Ransomware

Novel Microsoft Exchange zero-day allegedly used in LockBit ransomware attack probed

Share

BleepingComputer reports that Microsoft has launched an investigation on a new Microsoft Exchange server zero-day vulnerability discovered by AhnLab to have been leveraged to facilitate LockBit ransomware attacks. Such a flaw has been exploited by attackers to enable privilege escalation and the theft of nearly 1.3TB of data, as well as network system encryption, a report from AhnLab revealed. "Among the vulnerabilities disclosed after May, there were no reports of vulnerabilities related to remote commands or file creation. Therefore, considering that WebShell was created on July 21, it is expected that the attacker used an undisclosed zero-day vulnerability," AhnLab said in its report. Microsoft is so far working to fix actively exploited Microsoft Exchange zero-days, tracked as CVE-2022-41040 and CVE-2022-41082, which are believed to be different from the one reported by AhnLab due to variations in tactics. "It is presumed that a different attacker used a different zero-day vulnerability," said AhnLab.

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.