Skip to main content

Ransomware Play: a new exploit used to compromise Exchange servers


Stabz
Forum|alt.badge.img+8
  • On the path to Greatness
  • 355 comments

Cybercriminals from the Play ransomware group carry out computer attacks aimed at companies equipped with a Microsoft Exchange server. To compromise the server, hackers use a new exploit dubbed OWASSRF, this exploit is linked to a security patched in November 2022 by Microsoft.

The CrowdStrike company conducted investigations into this attacks where the Exchange server was compromised and used to access the target infrastructure.

This exploit has been called “OWASSRF” and which consist in exploit the CVE-2022-41082 via Remote Powershell. This is the same vulnerability exploited with the ProxyNotShell attacks.

The difference with the OWASSRF exploit : the hackers exploite another & more recent vulnerability to attack Exchange servers: CVE-2022-41080. According to Microsoft, this is a critical flaw but it has not been exploited in attacks. Except that now it is.

With this exploit, hacker deploy some softs for remote control like Anydesk etc…

AFFECTED SYSTEMS:

  • Microsoft Exchange Server 2013 all versions
  • Microsoft Exchange Server 2016 all versions
  • Microsoft Exchange Server 2019 all versions

OWASSRF REMEDIATION:

Microsoft already published an update, you have to update your Exchange Server, it must have at least the November 2022 updates for the CVE-2022-41080 vulnerability to be patched.

If you can’t update your servers, you must disable access to OWA because it is the entry point used by attackers to target mail servers.

For people looking for more information about play ransomware infection routine:

https://original-network.com/play-ransomware-infection-routine/
 

Cheers
 

7 comments

JMeixner
Forum|alt.badge.img+17
  • On the path to Greatness
  • 2650 comments
  • December 21, 2022

 Attacks against Exchange every week...


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8512 comments
  • December 21, 2022

Yes, it seems that Exchange is a target now.  Nice to see MS fixed it quickly too.


Stabz
Forum|alt.badge.img+8
  • Author
  • On the path to Greatness
  • 355 comments
  • December 22, 2022

I'm just seeing that I posted it as a question. I don’t know how to change that sorry!

Exchange Servers are always a good target as they are exposed to internet with the OWA service.
 


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8512 comments
  • December 22, 2022
Stabz wrote:

I'm just seeing that I posted it as a question. I don’t know how to change that sorry!

Exchange Servers are always a good target as they are exposed to internet with the OWA service.
 

@Madi.Cristil can change it to Content from Question for you.


Stabz
Forum|alt.badge.img+8
  • Author
  • On the path to Greatness
  • 355 comments
  • December 22, 2022

@Madi.Cristil sorry for the mistake :) could you please change the topic to “Content” thanks


Madi.Cristil
Forum|alt.badge.img+8
  • Community Manager
  • 617 comments
  • December 22, 2022

Hey @Stabz !  No worries! :)


marcofabbri
Forum|alt.badge.img+13
  • On the path to Greatness
  • 990 comments
  • December 22, 2022

About CVE-2022-41082 John Hammond release an intresting talking

and about this type of attack, today BleepingComputer has updated the article with the PoC exploit

https://www.bleepingcomputer.com/news/security/ransomware-gang-uses-new-microsoft-exchange-exploit-to-breach-servers/