Ten Hacking Groups Exploiting Microsoft Email Flaw, Warns ESET

The wide ranging impact from the Microsoft Exchange zero-day flaws continue to be felt with a fresh warning from security researchers.

ESET in a blog post warned that at least 10 different hacking groups are exploiting the recent Microsoft Exchange vulnerabilities.

It comes after the US government said it was “concerned” over the potentially large number of organisations affected by the zero-day flaws.

Exchange flaws

The administration’s comments was the latest indication of the significance of the Exchange bugs, for which Microsoft issued emergency patches last Tuesday.

Microsoft said a Chinese state-backed hacking group called Hafnium was behind the hacks, which began in early January.

Redmond said Hafnium used the flaws to gain access to Exchange servers undetected in order to steal information from infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and non-governmental groups.

But now ESET has warned that the number of hacking groups exploiting the vulnerabilities is believed to be in double-figures.

And to give an idea of how widespread the vulnerability is being exploited, ESET said that it had identified more than 5,000 global email servers – belonging to businesses and governments alike – that have been affected by related malicious activity.

Earlier on Wednesday Reuters reported that Norway’s parliament had announced data had been “extracted” in a breach linked to the Microsoft flaws.

Germany’s cybersecurity watchdog agency also said on Wednesday two federal authorities had been affected by the hack, although it declined to identify them.

Prior knowledge

“We have already detected webshells on more than 5,000 email servers as of the time of writing, and according to public sources, several important organisations, such as the European Banking Authority, suffered from this attack,” blogged ESET.

And ESET warned that several of the hacking groups appeared to know about the vulnerability before it was announced by Microsoft on 2 March.

“Our ongoing research shows that not only Hafnium has been using the recent RCE vulnerability in Exchange, but that multiple APTs have access to the exploit, and some even did so prior to the patch release,” it added. “It is still unclear how the distribution of the exploit happened, but it is inevitable that more and more threat actors, including ransomware operators, will have access to it sooner or later.”

The advice for system admins is to apply the Microsoft patches as soon as possible to mitigate the risk.

Tom Jowitt

Tom Jowitt is a leading British tech freelancer and long standing contributor to Silicon UK. He is also a bit of a Lord of the Rings nut...

Recent Posts

Italy, White House Condemn ‘Discriminatory’ Tech Taxes

Italy, White House issue joint statement condemning 'discriminatory' tech taxes as US seeks to end…

20 hours ago

Italian Newspaper Hails ‘Success’ With AI-Generated Supplement

Italian newspaper Il Foglio says four-page AI-generated supplement published every day for a month shows…

20 hours ago

Huawei Updates Smart Glasses With Live Translation

Huawei launches Titanium edition of Eyewear 2 smart glasses with gesture controls and AI-powered simultaneous…

21 hours ago

Head Of Chinese Chip Tools Company Drops US Citizenship

Gerald Yin, founder, chairman and chief executive of key Chinese chip tools maker AMEC, drops…

21 hours ago

Intel Tells Chinese Clients Some AI Chips To Require Licence

Intel reportedly tells clients in China some of its AI chips will now require export…

22 hours ago

Intel Chief Flattens Leadership Structure

New Intel chief executive Lip-Bu Tan flattens company's leadership structure as he seeks to end…

22 hours ago