MS Exchange Server-Schwachstellen werden für gezielte Angriffe mit Keyloggern ausgenutzt

Teilen:

An unknown threat actor is exploiting known security flaws in Microsoft Exchange Server to deploy a keylogger malware in attacks targeting entities in Africa and the Middle East.

Russian cybersecurity firm Positive Technologies said it identified over 30 victims spanning government agencies, banks, IT companies, and educational institutions. The first-ever compromise dates back to 2021.

“This keylogger was collecting account credentials into a file accessible via a special path from the internet,” the company said in a report published last week.

Countries targeted by the intrusion set include Russia, the U.A.E., Kuwait, Oman, Niger, Nigeria, Ethiopia, Mauritius, Jordan, and Lebanon.

The attack chains commence with the exploitation of ProxyShell flaws (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207) that were originally patched by Microsoft in May 2021.

Successful exploitation of the vulnerabilities could allow an attacker to bypass authentication, elevate their privileges, and carry out unauthenticated, remote code execution. The exploitation chain was discovered and published by Orange Tsai from the DEVCORE Research Team.

MS Exchange Server Flaws

The ProxyShell exploitation is followed by the threat actors adding the keylogger to the server main page (“logon.aspx”), in addition to injecting code responsible for capturing the credentials to a file accessible from the internet upon clicking the sign in button.

Positive Technologies said it cannot attribute the attacks to a known threat actor or group at this stage without additional information.

Besides updating their Microsoft Exchange Server instances to the latest version, organizations are urged to look for potential signs of compromise in the Exchange Server’s main page, including the clkLgn() function where the keylogger is inserted.

“If your server has been compromised, identify the account data that has been stolen and delete the file where this data is stored by hackers,” the company said. “You can find the path to this file in the logon.aspx file.”

Ravie Lakshmanan

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
9:12 am, Juli 13, 2025
Wetter-Symbol 18°C
L: 17° | H: 20°
klarer Himmel
Luftfeuchtigkeit: 86 %
Druck: 1014 mb
Wind: 4 mph NE
Windböe: 6 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 3%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:58 am
Sonnenuntergang: 9:13 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
17° | 20°°C 0 mm 0% 6 mph 86 % 1013 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
19° | 27°°C 0 mm 0% 15 mph 71 % 1015 mb 0 mm/h
Di. Juli 15 10:00 pm
Wetter-Symbol
15° | 22°°C 1 mm 100% 17 mph 85 % 1016 mb 0 mm/h
Mi. Juli 16 10:00 pm
Wetter-Symbol
14° | 27°°C 0.11 mm 11% 11 mph 85 % 1017 mb 0 mm/h
Do. Juli 17 10:00 pm
Wetter-Symbol
18° | 27°°C 1 mm 100% 13 mph 95 % 1015 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
18° | 22°°C 0 mm 0% 4 mph 86 % 1013 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
21° | 27°°C 0 mm 0% 3 mph 72 % 1013 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
26° | 30°°C 0 mm 0% 0 mph 47 % 1011 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
27° | 27°°C 0 mm 0% 6 mph 31 % 1008 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
23° | 23°°C 0 mm 0% 6 mph 40 % 1010 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 5 mph 40 % 1011 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
20° | 20°°C 0 mm 0% 5 mph 52 % 1010 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 9 mph 71 % 1011 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€100,953.28
0.17%
Ethereum(ETH)
€2,535.39
-0.08%
XRP(XRP)
€2.40
0.98%
Fesseln(USDT)
€0.86
-0.01%
Solana(SOL)
€139.11
-0.28%
USDC(USDC)
€0.86
0.00%
Dogecoin(DOGE)
€0.170593
-0.87%
Shiba Inu(SHIB)
€0.000011
-0.91%
Pepe(PEPE)
€0.000010
-1.28%
Peanut das Eichhörnchen(PNUT)
€0.246209
7.19%
Nach oben scrollen