Microsoft is investigating whether the leakage behavior caused an exchange: report

Illustration of the article entitled Microsoft investigates whether the attack code

photo: Moon Jeenah (Getty Images)

Hackers may have gained the intelligence that Microsoft shared with its security partners exploit vulnerabilities according to Friday, the company’s widely used email and Exchange calendar software Wall Street Journal report.

Various different groups of hackers have descended on the exchange in a series of branched cyber attacks that at least committed 30,000 American organizations. According to reports, hackers sponsored by the state of China exploited several of them zero day vulnerabilities to Microsoft software, which other cyber attackers later took advantage of, to access Exchange servers and plant malicious code in order to steal big email data from U.S. companies and local governments.

The first wave of attacks began in January and took off the week before Microsoft planned to launch a software solution to customers, the Journal reports. The tools used in the second wave, which is believed to have begun on Feb. 28, bore several similarities to the “proof of concept” attack code that Microsoft distributed to antivirus companies and other security partners a few days earlier, people familiar with the research. he told the dam. Although Microsoft initially planned to take out a software solution on March 9, it ended up releasing the patch soon, on March 2, in response to the second wave of attacks.

Microsoft uses an information-sharing network, the Microsoft Active Protections Program, or MAPP, to send alerts about your product to its security partners so that they can identify emerging threats. MAPP includes 80 security companies worldwide, including about 10 based in China. A subset of these organizations received the concept test code that could be used to attack Microsoft systems in a notification that contained technical details about uncorrected flaws in Exchange, according to the Journal. A Microsoft spokesman rejected the Journal’s request for comment on whether Chinese companies were included in this subset.

The spokesman went on to say that Microsoft has seen “no evidence” of a leak from inside the company, but if its internal investigation finds that there are MAPP partners involved in the hacking, there would be consequences.

“If it turns out that a MAPP partner was the source of a leak, they would have consequences for breaching the terms of participation in the program,” he told the newspaper.

Microsoft previously ousted Hangzhou DPTech Technologies, a China-based security software provider, from its MAPP program in 2012 after verifying that the company leaked a proof-of-concept code that could be used in a possible cyberattack and therefore violated its non-disclosure agreement.

The extent of this massive violation is still being discovered, but it could allow hackers to gain access to compromised systems for years to come. According to the cybersecurity firm, the rate of cyberattacks doubles every few hours, as hackers take advantage of these zero-day vulnerabilities to breach servers that have not yet been fixed. Check Point Research. Friday, Microsoft revealed who discovered “a new family of ransomware software,” also known as malware that hijacks a computer or network until the victim forks for a rescue and is used to target networks without hitting.

That same day, the Biden administration stressed the seriousness of this historic hacking and warned thousands of committed organizations that they have “hours, not days” to update exposed servers, for CNN. An official told the media that the U.S. government is hiring members of the private sector to assist in a multi-agency cybersecurity task force formed in response to the incident.

.Source