{"id":6113,"date":"2021-03-11T19:34:32","date_gmt":"2021-03-12T03:34:32","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6113"},"modified":"2023-10-12T11:23:40","modified_gmt":"2023-10-12T18:23:40","slug":"hafnium-targeting-exchange-servers-with-zero-day-exploit","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/","title":{"rendered":"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Early in March, Microsoft released a set of <\/span><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-march-2021-exchange-server-security-updates\/ba-p\/2175901\"><span style=\"font-weight: 400;\">Exchange Server Security Updates<\/span><\/a><span style=\"font-weight: 400;\"> for various versions of Exchange servers. These updates were in response to published Microsoft Common Vulnerabilities and Exposure (CVE), the first of which allows threat groups to authenticate to the Exchange server. Once authenticated, the rest of the vulnerabilities allowed the threat actor to gain complete control and remotely execute commands on the exploited Microsoft Exchange servers anywhere in the world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft\u2019s blog<sup>1<\/sup><\/span><span style=\"font-weight: 400;\"> entitled, \u201cHAFNIUM targeting Exchange Servers with 0-day Exploits\u201d <\/span><span style=\"font-weight: 400;\">notes that Microsoft <\/span><span style=\"font-weight: 400;\">had detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server. The threat actor used these vulnerabilities to access on-premises Exchange servers, which enabled access to email accounts and allowed installation of additional malware to facilitate long-term access to victim environments. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to <\/span><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2021\/03\/02\/new-nation-state-cyberattacks\/\"><span style=\"font-weight: 400;\">HAFNIUM<\/span><\/a><span style=\"font-weight: 400;\">, a group assessed to be state-sponsored and operating out of China, based on observed victimology, tactics, and procedures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many thousands of organizations within the United States have already been breached by the HAFNIUM threat actor group. HAFNIUM is alleged to work from within China and seems to focus on stealing information on infectious disease research, defense contractors, policy think tanks, and more. It may be the case that the HAFNIUM threat actors and others control many thousands, if not \u201chundreds of thousands\u201d of Microsoft Exchange Servers worldwide.<sup>2<\/sup><\/span><span style=\"font-weight: 400;\"> The press has reported different estimates as to the current number of victims. This past Friday, the Wall Street Journal cited a source<sup>3<\/sup><\/span><span style=\"font-weight: 400;\"> that said the number of victims of the attack could be 250,000 or more.<\/span><\/p>\n<h3><i><span style=\"font-weight: 400;\">A RAPIDLY ESCALATING THREAT<\/span><\/i><\/h3>\n<p><span style=\"font-weight: 400;\">Beyond the danger presented by the HAFNIUM threat actor group, it is also believed that at least four other threat actor groups<sup>4<\/sup><\/span><span style=\"font-weight: 400;\"> are also exploiting the Exchange server vulnerabilities. While HAFNIUM has been using the flaws in the Exchange server to steal email from organizations which they targeted, now that the vulnerabilities are public and well understood, many other threat actor organizations are moving rapidly to exploit them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In further rapid response, the Cybersecurity &amp; Infrastructure Security Agency (CISA) issued Alert AA21-062A<sup>5<\/sup><\/span><span style=\"font-weight: 400;\"> on \u201cMitigate Microsoft Exchange Server Vulnerabilities.\u201d CISA noted within the alert that \u201cthe successful exploitation of these vulnerabilities allows an unauthenticated attacker to execute arbitrary code on vulnerable Exchange Servers, enabling the attacker to gain persistent system access, as well as access to files and mailboxes on the server and to credentials stored on that system. Successful exploitation may additionally enable the attacker to compromise trust and identity in a vulnerable network.\u201d\u00a0<\/span><\/p>\n<h3><i><span style=\"font-weight: 400;\">REVIEW OF THE MICROSOFT CVEs<\/span><\/i><\/h3>\n<p><span style=\"font-weight: 400;\">Per Microsoft, these vulnerabilities are part of an attack chain. The initial attack requires the ability to make an untrusted connection to Exchange server port 443. This can be protected against by restricting untrusted connections, or by setting up a VPN to separate the Exchange server from external access. Using this mitigation will only protect against the initial portion of the attack. Other portions of the chain can be triggered if an attacker already has access or can convince an administrator to open a malicious file. <\/span><span style=\"font-weight: 400;\">The specific CVE\u2019s to note follow below:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-26855\"><span style=\"font-weight: 400;\">CVE-2021-26855<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-26857\"><span style=\"font-weight: 400;\">CVE-2021-26857<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-26858\"><span style=\"font-weight: 400;\">CVE-2021-26858<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-27065\"><span style=\"font-weight: 400;\">CVE-2021-27065<\/span><\/a><\/li>\n<\/ul>\n<h3><i><span style=\"font-weight: 400;\">DNS Specific CVEs<\/span><\/i><\/h3>\n<p><span style=\"font-weight: 400;\">In addition to the above CVEs, Microsoft released a set of seven DNS vulnerabilities on March 9th. Five of them were RCE vulnerabilities and two were DoS vulnerabilities.\u00a0 The RCE vulnerabilities had critical CVSS scores of 9.8, allowing a bad actor to compromise a Primary Authoritative DNS server with no authentication or user interaction, and execute code on the target.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">RCE:<\/span><\/p>\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26897\"><span style=\"font-weight: 400;\">CVE-2021-26897<\/span><\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26895\"><span style=\"font-weight: 400;\">CVE-2021-26895<\/span><\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26894\"><span style=\"font-weight: 400;\">CVE-2021-26894<\/span><\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26893\"><span style=\"font-weight: 400;\">CVE-2021-26893<\/span><\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-26877\"><span style=\"font-weight: 400;\">CVE-2021-26877<\/span><\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">DoS:<\/span><\/p>\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-27063\"><span style=\"font-weight: 400;\">CVE-2021-27063<\/span><\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26896\"><span style=\"font-weight: 400;\">CVE-2021-26896<\/span><\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">All seven DNS vulnerabilities are within the Dynamic Update DNS transaction feature of Windows DNS software.\u00a0<\/span><\/p>\n<h3><i><span style=\"font-weight: 400;\">Best Practices for Mitigation<\/span><\/i><\/h3>\n<p><span style=\"font-weight: 400;\">Immediate mitigation for these vulnerabilities is obviously patching. In addition to patching,\u00a0 following security best practices such as password rotation, account audits and staying on top of emergency advisories is always a best practice.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While these could be effective, a more proactive approach involves:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Leveraging dedicated DNS\/DHCP\/IPAM servers that don\u2019t run other services<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Using threat intelligence on DNS servers to act as a first line of defense for attacks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Using resilient DNS servers that have in-built protection against DNS Denial of Service attacks.\u00a0<\/span><\/li>\n<\/ul>\n<h3><i><span style=\"font-weight: 400;\">Role of\u00a0 DNS Specific Threat Intelligence in Protection\u00a0<\/span><\/i><\/h3>\n<p><span style=\"font-weight: 400;\">DNS is often a common denominator used to set-up and execute attack chains across the majority of cyberattacks. DNS is often used when an infected system communicates surreptitiously with the threat actors through command and control (C&amp;C) servers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Threat intelligence can provide tremendously useful data that can help your DNS servers detect and block command and control (C&amp;C) communications to known malicious or high-risk destinations. This may include malicious hostnames, domains, IP addresses and more. DNS security also can use advanced techniques such as behavioral analytics and machine learning on real-time DNS queries, to rapidly detect and stop zero-day DNS tunneling, DGA, data exfiltration, Fast Flux, lookalike domains, and much more.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In terms of visibility, DDI data provides valuable information about device activity, type of device, location in the network, who it is assigned to, lease history, and more. This information visibility helps gain detailed insight into ongoing attacks so they can be rapidly shut down.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Taking this a step further, the integration of IPAM data with SIEM and SOAR infrastructure can provide reductions in time for the detection of threats and the automation of incident response. This reduction in time to detect and then remediate can be the essential difference between a disastrous breach and a security event which is resolved on a routine basis.<\/span><\/p>\n<h3><i><span style=\"font-weight: 400;\">BloxOne Threat Defense and Advanced DNS Protection for Improving Security Posture<\/span><\/i><\/h3>\n<p><span style=\"font-weight: 400;\">At Infoblox, we realized that just serving up DNS is not enough. This critical infrastructure that everyone already relies on for connectivity should be used to improve an organization\u2019s security posture. <\/span><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\">BloxOne Threat Defense<\/span><\/a><span style=\"font-weight: 400;\"> uses the power of behavior analytics combined with high quality threat intelligence \u00a0 to detect and block phishing, exploits, ransomware, and other malware, and also protect the modern workforce, including remote workers, from accessing objectionable or dangerous content.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, our DNS servers have <\/span><a href=\"https:\/\/www.infoblox.com\/products\/advanced-dns-protection\/\"><span style=\"font-weight: 400;\">Advanced DNS Protection<\/span><\/a><span style=\"font-weight: 400;\"> installed that provide in-built protection against the widest range of DNS DDoS attack vectors based on regularly updated ruleset.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Learn more about DNS security here:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\">https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Learn more about preventing DNS-based data exfiltration &#8211; check out this solution note:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-solution-note-preventing-dns-based-data-exfiltration.pdf\"><span style=\"font-weight: 400;\">https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-solution-note-preventing-dns-based-data-exfiltration.pdf<\/span><\/a><span style=\"font-weight: 400;\"> \u00a0<\/span><\/li>\n<\/ul>\n<h3><i><span style=\"font-weight: 400;\">Other Resources on HAFNIUM<\/span><\/i><\/h3>\n<p><span style=\"font-weight: 400;\">Other useful resources to better understand the vulnerabilities and the HAFNIUM threat actor activities include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Microsoft Advisory: <\/span><a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/02\/multiple-security-updates-released-for-exchange-server\/\"><span style=\"font-weight: 400;\">https:\/\/msrc-blog.microsoft.com\/2021\/03\/02\/multiple-security-updates-released-for-exchange-server\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Microsoft Security Blog &#8211; Hafnium targeting Exchange Servers: <\/span><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/\"><span style=\"font-weight: 400;\">https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Microsoft\u2019s blog on Exchange Server Vulnerabilities Mitigations: <\/span><a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/03\/05\/microsoft-exchange-server-vulnerabilities-mitigations-march-2021\/\"><span style=\"font-weight: 400;\">https:\/\/msrc-blog.microsoft.com\/2021\/03\/05\/microsoft-exchange-server-vulnerabilities-mitigations-march-2021<\/span><\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If you want to know more about our products and services, please reach out to us directly via <\/span><a href=\"https:\/\/info.infoblox.com\/contact-form\" target=\"_blank\" rel=\"noopener\">https:\/\/info.infoblox.com\/contact-form<\/a>.<\/p>\n<h3>Endnotes<\/h3>\n<p><sup>1<\/sup><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/\">https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/<\/a><\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/www.securitymagazine.com\/articles\/94781-000-us-organizations-breached-by-cyber-espionage-group-hafnium\">https:\/\/www.securitymagazine.com\/articles\/94781-000-us-organizations-breached-by-cyber-espionage-group-hafnium<\/a><\/p>\n<p><sup>3<\/sup><a href=\"https:\/\/www.wsj.com\/articles\/china-linked-hack-hits-tens-of-thousands-of-u-s-microsoft-customers-11615007991\">https:\/\/www.wsj.com\/articles\/china-linked-hack-hits-tens-of-thousands-of-u-s-microsoft-customers-11615007991<\/a><\/p>\n<p><sup>4<\/sup><a href=\"https:\/\/www.technologyreview.com\/2021\/03\/06\/1020442\/four-new-hacking-groups-microsoft-email-servers\/\">https:\/\/www.technologyreview.com\/2021\/03\/06\/1020442\/four-new-hacking-groups-microsoft-email-servers\/<\/a><\/p>\n<p><sup>5<\/sup><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-062a\">https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-062a<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Early in March, Microsoft released a set of Exchange Server Security Updates for various versions of Exchange servers. These updates were in response to published Microsoft Common Vulnerabilities and Exposure (CVE), the first of which allows threat groups to authenticate to the Exchange server. Once authenticated, the rest of the vulnerabilities allowed the threat actor [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":6114,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[454,455,456],"class_list":{"0":"post-6113","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-hafnium","9":"tag-zero-day-exploit","10":"tag-cve","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>HAFNIUM Targeting Exchange Servers with Zero-Day Exploit<\/title>\n<meta name=\"description\" content=\"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit. Early in March, Microsoft released a set of Exchange Server Security Updates for various versions of Exchange servers. These updates were in response to published Microsoft Common Vulnerabilities and Exposure (CVE), the first of which allows threat groups to authenticate to the Exchange server. Once authenticated, the rest of the vulnerabilities allowed the threat actor to gain complete control and remotely execute commands on the exploited Microsoft Exchange servers anywhere in the world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit\" \/>\n<meta property=\"og:description\" content=\"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit. Early in March, Microsoft released a set of Exchange Server Security Updates for various versions of Exchange servers. These updates were in response to published Microsoft Common Vulnerabilities and Exposure (CVE), the first of which allows threat groups to authenticate to the Exchange server. Once authenticated, the rest of the vulnerabilities allowed the threat actor to gain complete control and remotely execute commands on the exploited Microsoft Exchange servers anywhere in the world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-12T03:34:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-12T18:23:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Hafnium.png\" \/>\n\t<meta property=\"og:image:width\" content=\"264\" \/>\n\t<meta property=\"og:image:height\" content=\"215\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hafnium-targeting-exchange-servers-with-zero-day-exploit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hafnium-targeting-exchange-servers-with-zero-day-exploit\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit\",\"datePublished\":\"2021-03-12T03:34:32+00:00\",\"dateModified\":\"2023-10-12T18:23:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hafnium-targeting-exchange-servers-with-zero-day-exploit\\\/\"},\"wordCount\":1210,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hafnium-targeting-exchange-servers-with-zero-day-exploit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Hafnium.png\",\"keywords\":[\"HAFNIUM\",\"Zero-Day Exploit\",\"CVE\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hafnium-targeting-exchange-servers-with-zero-day-exploit\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hafnium-targeting-exchange-servers-with-zero-day-exploit\\\/\",\"name\":\"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hafnium-targeting-exchange-servers-with-zero-day-exploit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hafnium-targeting-exchange-servers-with-zero-day-exploit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Hafnium.png\",\"datePublished\":\"2021-03-12T03:34:32+00:00\",\"dateModified\":\"2023-10-12T18:23:40+00:00\",\"description\":\"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit. Early in March, Microsoft released a set of Exchange Server Security Updates for various versions of Exchange servers. These updates were in response to published Microsoft Common Vulnerabilities and Exposure (CVE), the first of which allows threat groups to authenticate to the Exchange server. Once authenticated, the rest of the vulnerabilities allowed the threat actor to gain complete control and remotely execute commands on the exploited Microsoft Exchange servers anywhere in the world.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hafnium-targeting-exchange-servers-with-zero-day-exploit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hafnium-targeting-exchange-servers-with-zero-day-exploit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hafnium-targeting-exchange-servers-with-zero-day-exploit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Hafnium.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Hafnium.png\",\"width\":264,\"height\":215},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/hafnium-targeting-exchange-servers-with-zero-day-exploit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit","description":"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit. Early in March, Microsoft released a set of Exchange Server Security Updates for various versions of Exchange servers. These updates were in response to published Microsoft Common Vulnerabilities and Exposure (CVE), the first of which allows threat groups to authenticate to the Exchange server. Once authenticated, the rest of the vulnerabilities allowed the threat actor to gain complete control and remotely execute commands on the exploited Microsoft Exchange servers anywhere in the world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/","og_locale":"en_US","og_type":"article","og_title":"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit","og_description":"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit. Early in March, Microsoft released a set of Exchange Server Security Updates for various versions of Exchange servers. These updates were in response to published Microsoft Common Vulnerabilities and Exposure (CVE), the first of which allows threat groups to authenticate to the Exchange server. Once authenticated, the rest of the vulnerabilities allowed the threat actor to gain complete control and remotely execute commands on the exploited Microsoft Exchange servers anywhere in the world.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/","og_site_name":"Infoblox Blog","article_published_time":"2021-03-12T03:34:32+00:00","article_modified_time":"2023-10-12T18:23:40+00:00","og_image":[{"width":264,"height":215,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Hafnium.png","type":"image\/png"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit","datePublished":"2021-03-12T03:34:32+00:00","dateModified":"2023-10-12T18:23:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/"},"wordCount":1210,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Hafnium.png","keywords":["HAFNIUM","Zero-Day Exploit","CVE"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/","url":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/","name":"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Hafnium.png","datePublished":"2021-03-12T03:34:32+00:00","dateModified":"2023-10-12T18:23:40+00:00","description":"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit. Early in March, Microsoft released a set of Exchange Server Security Updates for various versions of Exchange servers. These updates were in response to published Microsoft Common Vulnerabilities and Exposure (CVE), the first of which allows threat groups to authenticate to the Exchange server. Once authenticated, the rest of the vulnerabilities allowed the threat actor to gain complete control and remotely execute commands on the exploited Microsoft Exchange servers anywhere in the world.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Hafnium.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Hafnium.png","width":264,"height":215},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/hafnium-targeting-exchange-servers-with-zero-day-exploit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"HAFNIUM Targeting Exchange Servers with Zero-Day Exploit"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6113"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6113\/revisions"}],"predecessor-version":[{"id":8988,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6113\/revisions\/8988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6114"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}