• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Exploit released for actively abused ProxyNotShell Exchange bug

Sergiu Gatlan by Sergiu Gatlan
November 18, 2022
Reading Time: 3 mins read
0
Exploit released for actively abused ProxyNotShell Exchange bug

Microsoft Exchange

RELATED POSTS

DISH slapped with multiple lawsuits after ransomware cyber attack

Twitter open-sources recommendation algorithm code

15 million public-facing services vulnerable to CISA KEV flaws

Proof-of-concept exploit code has been released online for two actively exploited and high-severity vulnerabilities in Microsoft Exchange, collectively known as ProxyNotShell.

Tracked as CVE-2022-41082 and CVE-2022-41040, the two bugs affect Microsoft Exchange Server 2013, 2016, and 2019 and allow attackers to escalate privileges to run PowerShell in the context of the system and gain arbitrary or remote code execution on compromised servers.

Microsoft released security updates to address the two security flaws as part of the November 2022 Patch Tuesday, even though ProxyNotShell attacks have been detected since at least September 2022.

One week after Microsoft released ProxyNotShell security updates, security researcher Janggggg released the proof-of-concept (PoC) exploit attackers have used in the wild to backdoor Exchange servers.

Will Dormann, a senior vulnerability analyst at ANALYGENCE, tested the exploit and confirmed that it’s working against systems running Exchange Server 2016 and 2019, and added that the code needs some tweaking to get it to work when targeting Exchange Server 2013).

Threat intelligence company GreyNoise has been tracking ProxyNotShell exploitation since late September and provides info on ProxyNotShell scanning activity and a list of IP addresses linked to these attacks.

Buy JNews
ADVERTISEMENT
ProxyNotShell vulnerabilty scans
ProxyNotShell vulnerability scans (GreyNoise)

Attackers have been chaining the two security flaws to deploy Chinese Chopper web shells on compromised servers for persistence and data theft, as well as for lateral movement in their victims’ networks since at least September 2022.

Redmond also confirmed they were actively abused in the wild on September 30, saying it was “aware of limited targeted attacks using the two vulnerabilities to get into users’ systems.”

“Because we are aware of active exploits of related vulnerabilities (limited targeted attacks), our recommendation is to install these updates immediately to be protected against these attacks,” the Exchange Team warned after patches were released. [emphasis ours]

“These vulnerabilities affect Exchange Server. Exchange Online customers are already protected from the vulnerabilities addressed in these SUs and do not need to take any action other than updating any Exchange servers in their environment.”

Security researchers at Vietnamese cybersecurity outfit GTSC, who first spotted and reported the attacks, said attackers have been chaining the two security flaws to deploy Chinese Chopper web shells on compromised servers.

Share55Tweet34Pin12
Sergiu Gatlan

Sergiu Gatlan

Related Posts

Dish Network confirms ransomware attack behind multi-day outage
Cyber Security

DISH slapped with multiple lawsuits after ransomware cyber attack

April 1, 2023
Twitter open-sources recommendation algorithm code
Cyber Security

Twitter open-sources recommendation algorithm code

March 31, 2023
Antivirus and EDR solutions tricked into acting as data wipers
Cyber Security

15 million public-facing services vulnerable to CISA KEV flaws

March 31, 2023
New GoTrim botnet brute forces WordPress site admin accounts
Cyber Security

Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs

March 31, 2023
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
Cyber Security

10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack

March 31, 2023
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
Cyber Security

10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack

March 31, 2023

Recommended Stories

Bitcoin soars as Silicon Valley Bank depositors get a regulatory lifeline

Bitcoin soars as Silicon Valley Bank depositors get a regulatory lifeline

March 13, 2023
Clop ransomware partners with TrueBot malware for access to networks

Hackers use CAPTCHA bypass to make 20K GitHub accounts in a month

January 5, 2023
Inside Chainlink’s [LINK] quest to fit into place amid market resurgence

Inside Chainlink’s [LINK] quest to fit into place amid market resurgence

March 18, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    136 shares
    Share 54 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Toncoin [TON] climbs into resistance zone, but momentum favored the bulls
  • The Sandbox [SAND] deserted by users? How NFTs and prices closed Q1
  • DISH slapped with multiple lawsuits after ransomware cyber attack

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?