Have you patched the vulnerabilities in Microsoft Exchange Server?
For a detailed advisory, download the pdf file here.
Microsoft Exchange Server vulnerabilities have been officially patched for five months now. These vulnerabilities are actively exploited by multiple threat actors named DeadRinger. DeadRinger has been affecting the telecommunication industry all around the world. DeadRinger consists of three clusters. The first one includes threat group Softcell which has been active since 2012. The Naikon group, which has been active since 2020, is the second cluster. We discovered that the signatures match those of TG-3390, making it the third cluster.
As a response, Hive Pro Threat Researchers advises that you address these vulnerabilities.
The Techniques used by the DeadRinger includes:T1592: Gather Victim Host InformationT1595: Active ScanningT1590: Gather Victim Network InformationT1190: Exploit Public-Facing ApplicationT1059: Command and Scripting InterpreterT1047: Windows Management InstrumentationT1059.001: Command and Scripting Interpreter: PowerShellT1505.003: Server Software Component: Web ShellT1136: Create AccountT1053: Scheduled Task/JobT1078: Valid AccountsT1574: Hijack Execution FlowT1027.005: Obfuscated Files or Information: Indicator Removal from ToolsT1027: Obfuscated Files or InformationT1036: MasqueradingT1070.006: Indicator Removal on Host: TimestompT1140: Deobfuscate/Decode Files or InformationT1040: Network SniffingT1087: Account DiscoveryT1018: Remote System DiscoveryT1071.001: Application Layer Protocol: Web ProtocolsT1041: Exfiltration Over C2 ChannelT1021.002: Remote Services: SMB/Windows Admin SharesT1550.002: Use Alternate Authentication Material: Pass the HashT1105: Ingress Tool TransferT1555: Credentials from Password StoresT1003: OS Credential DumpingT1016: System Network Configuration DiscoveryT1069: Permission Groups DiscoveryT1560: Archive Collected DataT1569: System ServicesT1543.003: Create or Modify System Process: Windows ServiceT1574.002: Hijack Execution Flow: DLL Side-LoadingT1570: Lateral Tool TransferT1056.001: Input Capture: KeyloggingT1573: Encrypted Channel
Vulnerability Details
Actor Details
Indicators of Compromise (IoCs)
Type | Value |
IP Address | 47.56.86[.]44 45.76.213[.]2 45.123.118[.]232 101.132.251[.]212 |
SHA-1 Hash | 19e961e2642e87deb2db6ca8fc2342f4b688a45c ba8f2843e2fb5274394b3c81abc3c2202d9ba592 243cd77cfa03f58f6e6568e011e1d6d85969a3a2 c549a16aaa9901c652b7bc576e980ec2a008a2e0 c2850993bffc8330cff3cb89e9c7652b8819f57f 440e04d0cc5e842c94793baf31e0d188511f0ace e2340b27a4b759e0e2842bfe5aa48dda7450af4c 15336340db8b73bf73a17c227eb0c59b5a4dece2 5bc5dbe3a2ffd5ed1cd9f0c562564c8b72ae2055 0dc49c5438a5d80ef31df4a4ccaab92685da3fc6 81cfcf3f8213bce4ca6a460e1db9e7dd1474ba52 e93ceb7938120a87c6c69434a6815f0da42ab7f2 207b7cf5db59d70d4789cb91194c732bcd1cfb4b 71999e468252b7458e06f76b5c746a4f4b3aaa58 39c5c45dbec92fa99ad37c4bab09164325dbeea0 efc6c117ecc6253ed7400c53b2e148d5e4068636 a3c5c0e93f6925846fab5f3c69094d8a465828e9 a4232973418ee44713e59e0eae2381a42db5f54c 5602bf8710b1521f6284685d835d5d1df0679b0f e3fcda85f5f42a2bffb65f3b8deeb523f8db2302 720556854fb4bcf83b9ceb9515fbe3f5cb182dd5 b699861850e4e6fde73dfbdb761645e2270f9c9a 6516d73f8d4dba83ca8c0330d3f180c0830af6a0 99f8263808c7e737667a73a606cbb8bf0d6f0980 a5b193118960184fe3aa3b1ea7d8fd1c00423ed6 92ce6af826d2fb8a03d6de7d8aa930b4f94bc2db d9e828fb891f033656a0797f5fc6d276fbc9748f 87c3dc2ae65dcd818c12c1a4e4368f05719dc036 |
Domain | Cymkpuadkduz[.]xyz nw.eiyfmrn[.]com jdk.gsvvfsso[.]com ttareyice.jkub[.]com my.eiyfmrn[.]com A.jrmfeeder[.]org afhkl.dseqoorg[.]com |
Patch Links
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26855
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26857
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26858
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-27065
References
https://www.cybereason.com/blog/deadringer-exposing-chinese-threat-actors-targeting-major-telcos
https://www.zdnet.com/article/deadringer-chinese-apts-strike-major-telecommunications-companies/
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox