Lucene search

K
hiveproHive ProHIVEPRO:0E3B824DCD3B82D06D8078A118E98B54
HistoryAug 18, 2021 - 11:01 a.m.

Have you patched the vulnerabilities in Microsoft Exchange Server?

2021-08-1811:01:05
Hive Pro
www.hivepro.com
135

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

THREAT LEVEL: Red.

For a detailed advisory, download the pdf file here.

Microsoft Exchange Server vulnerabilities have been officially patched for five months now. These vulnerabilities are actively exploited by multiple threat actors named DeadRinger. DeadRinger has been affecting the telecommunication industry all around the world. DeadRinger consists of three clusters. The first one includes threat group Softcell which has been active since 2012. The Naikon group, which has been active since 2020, is the second cluster. We discovered that the signatures match those of TG-3390, making it the third cluster.

As a response, Hive Pro Threat Researchers advises that you address these vulnerabilities.

The Techniques used by the DeadRinger includes:
T1592: Gather Victim Host Information
T1595: Active Scanning
T1590: Gather Victim Network Information
T1190: Exploit Public-Facing Application
T1059: Command and Scripting Interpreter
T1047: Windows Management Instrumentation
T1059.001: Command and Scripting Interpreter: PowerShell
T1505.003: Server Software Component: Web Shell
T1136: Create Account
T1053: Scheduled Task/Job
T1078: Valid Accounts
T1574: Hijack Execution Flow
T1027.005: Obfuscated Files or Information: Indicator Removal from Tools
T1027: Obfuscated Files or Information
T1036: Masquerading
T1070.006: Indicator Removal on Host: Timestomp
T1140: Deobfuscate/Decode Files or Information
T1040: Network Sniffing
T1087: Account Discovery
T1018: Remote System Discovery
T1071.001: Application Layer Protocol: Web Protocols
T1041: Exfiltration Over C2 Channel
T1021.002: Remote Services: SMB/Windows Admin Shares
T1550.002: Use Alternate Authentication Material: Pass the Hash
T1105: Ingress Tool Transfer
T1555: Credentials from Password Stores
T1003: OS Credential Dumping
T1016: System Network Configuration Discovery
T1069: Permission Groups Discovery
T1560: Archive Collected Data
T1569: System Services
T1543.003: Create or Modify System Process: Windows Service
T1574.002: Hijack Execution Flow: DLL Side-Loading
T1570: Lateral Tool Transfer
T1056.001: Input Capture: Keylogging
T1573: Encrypted Channel

Vulnerability Details

Actor Details

Indicators of Compromise (IoCs)

Type Value
IP Address 47.56.86[.]44
45.76.213[.]2
45.123.118[.]232
101.132.251[.]212
SHA-1 Hash 19e961e2642e87deb2db6ca8fc2342f4b688a45c
ba8f2843e2fb5274394b3c81abc3c2202d9ba592
243cd77cfa03f58f6e6568e011e1d6d85969a3a2
c549a16aaa9901c652b7bc576e980ec2a008a2e0
c2850993bffc8330cff3cb89e9c7652b8819f57f
440e04d0cc5e842c94793baf31e0d188511f0ace
e2340b27a4b759e0e2842bfe5aa48dda7450af4c
15336340db8b73bf73a17c227eb0c59b5a4dece2
5bc5dbe3a2ffd5ed1cd9f0c562564c8b72ae2055
0dc49c5438a5d80ef31df4a4ccaab92685da3fc6
81cfcf3f8213bce4ca6a460e1db9e7dd1474ba52
e93ceb7938120a87c6c69434a6815f0da42ab7f2
207b7cf5db59d70d4789cb91194c732bcd1cfb4b
71999e468252b7458e06f76b5c746a4f4b3aaa58
39c5c45dbec92fa99ad37c4bab09164325dbeea0
efc6c117ecc6253ed7400c53b2e148d5e4068636
a3c5c0e93f6925846fab5f3c69094d8a465828e9
a4232973418ee44713e59e0eae2381a42db5f54c
5602bf8710b1521f6284685d835d5d1df0679b0f
e3fcda85f5f42a2bffb65f3b8deeb523f8db2302
720556854fb4bcf83b9ceb9515fbe3f5cb182dd5
b699861850e4e6fde73dfbdb761645e2270f9c9a
6516d73f8d4dba83ca8c0330d3f180c0830af6a0
99f8263808c7e737667a73a606cbb8bf0d6f0980
a5b193118960184fe3aa3b1ea7d8fd1c00423ed6
92ce6af826d2fb8a03d6de7d8aa930b4f94bc2db
d9e828fb891f033656a0797f5fc6d276fbc9748f
87c3dc2ae65dcd818c12c1a4e4368f05719dc036
Domain Cymkpuadkduz[.]xyz
nw.eiyfmrn[.]com
jdk.gsvvfsso[.]com
ttareyice.jkub[.]com
my.eiyfmrn[.]com
A.jrmfeeder[.]org
afhkl.dseqoorg[.]com

Patch Links

<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26855&gt;

<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26857&gt;

<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26858&gt;

<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-27065&gt;

References

<https://www.cybereason.com/blog/deadringer-exposing-chinese-threat-actors-targeting-major-telcos&gt;

<https://www.zdnet.com/article/deadringer-chinese-apts-strike-major-telecommunications-companies/&gt;

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P