• Home
  • News
  • About Us
  • Privacy Policy
  • Contact Us

Trending News Global

News Updates from around the world.

  • News
  • Health
  • Lifestyle
  • Technology
You are here: Home / Technology / Exchange servers first compromised by Chinese hackers hit with ransomware

Exchange servers first compromised by Chinese hackers hit with ransomware

March 13, 2021 by Lena Waldon

[ad_1]

Exchange servers first compromised by Chinese hackers hit with ransomware

Getty Images

Now organizations using Microsoft Exchange have a new security headache: never-before seen ransomware that’s being installed on servers that were already infected by state-sponsored hackers in China.

Microsoft reported the new family of ransomware deployment late Thursday, saying that it was being deployed after the initial compromise of servers. Microsoft’s name for the new family is Ransom:Win32/DoejoCrypt.A. The more common name is DearCry.

We have detected and are now blocking a new family of ransomware being used after an initial compromise of unpatched on-premises Exchange Servers. Microsoft protects against this threat known as Ransom:Win32/DoejoCrypt.A, and also as DearCry.

— Microsoft Security Intelligence (@MsftSecIntel) March 12, 2021

Piggybacking off Hafnium

Security firm Kryptos Logic said Friday afternoon that it has detected Hafnium-compromised Exchange servers that were later infected with ransomware. Kryptos Logic security researcher Marcus Hutchins told Ars that the ransomware is DearCry.

“We’ve just discovered 6970 exposed webshells which are publicly exposed and were placed by actors exploiting the Exchange vulnerability,” Kryptos Logic said. “These shells are being used to deploy ransomware.” Webshells are backdoors that allow attackers to use a browser-based interface to run commands and execute malicious code on infected servers.

We’ve just discovered 6970 exposed webshells which are publicly exposed and were placed by actors exploiting the Exchange vulnerability. These shells are being used to deploy ransomware. If you’re signed up to Telltale (https://t.co/caXU7rqHaI) you can check you’re not affected pic.twitter.com/DjeM59oIm2

— Kryptos Logic (@kryptoslogic) March 12, 2021

Anyone who knows the URL to one of these public webshells can gain complete control over the compromised server. The DearCry hackers are using these shells to deploy their ransomware. The webshells were initially installed by Hafnium, the name Microsoft has given to a state-sponsored threat actor operating out of China.

Hutchins that that the attacks are “human operated,” meaning a hacker manually installs ransomware on one Exchange server at a time. Not all of the nearly 7,000 servers have been hit by DearCry.

“Basically we’re starting to see criminal actors using shells left behind by Hafnium to get a foothold into networks,” Hutchins explained.

Advertisement

The deployment of ransomware, which security experts have said was inevitable, underscores a key aspect about the ongoing response to secure servers exploited by ProxyLogon. It’s not enough to simply install the patches. Without removing the webshells left behind, servers remain open to intrusion, either by the hackers who originally installed the backdoors, or by other fellow hackers who figure out how to gain access to them.

Little is known about DearCry. Security firm Sophos said that it’s based on a public-key cryptosystem, with the public key embedded in the file that installs the ransomware. That allows files to be encrypted without the need to first connect to a command-and-control server. To decrypt the data, victims’ must obtain the private key that’s known only to the attackers.

What you need to know about #DearCry by Mark Loman (@markloman) Director, engineering technology office, Sophos (a thread):

From an encryption-behavior view, DearCry is what Sophos ransomware experts call a ‘Copy’ ransomware.

1/9

— SophosLabs (@SophosLabs) March 12, 2021

Among the first to discover DearCry was Mark Gillespie, a security expert who runs a service that helps researchers identify malware strains. On Thursday, he reported that beginning on Tuesday he started receiving queries from Exchange servers in the US, Canada, and Australia for malware that had the string “DEARCRY.”

He later found someone posting to a user forum on Bleeping Computer saying the ransomware was being installed on servers that had first been exploited by Hafnium. Bleeping Computer soon confirmed the hunch.

John Hultquist, a vice president at security firm Mandiant, said piggy backing on the hackers who installed the webshells can be a faster and more efficient means to deploy malware on unpatched servers than exploiting the ProxyLogon vulnerabilities. And as already mentioned, even if servers are patched, ransomware operators can still compromise the machines when webshells haven’t been removed.

“We are anticipating more exploitation of the exchange vulnerabilities by ransomware actors in the near term,” Hultquist wrote in an email. “Though many of the still unpatched organizations may have been exploited by cyber espionage actors, criminal ransomware operations may pose a greater risk as they disrupt organizations and even extort victims by releasing stolen emails.”

Post updated to remove “7,000” from the headline and to make clear not all of them have been infected with ransomware.



[ad_2]

Source link

Filed Under: Technology

Recent Posts

Taylor Swift Teases Fans with YouTube Live During Munich Show

As night descended on Munich, Germany, Taylor Swift appeared on stage, an … [Read More...]

Japan Adds ‘Most Severe’ Category to Heatstroke Index Amid Deadly Summer

TOKYO — In response to a deadly heatwave, the Japanese Association for Acute … [Read More...]

Dali Grocery Chain Ordered to Cease Sale of Allegedly Infringing Products

MANILA — The Dali grocery chain has been ordered to halt the sale of specific … [Read More...]

Ukraine’s Largest Children’s Hospital Hit by Russian Missile: Anger Mounts

In a devastating escalation of the conflict, a Russian hypersonic missile struck … [Read More...]

Extreme Heat Waves in 2024 Highlight Impact of Climate Change

Less than a month into summer 2024, extreme heat waves have already swept across … [Read More...]

  • Houthi Rebels Target Commercial Ship in Gulf of Aden Amid Escalation
  • China’s New Maritime Rules in South China Sea Escalate Tensions with Philippines
  • Grieving Families Mourn as Bodies of Indian Migrant Workers Return from Kuwait Fire
  • UN Investigation Accuses Israel of Crimes Against Humanity in Gaza
  • Tim Cook Acknowledges Apple Intelligence’s Imperfect Accuracy
  • House Transmits Absolute Divorce Bill to Senate, Paving Way for Major Legal Reform
  • UNICEF Calls for Greater Support for Children’s Play and Protection on First International Day of Play
  • Hunter Biden Faces Trial in California on Federal Tax Charges
  • Elon Musk Threatens to Ban Apple Devices at His Companies Over OpenAI Integration
  • Malawi Vice President and Others Perish in Plane Crash

Follow Us!

  • Facebook
Copyright © 2025 Trending News Global | Sitemap