Well it's begun today - threat actors are now actively exploiting Microsoft Exchange server with the ProxyShell vulnerability to drop webshells and backdoors.
First spotted by @GossiTheDog, @buffaloverflow, and @bad_packets, threat actors are chaining together vulnerabilities discovered by @orange_8361 (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207) in an RCE attack known as ProxyShell.
Initial scans for vulnerable devices are targeting Microsoft Exchange's AutoDiscover service.
Note: the email address does not need to be valid and change between threat actors.
The attacks are currently dropping webshells that are being used by threat actors to upload various executables and other webshells.
@buffaloverflow told us that one attack is creating a scheduled task that launches a .NET backdoor that is currently pulling down a benign payload
For those familiar with March's ProxyLogon attacks, the webshells look similar (but not exactly the same) to the China Chopper shells used in that campaign. bleepingcomputer.com/news/security/…
As more servers are compromised, it is expected that the threat actors will replace the current payload with a malicious one.
Bad Packets (@bad_packets) said that they have seen scans from 3.15.221.32 and 194.147.142.0/24 located in the USA, Iran, and the Netherlands.
To check if your Exchange server is being scanned for ProxyShell, you can use this Azure Sentinel query shared by @GossiTheDog.
W3CIISLog
| where csUriStem == "/autodiscover/autodiscover.json"
| where csUriQuery has "PowerShell" | where csMethod == "POST"
If you manage an Exchange server and have not installed April cumulative updates or later, get to it or you will likely be targeted.
Forgot to add that files initially uploaded via the ProxyShell exploit will be a minimum of 265 KB.
This is due to the ProxyShell exploit abusing the Mailbox Export function of Exchange Powershell.
As part of today's Patch Tuesday updates, Microsoft has released an update to fix the recent PrintNightmare elevation of privileges vulnerabilities released by @gentilkiwi and others. bleepingcomputer.com/news/microsoft…
To exploit the bug, a print server would be created with a specially crafted printer driver.
A low-privileged users could connect to the print server, and using Point and Print, the driver would be installed with a DLL that opens a SYSTEM-level console. bleepingcomputer.com/news/microsoft…
The Hotcobalt bugs can be exploited by registering fake beacons which help crash Cobalt Strike C2 servers, blocking C2 comms and new beacon deployments.
Law enforcement and researchers can also use Hotcobalt to take down malicious infrastructure.
Last month, @topotam77 discovered a new unauthenticated vector in the Microsoft Encrypting File System Remote Protocol (EFSRPC) API to perform Windows NTLM relay attacks. bleepingcomputer.com/news/microsoft…
It was quickly illustrated how easily these attacks could be conducted to take over a Windows domain.