Ransomware Hackers Using New Way to Bypass MS Exchange ProxyNotShell Mitigations

0
182
Ransomware Hackers Using New Way to Bypass MS Exchange ProxyNotShell Mitigations


Dec 21, 2022Ravie LakshmananEmail Security / Data Security

Ransomware Hackers Using New Way to Bypass MS Exchange ProxyNotShell Mitigations

Threat actors affiliated with a ransomware pressure often called Play are leveraging a never-before-seen exploit chain that bypasses blocking guidelines for ProxyNotShell flaws in Microsoft Exchange Server to realize distant code execution (RCE) by means of Outlook Web Access (OWA).

“The new exploit technique bypasses URL rewrite mitigations for the Autodiscover endpoint,” CrowdStrike researchers Brian Pitchford, Erik Iker, and Nicolas Zilio mentioned in a technical write-up revealed Tuesday.

Play ransomware, which first surfaced in June 2022, has been revealed to undertake many ways employed by different ransomware households comparable to Hive and Nokoyawa, the latter of which upgraded to Rust in September 2022.

CyberSecurity

The cybersecurity firm’s investigations into a number of Play ransomware intrusions discovered that preliminary entry to the goal environments was not achieved by instantly exploiting CVE-2022-41040, however fairly by means of the OWA endpoint.

Dubbed OWASSRF, the approach possible takes benefit of one other important flaw tracked as CVE-2022-41080 (CVSS rating: 8.8) to realize privilege escalation, adopted by abusing CVE-2022-41082 for distant code execution.

MS Exchange ProxyNotShell RCE

It’s value noting that each CVE-2022-41040 and CVE-2022-41080 stem from a case of server-side request forgery (SSRF), which allows an attacker to entry unauthorized inner assets, on this case the PowerShell remoting service.

CrowdStrike mentioned the profitable preliminary entry enabled the adversary to drop respectable Plink and AnyDesk executables to keep up persistent entry in addition to take steps to purge Windows Event Logs on contaminated servers to hide the malicious exercise.

All three vulnerabilities have been addressed by Microsoft as a part of its Patch Tuesday updates for November 2022. It’s, nevertheless, unclear if CVE-2022-41080 was actively exploited as a zero-day alongside CVE-2022-41040 and CVE-2022-41082.

The Windows maker, for its half, has tagged CVE-2022-41080 with an “Exploitation More Likely” evaluation, implying it is attainable for an attacker to create exploit code that may very well be utilized to reliably weaponize the flaw.

CrowdStrike additional famous {that a} proof-of-concept (PoC) Python script found and leaked by Huntress Labs researcher Dray Agha final week might have been put to make use of by the Play ransomware actors for preliminary entry.

This is evidenced by the truth that the execution of the Python script made it attainable to “replicate the logs generated in current Play ransomware assaults.”

“Organizations ought to apply the November 8, 2022 patches for Exchange to forestall exploitation for the reason that URL rewrite mitigations for ProxyNotShell are usually not efficient in opposition to this exploit technique,” the researchers mentioned.

Found this text attention-grabbing? Follow us on Twitter and LinkedIn to learn extra unique content material we submit.

LEAVE A REPLY

Please enter your comment!
Please enter your name here