistic actors post-disclosure.[5] For resource-constrained victims, such as small businesses comprising a significant portion of the estimated 250,000 globally compromised servers, outsourcing to incident response firms was often necessary but costly, with some opting to take servers offline entirely, halting email services for days or weeks.[30]
Cleanup extended beyond IOC removal to verifying data exfiltration scope and preventing re-exploitation, as attackers had accessed mailboxes for intelligence gathering, but reconstructing timelines via logs proved challenging due to potential tampering or high log volumes overwhelming standard tools.[8] The U.S. Department of Justice's April 2021 court-authorized operation to remotely delete web shells from over 20,000 unremediated U.S. servers underscored the scale of persistent vulnerabilities, as thousands of victims delayed or failed independent cleanup amid fears of incomplete eradication leading to ransomware or further espionage.[8] These efforts highlighted systemic issues in on-premises infrastructure maintenance, prompting recommendations for migration to cloud alternatives, though not all organizations could execute such shifts swiftly without operational disruption.[17]
