• Latest
  • Trending
Hackers Exploit ProxyLogon and ProxyShell Bugs

Hackers Exploit ProxyLogon and ProxyShell Bugs

December 29, 2021
Lenovo’s 16-inch ThinkPad claims desktop-like performance with 55 W Intel CPU

Lenovo’s 16-inch ThinkPad claims desktop-like performance with 55 W Intel CPU

May 18, 2022
Testing shows AMD’s FSR 2.0 can even help lowly Intel integrated GPUs

Testing shows AMD’s FSR 2.0 can even help lowly Intel integrated GPUs

May 18, 2022
Tesla announces the date for its second AI day

Tesla announces the date for its second AI day

May 18, 2022
AMD and Qualcomm to Optimize FastConnect Connectivity for AMD Ryzen Processors

AMD and Qualcomm to Optimize FastConnect Connectivity for AMD Ryzen Processors

May 18, 2022
Ericsson to Take Part at GSMA’s Mobile 360 Convention in Riyadh

Ericsson to Take Part at GSMA’s Mobile 360 Convention in Riyadh

May 18, 2022
InterSAT and SES renew partnership to accelerate digital inclusion across Africa

InterSAT and SES renew partnership to accelerate digital inclusion across Africa

May 18, 2022
Applications open for Google Black Founders Fund Africa

Applications open for Google Black Founders Fund Africa

May 18, 2022
Hackers nail Zambia’s Central Bank

Hackers nail Zambia’s Central Bank

May 18, 2022
Western Digital UltraStar DC SN650 NVMe SSDs Announced

Western Digital UltraStar DC SN650 NVMe SSDs Announced

May 18, 2022
OWC Announces Envoy Pro mini Pocket-Sized USB-C and USB-A SSD

OWC Announces Envoy Pro mini Pocket-Sized USB-C and USB-A SSD

May 18, 2022
Transcend Grade 112-Layer 3D NAND SSDs With DRAM Cache

Transcend Grade 112-Layer 3D NAND SSDs With DRAM Cache

May 18, 2022
VMware Certification for Pavilion NVMe-oF Flash Array

VMware Certification for Pavilion NVMe-oF Flash Array

May 18, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Thursday, 19 May, 2022
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Hackers Exploit ProxyLogon and ProxyShell Bugs

by ITECHNEWS
December 29, 2021
in Infosec, Leading Stories
0 0
0
Hackers Exploit ProxyLogon and ProxyShell Bugs

Security researchers have warned attackers are abusing months-old Microsoft Exchange Server flaws to send convincing malware-laden phishing emails within organizations.

A team at Trend Micro spotted the campaign, which exploits the ProxyLogon and ProxyShell vulnerabilities patched by Microsoft in March and May respectively.

YOU MAY ALSO LIKE

Lenovo’s 16-inch ThinkPad claims desktop-like performance with 55 W Intel CPU

Testing shows AMD’s FSR 2.0 can even help lowly Intel integrated GPUs

By doing so, attackers are able to compromise a victim organization’s on-premises Exchange server, and then send phishing emails to other inboxes in the same organization — disguised as legitimate replies to existing email threads.

As real account names from the victim’s domain are used, there’s more chance these emails will be opened by the recipients.

“Delivering the malicious spam using this technique to reach all the internal domain users will decrease the possibility of detecting or stopping the attack, as the mail getaways will not be able to filter or quarantine any of these internal emails,” Trend Micro explained.

“The attacker also did not drop or use tools for lateral movement after gaining access to the vulnerable Exchange servers, so that no suspicious network activities will be detected. Additionally, no malware was executed on the Exchange servers that will trigger any alerts before the malicious email is spread across the environment.”

The phishing emails in question use attached Excel and Word files featuring malicious macros. These execute a malicious script and download a DLL loader which connects to a C&C server associated with the Squirrelwaffle loader. The final payload is either Cobalt Strike or the Qbot backdoor, according to the report.

Organizations were urged to patch the ProxyLogon and ProxyShell bugs, and use endpoint detection and response (EDR) solutions to detect any suspicious behavior on their servers.

Trend Micro also trumpeted virtual patching technology, which protects vulnerable systems from known and unknown threats until security teams have a chance to apply official updates.

Source: Phil Muncaster UK / EMEA News Reporter
Via: Infosecurity Magazine
Tags: exploithackersProxyLogonProxyShellvulnerabilities
ShareTweetShare

Get real time update about this post categories directly on your device, subscribe now.

Unsubscribe

Search

No Result
View All Result

Recent News

Lenovo’s 16-inch ThinkPad claims desktop-like performance with 55 W Intel CPU

Lenovo’s 16-inch ThinkPad claims desktop-like performance with 55 W Intel CPU

May 18, 2022
Testing shows AMD’s FSR 2.0 can even help lowly Intel integrated GPUs

Testing shows AMD’s FSR 2.0 can even help lowly Intel integrated GPUs

May 18, 2022
Tesla announces the date for its second AI day

Tesla announces the date for its second AI day

May 18, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Lenovo’s 16-inch ThinkPad claims desktop-like performance with 55 W Intel CPU

Lenovo’s 16-inch ThinkPad claims desktop-like performance with 55 W Intel CPU

May 18, 2022
Testing shows AMD’s FSR 2.0 can even help lowly Intel integrated GPUs

Testing shows AMD’s FSR 2.0 can even help lowly Intel integrated GPUs

May 18, 2022

Recent News

  • Lenovo’s 16-inch ThinkPad claims desktop-like performance with 55 W Intel CPU May 18, 2022
  • Testing shows AMD’s FSR 2.0 can even help lowly Intel integrated GPUs May 18, 2022
  • Tesla announces the date for its second AI day May 18, 2022
  • AMD and Qualcomm to Optimize FastConnect Connectivity for AMD Ryzen Processors May 18, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021 iTechNewsOnline.Com - Powered by BackUpDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021 iTechNewsOnline.Com - Powered by BackUpDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Go to mobile version