• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
79% of observed microsoft exchange server exposures occurred in the

79% of observed Microsoft Exchange Server exposures occurred in the cloud

You are here: Home / General Cyber Security News / 79% of observed Microsoft Exchange Server exposures occurred in the cloud
May 21, 2021

A signage of Microsoft is found in New York Town. (Image by Jeenah Moon/Getty Photographs)

Scientists this week noted that when researching vulnerable Microsoft Trade servers. some 79% of noticed exposures took place in the cloud.

A web site publish by the Cortex Expanse investigation staff from Palo Alto Networks also said most of the adversary scans they observed between January and March began 15 to 60 minutes subsequent disclosure as a result of the Common Vulnerabilities and Exposures (CVEs) listing. But the researchers stated on March 2, menace actors started out scanning for susceptible Exchange Server units within just just five minutes of Microsoft’s disclosure of a number of zero-days.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“The cloud is inherently related to the internet and it is shockingly effortless for new publicly available cloud deployments to spin up exterior of standard IT procedures, which implies they often use inadequate default security options and could even be neglected,” the researchers reported.

The significant amount of impacted Exchange Servers becoming cloud deployed did not surprise, Jeff Barker, vice president of item administration at Illusive. Barker said the forensic analysis of the Exchange attack by Hafnium showed the attacker made use of Procdump to dump Community Security Authority Subsystem Provider (LSASS) memory to then use Mimikatz to get qualifications.

“This presents adequate evidence that write-up-exploitation ways consist of lateral movement to other components of the surroundings,” Barker said. “Consequently, corporations require to be involved about ongoing risk to the two cloud and on-premise environments.”

Tyler Shields, main marketing and advertising officer at JupiterOne, stated traditional configuration administration database (CMDB) systems have not created the leap to cloud indigenous and can’t appropriately collect and consistently detect modifications in those people infrastructure scenarios. Moreover, the speed at which businesses have moved to the cloud has manufactured the development of cloud-indigenous belongings explode.

“If you don’t have a very good grasp of your cyber-asset infrastructure, and how individuals infrastructure components all inter-relate to each other, it’s likely to be impossible to safe that surroundings,” Shields mentioned. “This is evidenced by the research performed at Expanse.”


Some pieces of this post are sourced from:
www.scmagazine.com

Previous Post: «building siem for today’s threat landscape Building SIEM for Today’s Threat Landscape
Next Post: Air India Hack Exposes Credit Card and Passport Info of 4.5 Million Passengers air india hack exposes credit card and passport info of»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.