Free Newsletters for the Channel
Register for Your Free Newsletter Now
Threat actors have a lot of options, including launching ransomware and other attacks.
April 8, 2021
It may not be at the top of the headlines anymore, but the mass Microsoft Exchange exploitation isn’t over yet.
Malicious hackers appear to have compromised 20% of the Exchange servers Huntress reviewed (those running affected versions).
Nearly 25% of the incident reports Huntress sent were to hosts who had been compromised more than once.
About 12% of the Exchange servers they’re monitoring still need patching.
Huntress’ John Hammond
The cyberattack was on Microsoft‘s on-premises Exchange business email software. The attack allowed access to email accounts and installation of malware to increase hackers’ dwell time inside a system.
We caught up with John Hammond, senior security researcher at Huntress, to find out the latest on the Microsoft Exchange exploitation.
Channel Futures: Is the threat from the Microsoft Exchange exploitation still very much real? If so, how?
John Hammond: The Exchange incident has taken up all of the month of March. And sadly, even now as we are in the early weeks of April, it continues. The threat is still very much real. Servers that are not patched are still being actively exploited. As public exploits are now available, any ill-intended actor can spray-and-pray across the internet looking for public-facing and vulnerable Exchange servers.
Scroll through the slideshow above for more of Hammond’s comments, as well as more cybersecurity news making headlines this week.
Read more about:MSPs
You May Also Like
Viirtue, MSP Partners Seek Larger Piece of IT PieFeb 29, 2024
New Cisco OT Route to Market Opens New Partner SetFeb 29, 2024
Broadcom-VMware Saga Update: Nutanix Wins, Carbon Black Sale, Hock Tan PayFeb 29, 2024
Zero Trust World: ThreatLocker Unleashes New Tools to Stop ThreatsFeb 27, 2024