Cybersecurity | March 10, 2021

HAFNIUM Targeting Microsoft Exchange Servers

Recently,Ā MicrosoftĀ came out with information to help their customers understand the strategies used by HAFNIUM to attack theĀ vulnerabilitiesĀ of unpatched systems.Ā 

What Is HAFNIUM?Ā Ā 

HAFNIUM typically targets entities in the U.S. across several business sectors, including law firms, infectious disease researchers, education organizations, policy think tanks, defense contractors, and NGOs.Ā 

What Do Microsoft Users Need to Know?Ā Ā Ā 

Once HAFNIUM gains initial access to your system, they will deploy something known as a web shell. These web shells allow intruders to steal your data and perform other actions to manipulate your system.Ā Ā 

Unfortunately, HAFNIUM can also download an Exchange offline address book if your system was compromised. This means that they can access information regarding the corresponding organization and users.Ā 

Have My Systems Been Compromised?Ā Ā Ā 

To check in on your server activity, we recommend using the following: Ā 

  • Exchange server logsĀ 
  • Azure SentinelĀ Ā 
  • Microsoft Defender for EndpointĀ 
  • Microsoft 365 DefenderĀ 

There are a few things you can do to be safe and check for any compromised servers. You should always:Ā 

  • Make sure your security updates areĀ current.Ā 
  • Check the patch levels of your Microsoft Exchange Server.Ā 
  • Scan the Exchange log files to search for any unusual activity.Ā 

Leave It to the ProfessionalsĀ 

If you are worried that you were affected by a HAFNIUM attack, it is always best to reach out to anĀ IT professionalĀ to guide you through a safe process to restore your systems. If you are looking for more information regarding the defense of Microsoft Exchange Servers, weĀ recommendĀ readingĀ this blog.Ā 

For more IT news, blogs, and industry insights throughout the week, follow us onĀ Facebook,Ā Twitter,Ā LinkedIn,Ā andĀ Instagram.Ā 

Search: