Tuesday , January 21 2025
Exchange server

ShadowServer Foundation
About 20,000 Microsoft Exchange Servers at Risk of Cyberattacks

A lot number of microsoft Exchange email servers in Europe, the United States, and Asia are at risk because they are accessible on the public internet. These servers are using an old and unsupported version of the software, which makes them vulnerable to multiple security issues, including some that are very serious.

The ShadowServer Foundation found 20,000 Microsoft Exchange servers that have reached the end-of-life stage are still accessible online. Most of these servers are in Europe, but there are also many in North America and Asia.

Multiple Azure DevOps Vulns Allow To Inject CRLF Queries & Rebind DNS

Security researchers have found several vulnerabilities in Azure DevOps that could enable attackers to inject CRLF queries and carry out...
Read More
Multiple Azure DevOps Vulns Allow To Inject CRLF Queries & Rebind DNS

Intel holds 22 employees from one Bangladeshi University

Intel Corporation is a leading semiconductor chip manufacturer, employing at least 22 graduates from the Department of Applied Chemistry and...
Read More
Intel holds 22 employees from one Bangladeshi University

VPN Surge 1500% in USA after TikTok Shut Down

vpnMentor’s Research Team is monitoring the potential TikTok ban in the U.S., driven by national security and data privacy issues....
Read More
VPN Surge 1500% in USA after TikTok Shut Down

MITRE Launches D3FEND 1.0; The Milestone for Cybersecurity Ontology

MITRE launched D3FENDTM 1.0, a cybersecurity framework that provides a vocabulary and understanding of the cyber domain. D3FEND 1.0, funded...
Read More
MITRE Launches D3FEND 1.0; The Milestone for Cybersecurity Ontology

AWS Patches Multiple Vulns in WorkSpaces, AppStream 2.0

Amazon Web Services (AWS) has recently fixed two major security vulnerabilities in its cloud services: Amazon WorkSpaces, Amazon AppStream 2.0,...
Read More
AWS Patches Multiple Vulns in WorkSpaces, AppStream 2.0

Malware Trends Review 2024: Ever Recorded Cyber Threats

Last year saw a significant rise in cyber threats, with malware becoming more advanced and attack strategies more sophisticated. A...
Read More
Malware Trends Review 2024: Ever Recorded Cyber Threats

Botnet Exploits 13,000 MikroTik Devices Abusing Misconfigured DNS

A recent Infoblox Threat Intel report reveals a sophisticated botnet that exploits DNS misconfigurations to spread malware widely. This botnet,...
Read More
Botnet Exploits 13,000 MikroTik Devices Abusing Misconfigured DNS

CVE-2024-9042
Code Execution Vulnerability Found in Kubernetes Windows Nodes

A new security flaw traced, CVE-2024-9042, poses a serious risk to Kubernetes clusters with Windows worker nodes. It has a...
Read More
CVE-2024-9042  Code Execution Vulnerability Found in Kubernetes Windows Nodes

Hacker leaked 15k config files and VPN passwords of FortiGate firewall device

The hacking group "Belsen Group" has posted over 15,000 unique FortiGate firewall configurations online. The data dump, reportedly obtained by exploiting...
Read More
Hacker leaked 15k config files and VPN passwords of FortiGate firewall device

Registration open for 1st Agile Cyber Drill 2025

Registration open for "1st Agile Cyber Drill-2025" scheduled for February 26, 2025 online with an awards ceremony for 9 March...
Read More
Registration open for 1st Agile Cyber Drill 2025

ShadowServer’s statistics may not show the complete situation. Macnica security researcher Yutaka Sejiyama discovered that there are 30,000 Microsoft Exchange servers that are no longer supported. Sejiyama’s scans on Shodan revealed that these unsupported servers include versions such as Exchange Server 2007, Exchange Server 2010, and most instances of Exchange Server 2013.

Outdated Exchange servers found by ShadowServer and Sejiyama have many vulnerabilities that allow remote code execution. An important security problem is ProxyLogon (CVE-2021-26855) which, when combined with another bug (CVE-2021-27065), allows remote code execution. Sejiyama’s analysis shows that around 1,800 vulnerable Exchange systems are exposed to ProxyLogon, ProxyShell, or ProxyToken vulnerabilities.

Source: ShadowServer Foundation

Organizations have taken steps to deal with these vulnerabilities, but it’s important to know that these measures are not enough. Microsoft advises companies to prioritize updating servers connected to external networks. If servers are no longer supported, upgrading to a version that still receives security updates is the only viable option.

Organizations must act immediately to address the ongoing exploitation of these vulnerabilities and the large number of exposed servers. They should secure their Exchange servers and ensure they are using supported and updated software versions. This will help protect sensitive data and minimize risks.

Check Also

Malware Trends Review 2024: Ever Recorded Cyber Threats

Last year saw a significant rise in cyber threats, with malware becoming more advanced and …

Leave a Reply

Your email address will not be published. Required fields are marked *