• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Ransomware gang uses new Microsoft Exchange exploit to breach servers

Sergiu Gatlan by Sergiu Gatlan
December 20, 2022
Reading Time: 3 mins read
0
Exploit released for actively abused ProxyNotShell Exchange bug

Hacker

RELATED POSTS

Clop ransomware claims responsibility for MOVEit extortion attacks

Microsoft’s Outlook.com is down again on mobile, web

New tool scans iPhones for ‘Triangulation’ malware infection

Play ransomware threat actors are using a new exploit chain that bypasses ProxyNotShell URL rewrite mitigations to gain remote code execution (RCE) on vulnerable servers through Outlook Web Access (OWA).

Cybersecurity firm CrowdStrike spotted the exploit (dubbed OWASSRF) while investigating Play ransomware attacks where compromised Microsoft Exchange servers were used to infiltrate the victims’ networks.

To execute arbitrary commands on compromised servers, the ransomware operators leveraged Remote PowerShell to abuse the CVE-2022-41082, the same bug exploited by ProxyNotShell.

“In each case, CrowdStrike reviewed the relevant logs and determined there was no evidence of exploitation of CVE-2022-41040 for initial access,” the researchers said.

“Instead, it appeared that corresponding requests were made directly through the Outlook Web Application (OWA) endpoint, indicating a previously undisclosed exploit method for Exchange.”

While ProxyNotShell exploits target CVE-2022-41040, CrowdStrike found that the flaw abused by the newly discovered exploit is likely CVE-2022-41080, a security flaw Microsoft tagged as critical and not exploited in the wild that allows remote privilege escalation on Exchange servers.

Buy JNews
ADVERTISEMENT
OWASSRF PoC exploit
OWASSRF PoC exploit (BleepingComputer)

CVE-2022-41080 was discovered and reported by zcgonvh with 360 noah lab and rskvp93, Q5Ca, and nxhoang99 with VcsLab of Viettel Cyber Security.

One of the researchers who found the bug said that it can be exploited as part of a “chain to RCE Exchange on-premises, Exchange Online, Skype for Business Server (maybe SFB Online+Teams too but can’t find its powershell remote endpoint).”

At this time it is unclear whether the threat actors were abusing this Microsoft Exchange attack chain as a zero-day exploit before fixes were released.

OWASSRF PoC exploit leaked online

While CrowdStrike security researchers were working on developing their own proof-of-concept (PoC) code to match the log info found while investigating these recent Play ransomware attacks, Huntress Labs threat researcher Dray Agha found and leaked a threat actor’s tooling online, on December 14th.

The leaked tooling contained a PoC for Play’s Exchange exploit, which allowed CrowdStrike to replicate the malicious activity logged in Play ransomware’s attacks.

CrowdStrike believes that the proof-of-concept exploit was used to drop remote access tools such as Plink and AnyDesk on compromised servers.

BleepingComputer also found that the tooling leaked by Agha contained the ConnectWise remote administration software, which was likely deployed in attacks as well.

Organizations with on-premises Microsoft Exchange servers on their network are advised to apply the latest Exchange security updates (with November 2022 being the minimum patch level) or disable OWA until the CVE-2022-41080 patch can be applied.

The Play ransomware operation launched in June 2022, when the first victims began reaching out for help to deal with the attacks’ fallout in the BleepingComputer forums.

Since its launch in June, dozens of Play ransomware victims have uploaded samples or ransom notes to the ID Ransomware platform to identify what ransomware was used to encrypt their data.

Play ransomware activity
Play ransomware activity (ID Ransomware)

Unlike most ransomware operations, Play affiliates drop simple ransom notes with the word PLAY and a contact email address.

Currently, there is no data leak linked to this ransomware or any indication that any data is stolen during attacks.

Recent victims hit by Play ransomware affiliates include the German H-Hotels hotel chain, the Belgium city of Antwerp, and Argentina’s Judiciary of Córdoba.

Share54Tweet34Pin12
Sergiu Gatlan

Sergiu Gatlan

Related Posts

Hackers exploit Control Web Panel flaw to open reverse shells
Cyber Security

Clop ransomware claims responsibility for MOVEit extortion attacks

June 5, 2023
Outlook for Mac now free, Microsoft 365 subscription not needed
Cyber Security

Microsoft’s Outlook.com is down again on mobile, web

June 5, 2023
New tool scans iPhones for ‘Triangulation’ malware infection
Cyber Security

New tool scans iPhones for ‘Triangulation’ malware infection

June 5, 2023
New AhRat Android malware hidden in app with 50,000 installs
Cyber Security

SpinOk Android malware found in more apps with 30 million installs

June 5, 2023
GIGABYTE releases new firmware to fix recently disclosed security flaws
Cyber Security

GIGABYTE releases new firmware to fix recently disclosed security flaws

June 5, 2023
Researchers secretly helped decrypt Zeppelin ransomware for 2 years
Cyber Security

KeePass v2.54 fixes bug that leaked cleartext master password

June 5, 2023

Recommended Stories

As SOL breaks through key resistance level, this is what investors can expect

As SOL breaks through key resistance level, this is what investors can expect

April 12, 2023
What’s behind Polkadot’s [DOT] rising development activity? Looking into…

What’s behind Polkadot’s [DOT] rising development activity? Looking into…

March 20, 2023
Uniswap community gives go-ahead for Polygon zkEVM-V3 integration

Uniswap community gives go-ahead for Polygon zkEVM-V3 integration

April 15, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Litecoin’s upcoming halving and its effect on miners
  • Uniswap: What’s next as UNI’s plunge hits range low
  • Polygon zkEVM’s growth unhindered: What it means for MATIC

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?