SSRF attacks on Microsoft Exchange Server

SSRF attacks on Microsoft Exchange Server

Share post

In an analysis, Bitdefender warns of a series of ProxyNotShell/OWASSRF attacks targeting on-premise Microsoft Exchange installations. The attack often even ends in taking over the server. A technical guide from Bitdefender offers help. 

The attacks observed since the end of November 2022, especially in the USA, served different purposes. Server-Side Request Forgery (SSRF) attacks enable opportunistic attacks via a vulnerable server on another server and can lead to the complete takeover of a Microsoft Exchange server, for example. Vulnerabilities in such high-level architectures are rarely found. If present, they are difficult to close in productive systems. This applies above all to widespread software for which backwards compatibility plays an important role - such as Microsoft Exchange.

Intelligent server takeover attacks

🔎 Microsoft Exchange CAS vulnerability against SSRF attacks (Image: Bitdefender).

SSRF attacks are a common way to attack backend services programmed with Server Orientated Architecture (SOA) that do not have hard-coded security. The frontend proxies are responsible for their protection. In one of the attacks, the cybercriminals attacked the Client Access Services (CAS) as proxy protection on a Microsoft Exchange 2019 mailbox server. The hackers send a request through a vulnerable system, the CAS proxy authenticates the attackers' request and grants the attackers SYSTEM access to backend services (see image).

Microsoft Exchange is an ideal target for such attacks because it relies on a set of front-end and back-end services that are difficult to change due to backwards compatibility. The backend services trust a request from the front end CAS layer. Various backend goals run through the SYSTEM account. The Remote PowerShell (RPS) offers a lot of Power Shell commands.

First the server, then your own remote tools

Hackers attack such a worthwhile target for various purposes: For example, they wanted to install tools for remote access. A persistent presence on the compromised system via web shell programs should enable various actions. Hackers use the attack called ProxyNotShell to execute PowerShell commands - presumably intended to install ransomware. The capture of access data in another variant is also used to start ransomware attacks.

Defending against such attacks requires a layered cyber defense with prevention, detection and mitigation capabilities. This also includes patch management, which is not just limited to Windows, but to all applications and services with Internet access. Checking the reputation of IP addresses and URLs is also important. Defense solutions must also be able to detect fileless attacks.

More at Bitdefender.com

 


About Bitdefender

Bitdefender is a leading global provider of cybersecurity solutions and antivirus software, protecting over 500 million systems in more than 150 countries. Since it was founded in 2001, the company's innovations have consistently ensured excellent security products and intelligent protection for devices, networks and cloud services for private customers and companies. As the supplier of choice, Bitdefender technology is found in 38 percent of security solutions deployed around the world and is trusted and recognized by industry experts, manufacturers and customers alike. www.bitdefender.de


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more