Microsoft Exchange Server attack hits local governments
- By Susan Miller
- Mar 08, 2021
The global Hafnium attack that is targeting email vulnerabilities in Microsoft’s Exchange Server is finding plenty of local government victims.
Microsoft announced the attack and released out-of-band security updates on March 2 to protect servers that had not yet been compromised by the zero-day vulnerabilities in its Exchange Servers' Outlook Web Access.
Exploiting the vulnerabilities, the threat actor Microsoft has named Hafnium has gained persistent system access not just to files and mailboxes on the server but also to credentials stored on that system, the Cybersecurity and Infrastructure Security Agency said in a March 3 alert. Even after systems have been patched, however, backdoors may have already been installed on email servers.
The attack is not known to have impacted Exchange Online or Microsoft 365 (formerly O365) cloud email services, CISA said.
Security expert Brian Krebs reported in his KrebsOnSecurity blog that the list of 30,000 victims in the U.S. includes a significant number of local governments.
“It’s police departments, hospitals, tons of city and state governments and credit unions,” one source who’s working closely with federal officials told KrebsOnSecurity. “Just about everyone who’s running self-hosted Outlook Web Access and wasn’t patched as of a few days ago got hit with a zero-day attack.”
Christopher Krebs, the former CISA director, tweeted March 5 that the attack would “disproportionately impact those that can least afford it (SMBs, Edu, States, locals).” Plus, he said, the “sheer scale & speed of this one is terrifying. It's trivial to exploit. Countdown to Ransomware?”
Steven Adair, president of Volexity, a company that spotted the attack in January, told KrebsOnSecurity he’s fielded dozens of calls from “state and local government agencies that have identified the backdoors in their Exchange servers and are pleading for help.”
Even when organizations learn they have been compromised, if they don’t remove the backdoor, they are leaving themselves open to more attacks. "A massive, massive number of organizations are getting that initial foothold," Adair told Wired. "It's a ticking time bomb that can be used against them at any point in time."
On a call with stakeholders impacted by Hafnium, another government cybersecurity expert told KrebsOnSecurity he’s concerned about remediation efforts.
“The cleanup effort required is going to be Herculean,” a government cybersecurity expert told KrebsOnSecurity. If the number of victims climbs into the tens of thousands, “there are just not enough incident response teams out there to do that quickly.”
To make matters worse, it seems that other bad actors started taking advantage of the vulnerability once Microsoft announced it.
“Four more groups have joined in, and the original Chinese hackers have dropped the pretense of stealth and increased the number of attacks they’re carrying out,” according to a report in MIT’s Technology Review.
Federal agencies, which often have vastly more depth to their cybersecurity defense, were required by CISA to immediately patch vulnerable systems or unplug them.
Meanwhile, Microsoft has released tools to help organizations identify whether they’ve been compromised and clean up their systems. Microsoft has released an updated script that scans Exchange log files for evidence of compromise, and some mitigation recommendations.
Susan Miller is executive editor at GCN.
Over a career spent in tech media, Miller has worked in editorial, print production and online, starting on the copy desk at IDG’s ComputerWorld, moving to print production for Federal Computer Week and later helping launch websites and email newsletter delivery for FCW. After a turn at Virginia’s Center for Innovative Technology, where she worked to promote technology-based economic development, she rejoined what was to become 1105 Media in 2004, eventually managing content and production for all the company's government-focused websites. Miller shifted back to editorial in 2012, when she began working with GCN.
Miller has a BA and MA from West Chester University and did Ph.D. work in English at the University of Delaware.
Connect with Susan at [email protected] or @sjaymiller.