{"id":92999,"date":"2021-03-02T13:07:53","date_gmt":"2021-03-02T21:07:53","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=92999"},"modified":"2023-09-14T13:21:10","modified_gmt":"2023-09-14T20:21:10","slug":"hafnium-targeting-exchange-servers","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/03\/02\/hafnium-targeting-exchange-servers\/","title":{"rendered":"HAFNIUM targeting Exchange Servers with 0-day exploits"},"content":{"rendered":"
Update [03\/16\/2021]<\/strong>: Microsoft released updated tools and investigation guidance to help IT Pros and incident response teams identify, remediate, defend against associated attacks: Guidance for responders: Investigating and remediating on-premises Exchange Server vulnerabilities<\/a>.<\/em><\/p>\n Update [03\/15\/2021]<\/strong>: Microsoft released a new one-click mitigation tool, the Microsoft Exchange On-Premises Mitigation Tool<\/a>, to help customers who do not have dedicated security or IT teams to apply security updates for Microsoft Exchange\u202fServer.\u00a0<\/em><\/p>\n Update [03\/08\/2021]<\/strong>: Microsoft continues to see multiple actors taking advantage of unpatched systems to attack organizations with on-premises Exchange Server. To aid defenders in investigating these attacks where Microsoft security products and tooling may not be deployed, we are releasing a feed of observed indicators of compromise (IOCs). The feed of malware hashes and known malicious file paths observed in related attacks is available in both JSON and CSV formats at the below GitHub links. This information is being shared as TLP:WHITE: <\/em>CSV format<\/a> |\u00a0JSON format<\/a><\/p>\n Update [03\/05\/2021]<\/strong>: Microsoft sees increased use of these vulnerabilities in attacks targeting unpatched systems by multiple malicious actors beyond HAFNIUM. To aid customers in investigating these attacks, <\/em>Microsoft Security Response Center (MSRC) has provided additional resources, including new mitigation guidance: Microsoft Exchange Server Vulnerabilities Mitigations \u2013 March 2021<\/a><\/em><\/p>\n Update [03\/04\/2021]<\/strong>: The Exchange Server team released a script for checking HAFNIUM indicators of compromise (IOCs). See Scan Exchange log files for indicators of compromise<\/a>.<\/em><\/p>\n <\/p>\n Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to email accounts, and allowed installation of additional malware to facilitate long-term access to victim environments. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to HAFNIUM<\/a>, a group assessed to be state-sponsored and operating out of China, based on observed victimology, tactics and procedures.<\/p>\n The vulnerabilities recently being exploited were CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065, all of which were addressed in today\u2019s Microsoft Security Response Center (MSRC) release – Multiple Security Updates Released for Exchange Server<\/a>. We strongly urge customers to update on-premises systems immediately. Exchange Online is not affected. We have established a resource center that is constantly updated as more information becomes available at https:\/\/aka.ms\/ExchangeVulns<\/a><\/strong>.<\/p>\n We are sharing this information with our customers and the security community to emphasize the critical nature of these vulnerabilities and the importance of patching all affected systems immediately to protect against these exploits and prevent future abuse across the ecosystem. This blog also continues our mission to shine a light on malicious actors and elevate awareness of the sophisticated tactics and techniques used to target our customers. The related IOCs, Azure Sentinel<\/a> advanced hunting queries, and\u00a0Microsoft Defender for Endpoint<\/a> product detections and queries shared in this blog will help SOCs proactively hunt for related activity in their environments and elevate any alerts for remediation.<\/p>\n Microsoft would like to thank our industry colleagues at Volexity and Dubex for reporting different parts of the attack chain and their collaboration in the investigation. Volexity has also published a blog post<\/a> with their analysis. It is this level of proactive communication and intelligence sharing that allows the community to come together to get ahead of attacks before they spread and improve security for all.<\/p>\n HAFNIUM primarily targets entities in the United States across a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs.<\/p>\n HAFNIUM has previously compromised victims by exploiting vulnerabilities in internet-facing servers, and has used legitimate open-source frameworks, like Covenant<\/a>, for command and control. Once they\u2019ve gained access to a victim network, HAFNIUM typically exfiltrates data to file sharing sites like MEGA<\/a>.<\/p>\n In campaigns unrelated to these vulnerabilities, Microsoft has observed HAFNIUM interacting with victim Office 365 tenants. While they are often unsuccessful in compromising customer accounts, this reconnaissance activity helps the adversary identify more details about their targets\u2019 environments.<\/p>\n HAFNIUM operates primarily from leased virtual private servers (VPS) in the United States.<\/p>\n Microsoft is providing the following details to help our customers understand the techniques used by HAFNIUM to exploit these vulnerabilities and enable more effective defense against any future attacks against unpatched systems.<\/p>\n CVE-2021-26855<\/a> is a server-side request forgery (SSRF) vulnerability in Exchange which allowed the attacker to send arbitrary HTTP requests and authenticate as the Exchange server.<\/p>\n CVE-2021-26857<\/a> is an insecure deserialization vulnerability in the Unified Messaging service. Insecure deserialization is where untrusted user-controllable data is deserialized by a program. Exploiting this vulnerability gave HAFNIUM the ability to run code as SYSTEM on the Exchange server. This requires administrator permission or another vulnerability to exploit.<\/p>\n CVE-2021-26858<\/a> is a post-authentication arbitrary file write vulnerability in Exchange. If HAFNIUM could authenticate with the Exchange server then they could use this vulnerability to write a file to any path on the server. They could authenticate by exploiting the CVE-2021-26855 SSRF vulnerability or by compromising a legitimate admin\u2019s credentials.<\/p>\n CVE-2021-27065<\/a> is a post-authentication arbitrary file write vulnerability in Exchange. If HAFNIUM could authenticate with the Exchange server then they could use this vulnerability to write a file to any path on the server. They could authenticate by exploiting the CVE-2021-26855 SSRF vulnerability or by compromising a legitimate admin\u2019s credentials.<\/p>\n After exploiting these vulnerabilities to gain initial access, HAFNIUM operators deployed web shells on the compromised server. Web shells potentially allow attackers to steal data and perform additional malicious actions that lead to further compromise. One example of a web shell deployed by HAFNIUM, written in ASP, is below:<\/p>\n <\/p>\n Following web shell deployment, HAFNIUM operators performed the following post-exploitation activity:<\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n HAFNIUM operators were also able to download the Exchange offline address book from compromised systems, which contains information about an organization and its users.<\/p>\n Our blog, Defending Exchange servers under attack<\/a>, offers advice for improving defenses against Exchange server compromise. Customers can also find additional guidance about web shell attacks in our blog Web shell attacks continue to rise.<\/a><\/p>\n The below sections provide indicators of compromise (IOCs), detection guidance, and advanced hunting queries to help customers investigate this activity using Exchange server logs, Azure Sentinel, Microsoft Defender for Endpoint, and Microsoft 365 Defender. We encourage our customers to conduct investigations and implement proactive detections to identify possible prior campaigns and prevent future campaigns that may target their systems.<\/p>\n The Microsoft Exchange Server team has published a blog post on these new Security Updates<\/a> providing a script to get a quick inventory of the patch-level status of on-premises Exchange servers and answer some basic questions around installation of these patches.<\/p>\n The Exchange Server team has created a script to run a check for HAFNIUM IOCs to address performance and memory concerns. That script is available here: https:\/\/github.com\/microsoft\/CSS-Exchange\/tree\/main\/Security<\/a>.<\/p>\n All Set-<AppName>VirtualDirectory properties should never contain script. InternalUrl and ExternalUrl should only be valid Uris.<\/p>\n Microsoft is releasing a feed of observed indicators of compromise (IOCs) in related attacks. This feed is available in both CSV<\/a>\u00a0and JSON<\/a>\u00a0formats. This information is being shared as TLP:WHITE.<\/p>\n Web shell hashes<\/p>\n We observed web shells in the following paths:<\/p>\n The web shells we detected had the following file names:<\/p>\n \u00a0<\/em>Check for suspicious .zip, .rar, and .7z files in C:\\ProgramData\\<\/em>, which may indicate possible data exfiltration.<\/p>\n Customers should monitor these paths for LSASS dumps:<\/p>\n Many of the following detections are for post-breach techniques used by HAFNIUM. So while these help detect some of the specific current attacks that Microsoft has observed it remains very important to apply the recently released updates for CVE-2021-26855, CVE-2021-26857, CVE-2021-27065 and CVE-2021-26858.<\/p>\n Please note that some of these detections are generic detections and not unique to this campaign or these exploits.<\/p>\n To locate possible exploitation activity related to the contents of this blog, you can run the following\u00a0advanced hunting<\/a>\u00a0queries via Microsoft Defender for Endpoint and Azure Sentinel:<\/p>\n Microsoft 365 Defender customers can find related hunting queries below or at this GitHub location: https:\/\/github.com\/microsoft\/Microsoft-365-Defender-Hunting-Queries\/ <\/a><\/p>\nWho is HAFNIUM?<\/h2>\n
Technical details<\/h2>\n
Attack details<\/h2>\n
\n
\n
\n
\n
\n
Can I determine if I have been compromised by this activity?<\/h2>\n
Check patch levels of Exchange Server<\/h3>\n
Scan Exchange log files for indicators of compromise<\/h3>\n
\n
\n
\n
Import-Csv -Path (Get-ChildItem -Recurse -Path \"$env:PROGRAMFILES\\Microsoft\\Exchange Server\\V15\\Logging\\HttpProxy\" -Filter '*.log').FullName | Where-Object { $_.AnchorMailbox -like 'ServerInfo~*\/*' -or $_.BackEndCookie -like 'Server~*\/*~*'} | select DateTime, AnchorMailbox, UrlStem, RoutingHint, ErrorCode, TargetServerVersion, BackEndCookie, GenericInfo, GenericErrors, UrlHost, Protocol, Method, RoutingType, AuthenticationType, ServerHostName, HttpStatus, BackEndStatus, UserAgent<\/code><\/p>\n
\n
\n
\n
\n
\n
findstr \/snip \/c:\"Download failed and temporary file\" \"%PROGRAMFILES%\\Microsoft\\Exchange Server\\V15\\Logging\\OABGeneratorLog\\*.log\"<\/code><\/p>\n
\n
\n
\n
Get-EventLog -LogName Application -Source \"MSExchange Unified Messaging\" -EntryType Error | Where-Object { $_.Message -like \"*System.InvalidCastException*\" }<\/code><\/p>\n
\n
\n
\n
\n
Select-String -Path \"$env:PROGRAMFILES\\Microsoft\\Exchange Server\\V15\\Logging\\ECP\\Server\\*.log\" -Pattern 'Set-.+VirtualDirectory'<\/code><\/p>\n
Host IOCs<\/h2>\n
Hashes<\/h3>\n
\n
Paths<\/h3>\n
\n
\n
\n
\n
Tools<\/h3>\n
\n
Microsoft Defender Antivirus detections<\/h2>\n
\n
Microsoft Defender for Endpoint detections<\/h2>\n
\n
Azure Sentinel detections<\/h2>\n
\n
Advanced hunting queries<\/h2>\n
Microsoft Defender for Endpoint advanced hunting queries<\/h3>\n