Recently targeted by HAFNIUM
Firstly, if you are running an un-patched on-premise Microsoft Exchange version, you should upgrade
immediately! This is a critical
vulnerability that allows an attacker to access a desired user’s mailbox, requiring only the e-mail
address of the user they wish to target! These details and more were disclosed by Volexity
here.
https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/
The vulnerabilities affect Exchange Server 2013, 2016 and 2019. Exchange Online is not affected.
https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/
https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/
Microsoft Exchange
Fortinet Products Summary
FortiGate NGFW
FortiClient
FortiWeb
FortiEDR
FortiAnalyzer
Threat Hunting Report
IPS
Anti-Virus
Vulnerability
WAF
EDR
Event Handler
18.030
Blocks the exploit (deploy NGFW in front of Exchange server)
Blocks the hashes identified by Microsoft in the blog post. Does not prevent the exploitation, but
will prevent the data being exfiltrated.
84.00475
1.234
0.00286
v4, v5
6.2, 6.4
Services
Version
Other info
Detects vulnerable instance of Exchange running on Windows Server
Blocks the exploit (deploy WAF in front of Exchange server)
Blocks post-exploitation activity including dumping the LSASS memory, running Nishang and PowerCat tool.
Raise event when FortiGate IPS detects a vulnerable instance exploit attempt, or AV detects a known IOC.
Latest
January 6, 2021
Ongoing Developments
Zero Day Exploits
In the article above, Volexity disclosed seeing these exploits as early as January 6, 2021. The
first CVE discovered was CVE-2021-26855 being used to steal content from mailboxes. On further
monitoring of the environments, it was observed the attacker can chain this vulnerability to others (including
CVE-2021-27065), enabling remote code execution, and eventually lateral movement. More details are
available from Volexity’s post.
On March 2, 2020, Microsoft released the patches via MSRC:
Volexity published their
findings:
Microsoft published further information about nation-state attacks, and identified
HAFNIUM specifically as the primary threat actor exploiting these vulnerabilities:
https://msrc-blog.microsoft.com/2021/03/02/multiple-security-updates-released-for-exchange-server/
https://blogs.microsoft.com/on-the-issues/2021/03/02/new-nation-state-cyberattacks/
https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/
March 2, 2021
MSFT Annoucement
https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/
On March 5, Microsoft released additional details and mitigation techniques that can be used by customers
unable to upgrade quickly:
https://msrc-blog.microsoft.com/2021/03/05/microsoft-exchange-server-vulnerabilities-mitigations-march-2021/
On March 3, FortiGuard released initial analysis in Threat Signal report:
https://www.fortiguard.com/threat-signal-report/3856/out-of-band-patches-for-in-the-wild-exploitation-microsoft-exchange-server
Reconnaissance
Weaponization
Delivery
This is a critical vulnerability of a supported / trusted Microsoft Exchange instance, and affects the
on-premise deployments of Exchange 2013, 2016 and 2019.
Exploitation
Multiple products & services including FortiGuard IPS and FortiWeb
detect & prevent the exploit and lateral movements within the Enterprise network.
Installation
C2
Action
FortiClient Vulnerability Package Update
Version Info: 1.234
Link: https://www.fortiguard.com/updates/epvuln?version=1.234
Detect Vulnerable App
Block Exploit with IPS
Block Exploit with FortiWeb
FortiGate IPS Database Update
Version Info: 18.030 (and 18.028)
Link: https://www.fortiguard.com/updates/ips?version=18.030
FortiWeb Web Security Update
Version Info: 0.00286
Link: https://www.fortiguard.com/updates/websecurity?version=0.00286
FortiAnalyzer Report
Version Info: n/a
Link: https://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=FD51568
Other Info: Detects indicators based on FortiGate IPS and AV.
FortiAnalyzer Event Handler
Version Info: FortiAnalyzer 6.2, 6.4
Link: https://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=FD51568
Other Info: Detects indicators based on FortiGate IPS and AV.
Threat Hunting Report
Event Handler
Analyzer / SIEM / SOAR Threat Hunting & Playbooks
Defuse Exploit
FortiEDR (with optional MDR and XDR services)
Version Info: v4, v5
Link: https://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=FD52016
Other Info: Blocks post-exploitation activity including dumping the LSASS memory, running Nishang and
PowerCat tools.
Defuse Exfiltration Attempts
FortiGate / FortiGuard Anti-Virus
Version Info: 84.00475
Link: https://www.fortiguard.com/updates/antivirus?version=84.00475
Other Info: Blocks the hashes identified by Microsoft in the blog post. Does not prevent the
exploitation, but will prevent the data being exfiltrated.
Multiple products & services including FortiEDR and FortiGuard AntiVirus detect & defuse exploited system activities.
Incident Response (Security Operations)
To help customers identify and protect vulnerable, FortiAnalyzer, FortiSIEM and FortiSOAR updates are
available to raise alerts and escalate to incident response:
Cyber Kill Chain
FortiSIEM Report
Version Info: 5.x and 6.x
Link: https://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=FD51618
Other Info: Detects indicators attributed to Hafnium from IIS logs, Windows, FortiGate IPS and Virus logs, Network
Traffic logs.
SIEM Threat Hunting Report
FortiSIEM Rules
Version Info: 5.x and 6.x
Link: https://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=FD51618
Other Info:
Detects indicators attributed to Hafnium from IIS logs, Windows, FortiGate IPS and Virus logs, Network
Traffic logs.
SIEM Rules
FortiSIEM
Rules & Threat Hunting Report
5.x, 6.x
Detects indicators attributed to Hafnium from IIS logs, Windows, FortiGate IPS and Virus logs, Network Traffic
logs.
On March 11, Microsoft announced detection of a new variant of DearCry ransomware was being used on vulnerable
Exchange servers:
Full details on Fortinet protection for DearCry is available
from:
DearCry Ransomware
Multiple Fortinet Protections
Link: https://fndn.fortinet.net/FortiGuard-Alert-Outbreaks/Dearcry/
Other Info: One of the common attacks been launched in 2nd stage, as reported by MSFT.
https://fndn.fortinet.net/FortiGuard-Alert-Outbreaks/Dearcry/
FortiDeceptor
Decoy
Lure
3.x
Deception Lure for saved passwords and SMB will divert attacker to decoys and detect the attack.
3.x
Decoys in the MS Exchange segment can detect the lateral movement.
FortiDeceptor Lure (saved password & cache credentials) + Deception Decoy
Version
Info: 3.x
Link: https://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=FD52018
Other Info: Deception Lure for saved passwords and SMB will divert attacker to decoys and detect the
attack. Decoys in the MS Exchange segment can detect the lateral movement.
Detect& Defuse Lateral Movement