The number of organizations breached via four zero-day bugs in Microsoft Exchange has reached 30,000 and climbing, thanks to automated scanning and scripting techniques used by attackers.
According to sources that spoke to SC Media, adversaries in late February leveraged automated scanning capabilities in order to identify Exchange users who were vulnerable to the exploit. The number of hacks at first were limited, but once Microsoft made the zero-days public last Tuesday and issued emergency patches, malicious actors implemented a script that enabled them to launch the massive automated hack.
The lesson here: malicious actors continue to leverage the combination of automated scanners and scripts to strategically rack up high victim counts, especially when they sense time to inflict damage before patching is running out.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.