

Rewterz Threat Alert – APT SideWinder Targeting Pakistani Officials
March 5, 2021
Rewterz Threat Alert – AlumniLocker and Humble Ransomware – IoCs
March 8, 2021
Rewterz Threat Alert – APT SideWinder Targeting Pakistani Officials
March 5, 2021
Rewterz Threat Alert – AlumniLocker and Humble Ransomware – IoCs
March 8, 2021Severity
High
Analysis Summary
Active in-the-wild exploitation of multiple Microsoft Exchange vulnerabilities is seen, in an attempt to steal e-mail and compromise networks. In this campaign, a large amount of data was detected being sent to some IP addresses. A closer inspection of the IIS logs from the Exchange servers revealed rather alarming results. The logs showed inbound POST requests to valid files associated with images, JavaScript, cascading style sheets, and fonts used by Outlook Web Access (OWA). It was initially suspected the servers might be backdoored and that webshells were being executed through a malicious HTTP module or ISAPI filter. Investigation revealed that the servers were not backdoored and uncovered a zero-day exploit being used in the wild.
The attacker was exploiting a zero-day server-side request forgery (SSRF) vulnerability in Microsoft Exchange (CVE-2021-26855). The attacker was using the vulnerability to steal the full contents of several user mailboxes. This vulnerability is remotely exploitable and does not require authentication of any kind, nor does it require any special knowledge or access to a target environment. The attacker only needs to know the server running Exchange and the account from which they want to extract e-mail.
This vulnerability has been confirmed to exist within the latest version of Exchange 2016 on a fully patched Windows Server 2016 server. The vulnerability exists in Exchange 2019 but has not been tested against a fully patched version, although it is believed that they are vulnerable. It should also be noted that this vulnerability does not appear to impact Office 365.
Following the discovery of CVE-2021-26855, The attacker had managed to chain the SSRF vulnerability with another that allows remote code execution (RCE) on the targeted Exchange servers. In all cases of RCE, the attacker was found writing webshells (ASPX files) to disk and conducting further operations to dump credentials, add user accounts, steal copies of the Active Directory database (NTDS.DIT), and move laterally to other systems and environments. The exploited vulnerabilities are as follows:
* CVE-2021-26855 is a server-side request forgery (SSRF) vulnerability in Exchange which allowed the attacker to send arbitrary HTTP requests and authenticate as the Exchange server.
* CVE-2021-26857 is an insecure deserialization vulnerability in the Unified Messaging service. Insecure deserialization is where untrusted user-controllable data is deserialized by a program. Exploiting this vulnerability gave HAFNIUM the ability to run code as SYSTEM on the Exchange server. This requires administrator permission or another vulnerability to exploit.
* CVE-2021-26858 is a post-authentication arbitrary file write vulnerability in Exchange. If HAFNIUM could authenticate with the Exchange server then they could use this vulnerability to write a file to any path on the server. They could authenticate by exploiting the CVE-2021-26855 SSRF vulnerability or by compromising a legitimate admin’s credentials.
* CVE-2021-27065 is a post-authentication arbitrary file write vulnerability in Exchange. If HAFNIUM could authenticate with the Exchange server then they could use this vulnerability to write a file to any path on the server. They could authenticate by exploiting the CVE-2021-26855 SSRF vulnerability or by compromising a legitimate admin’s credentials.
Impact
- Unauthorized Access
- Network Compromise
- Security Bypass
- Remote Code Execution
Indicators of Compromise
Source IP
- 80[.]92[.]205[.]81
- 211[.]56[.]98[.]146
- 203[.]160[.]69[.]66
- 192[.]81[.]208[.]169
- 185[.]250[.]151[.]72
- 157[.]230[.]221[.]198
- 149[.]28[.]14[.]163
- 108[.]61[.]246[.]56
- 104[.]250[.]191[.]110
- 104[.]140[.]114[.]110
- 103[.]77[.]192[.]219
Affected Products
- Microsoft Exchange Server 2013
- Microsoft Exchange Server 2016
- Microsoft Exchange Server 2019
Remediation
- Block the threat indicators at their respective controls.
- Search for IoCs in your environment.
- Update all vulnerable versions of Exchange Server.