- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
What Happened
A China-based Advanced Persistent Threat (APT) actor codenamed HAFNIUM is known to be actively targeting U.S. organizations across multiple industry sectors, according to Microsoft.
Yesterday, Microsoft released security updates designed to address several zero-day software vulnerabilities found in its on-premise Exchange product. Those include the following Microsoft Exchange Server Remote Code Execution Vulnerabilities:
Endpoint Detection and Response (EDR) vendor Huntress Labs reported observing numerous attackers implanting webshells following exploitation, as expected. A web shell is a malicious program or script installed on a hacked server.
Vulnerable organizations using on-premises Exchange servers are highly encouraged to consult the following Reddit chain for an updated list of observed webshell file locations – Mass Exploitation of On-Prem Exchange Servers.
Who’s Affected
MSFT indicated that the zero-day vulnerabilities are present in Microsoft Exchange Server 2013, 2016, and 2019. The aforementioned EDR vendor reported that Exchange Server 2010 is also vulnerable.
How to Mitigate
Microsoft recommends prioritizing installing updates on Exchange Servers that are externally facing. All affected Exchange Servers should ultimately be updated.
See the Microsoft Security Response Center’s article on Multiple Security Updates Released for Exchange Server for guidance on updating affected servers.
Why It’s Critical to Take Action
Two things tend to happen when zero-day exploits are publicly disclosed and patches are released:
- The originating actor accelerates exploitation operations in the interim to take advantage of the closing window of opportunity
- Third party actors reverse engineer the security update and develop weaponized versions of the exploits for public use
Blumira recommends all affected organizations download, test, and install the relevant updates immediately.
Finally, Blumira strongly recommends that clients install Sysmon on affected servers as an added precaution. Sysmon is a free EDR developed by Microsoft. Blumira offers an extensive library of pre-baked intrusion detection rules that take advantage of Sysmon. The free EDR is the perfect complement to antivirus software on any Windows endpoint.
Sysmon is extremely easy to install and deploy – see how to turn on advanced logging in three steps in How to Enable Sysmon for Windows Logging and Security.
Additional Resources
- Microsoft Security Blog: HAFNIUM targeting Exchange Servers with 0-day exploits
- Blumira Glossary: What is System Monitoring (Sysmon)?
- Blumira Security How-To: How to Enable Sysmon
- Blumira Integration: How to Integrate Microsoft Windows Server With Blumira
- Product Update: Blumira Security Detections for Sysmon
Mike Behrmann
Mike served at the National Security Agency for seven years where he focused on leading computer network exploitation operations and was later deployed to the FBI Detroit Division’s Cyber Task Force as a Threat Analyst. He joined NetWorks Group in 2015 where he and Matt Warner established the company’s Managed...
More from the blog
View All Posts
Security Trends and Info
3 min read
| April 7, 2020
SecOps Simplified, Part 1: SIEM…Now Without the Headache!
Read More
Security Trends and Info
6 min read
| June 22, 2020
SecOps Simplified, Part 4: Staffing – Haven’t I Seen This Movie Before?
Read More
Security Trends and Info
5 min read
| June 17, 2020
Cyber Warfare 1: BYOD, Social Influence & Auto Vehicles
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.