At least 30,000 organizations across the United States — including a significant number of small businesses, towns, cities and local governments — have over the past few days been hacked by an unusually aggressive Chinese cyber espionage unit that’s focused on stealing email from victim organizations, multiple sources tell KrebsOnSecurity. The espionage group is exploiting four newly-discovered flaws in Microsoft Exchange Server email software, and has seeded hundreds of thousands of victim organizations worldwide with tools that give the attackers total, remote control over affected systems.
On March 2, Microsoft released emergency security updates to plug four security holes in Exchange Server versions 2013 through 2019 that hackers were actively using to siphon email communications from Internet-facing systems running Exchange.
Microsoft said the Exchange flaws are being targeted by a previously unidentified Chinese hacking crew it dubbed “Hafnium,” and said the group had been conducting targeted attacks on email systems used by a range of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs.
In the three days since then, security experts say the same Chinese cyber espionage group has dramatically stepped up attacks on any vulnerable, unpatched Exchange servers worldwide.
In each incident, the intruders have left behind a “web shell,” an easy-to-use, password-protected hacking tool that can be accessed over the Internet from any browser. The web shell gives the attackers administrative access to the victim’s computer servers.
Speaking on condition of anonymity, two cybersecurity experts who’ve briefed U.S. national security advisors on the attack told KrebsOnSecurity the Chinese hacking group thought to be responsible has seized control over “hundreds of thousands” of Microsoft Exchange Servers worldwide — with each victim system representing approximately one organization that uses Exchange to process email.
Microsoft’s initial advisory about the Exchange flaws credited Reston, Va. based Volexity for reporting the vulnerabilities. Volexity President Steven Adair said the company first saw attackers quietly exploiting the Exchange bugs on Jan. 6, 2021, a day when most of the world was glued to television coverage of the riot at the U.S. Capitol.
But Adair said that over the past few days the hacking group has shifted into high gear, moving quickly to scan the Internet for Exchange servers that weren’t yet protected by the security updates Microsoft released Tuesday.
“We’ve worked on dozens of cases so far where web shells were put on the victim system back on Feb. 28 [before Microsoft announced its patches], all the way up to today,” Adair said. “Even if you patched the same day Microsoft published its patches, there’s still a high chance there is a web shell on your server. The truth is, if you’re running Exchange and you haven’t patched this yet, there’s a very high chance that your organization is already compromised.”
Reached for comment, Microsoft said it is working closely with the U.S. Cybersecurity & Infrastructure Security Agency (CISA), other government agencies, and security companies, to ensure it is providing the best possible guidance and mitigation for its customers.
“The best protection is to apply updates as soon as possible across all impacted systems,” a Microsoft spokesperson said in a written statement. “We continue to help customers by providing additional investigation and mitigation guidance. Impacted customers should contact our support teams for additional help and resources.”
Meanwhile, CISA has issued an emergency directive ordering all federal civilian departments and agencies running vulnerable Microsoft Exchange servers to either update the software or disconnect the products from their networks.
Adair said he’s fielded dozens of calls today from state and local government agencies that have identified the backdoors in their Exchange servers and are pleading for help. The trouble is, patching the flaws only blocks the four different ways the hackers are using to get in. But it does nothing to undo the damage that may already have been done.
White House press secretary Jen Psaki told reporters today the vulnerabilities found in Microsoft’s widely used Exchange servers were “significant,” and “could have far-reaching impacts.”
“We’re concerned that there are a large number of victims,” Psaki said.
By all accounts, rooting out these intruders is going to require an unprecedented and urgent nationwide clean-up effort. Adair and others say they’re worried that the longer it takes for victims to remove the backdoors, the more likely it is that the intruders will follow up by installing additional backdoors, and perhaps broadening the attack to include other portions of the victim’s network infrastructure.
Security researchers have published several tools for detecting vulnerable servers. One of those tools, a script from Microsoft’s Kevin Beaumont, is available from Github.
KrebsOnSecurity has seen portions of a victim list compiled by running such a tool, and it is not a pretty picture. The backdoor web shell is verifiably present on the networks of thousands of U.S. organizations, including banks, credit unions, non-profits, telecommunications providers, public utilities and police, fire and rescue units.
“It’s police departments, hospitals, tons of city and state governments and credit unions,” said one source who’s working closely with federal officials on the matter. “Just about everyone who’s running self-hosted Outlook Web Access and wasn’t patched as of a few days ago got hit with a zero-day attack.”
Another government cybersecurity expert who participated in a recent call with multiple stakeholders impacted by this hacking spree worries the cleanup effort required is going to be Herculean.
“On the call, many questions were from school districts or local governments that all need help,” the source said, speaking on condition they were not identified by name. “If these numbers are in the tens of thousands, how does incident response get done? There are just not enough incident response teams out there to do that quickly.”
When it released patches for the four Exchange Server flaws on Tuesday, Microsoft emphasized that the vulnerability did not affect customers running its Exchange Online service (Microsoft’s cloud-hosted email for businesses). But sources say the vast majority of the organizations victimized so far are running some form of Internet-facing Microsoft Outlook Web Access (OWA) email systems in tandem with Exchange servers internally.
“It’s a question worth asking, what’s Microsoft’s recommendation going to be?,” the government cybersecurity expert said. “They’ll say ‘Patch, but it’s better to go to the cloud.’ But how are they securing their non-cloud products? Letting them wither on the vine.”
The government cybersecurity expert said this most recent round of attacks is uncharacteristic of the kinds of nation-state level hacking typically attributed to China, which tends to be fairly focused on compromising specific strategic targets.
“Its reckless,” the source said. “It seems out of character for Chinese state actors to be this indiscriminate.”
Microsoft has said the incursions by Hafnium on vulnerable Exchange servers are in no way connected to the separate SolarWinds-related attacks, in which a suspected Russian intelligence group installed backdoors in network management software used by more than 18,000 organizations.
“We continue to see no evidence that the actor behind SolarWinds discovered or exploited any vulnerability in Microsoft products and services,” the company said.
Nevertheless, the events of the past few days may well end up far eclipsing the damage done by the SolarWinds intruders.
This is a fast-moving story, and likely will be updated multiple times throughout the day. Stay tuned.
Update, 8:27 p.m. ET: Wired cybersecurity reporter Andy Greenberg has confirmed hearing the same number of victim numbers cited in this report: “It’s massive. Absolutely massive,” one former national security official with knowledge of the investigation told WIRED. “We’re talking thousands of servers compromised per hour, globally.” Read Greenberg’s account here.
Also, the first and former director of CISA, Chris Krebs (no relation) seems to be suggesting on Twitter that the victim numbers cited here are conservative (or just outdated already):
Update 8:49 p.m. ET: Included a link to one of the more recommended tools for finding systems vulnerable to this attack.
Update, 10:17 p.m. ET: Added mention from Reuters story, which said White House officials are concerned about “a large number of victims.”
Update, March 6, 10:56 a.m. ET: CISA’s Twitter account says the agency “is aware of widespread domestic and international exploitation of Microsoft Exchange Server vulnerabilities and urges scanning Exchange Server logs with Microsoft’s detection tool to help determine compromise.”
Further Reading:
I reported to Microsoft/ support back in January that my email wasn’t working properly. I kept sending emails to support to Microsoft and was ignored. I got an email from Microsoft supposedly, telling me they warned me they would close my account if I didn’t change my password and update my account. Even after that I still wasn’t getting my emails. I would get some emails days after they were sent. They were lagging up to two weeks behind. I found current emails are going to delete before I have had a chance to read them, and still are today. I had to switch to another account. My debit card kept getting charges that I didn’t make. Fortunately my credit union caught it each time. Since January I had to change my card 3 times, January, February, and now March.
My emails are acting up repeating their selves
What am I to do?
My list of emails has recently been full of email that are written in only Chinese symbols. I couldn’t understand anything in them so deleted them with out opening. Now I know why. But what kind of damage has been done and where do I find the fix to this hack?
It hit me via Android and Windows AD Azure with ALL pat he’s up-to-date. Also hit Microcenter, because I was hit again yesterday from my Microcenter account. They’re using Yahoo.com contact lists even with 2 factor authentication & SSL certificates.
Who do we contact for help?!
I smell lawsuit !!
They infected my wifi…anyone who gets on it there phone goes crazy, same with our house phone it says in use when no one is on it. I had to unplug everything. I found those root files on my devices they won’t erase.
None of my emails are working. I am missing all kids of important information. Fix this hacking stealing information people. Do something people
Fix my new phone
Yahoo Mail has quit Amazon has quit and my bank also
Email and many apps on brand new phone crashed
How do we fix this. Everything is crashing on my device
I can’t open up any of my apps on my phone and I got a weird text earlier and it had Nium in two of the text messages then it disappeared. I’m scared about this hacking my back account info. I shouldn’t have downloaded this Microsoft app. Please help up fix this. Who do I call to help get my apps fixed on my phone
My app will not open
Can not get onto my personal email accounts with yahoo and there are 2 access. One is personal/expense & 1 for online shopping. It started on 3/22/21 & continues. I guess going back to paper statements and paying by check will be best. This is awful.
Can not get into my account
No apps working.after down loading to microsoft 1.
Nothing is working! Email weather etc. My phone is brand new! Help!
I have been crash reports ans spam emails for 2days
Yahoo email, Google search, Amazon, Walgreens, potentially others fail to open. HELP!!!
Has been hack cannot open the the gmail account please help.!!
My friend told me I needed to go into Google play store to my apps and delete the update on Android webview. I did it and now I can get back into my apps again. He did say the new update is okay to load.
Lookout just informed me my personal information have been hack in Microsoft and to change pw
This has been in my phone and computer since back in at least nov of 2020 possibly October. It’s a dam mess… they are mirroring websites getting passwords. They are in my routers my modems phones computers everything. They are changing the info inside the devices. Listening to conversations recording… and on and on…. anything Bluetooth they are attacking… where do I stop??
For anyone commenting that their android apps are crashing (samsung in particular) you need to do the following:
Settings > Apps > Three dots in the right corner > SamsungApps/System apps > look for Android System Webview > Uninstall updates.
Please do not uninstall the actual application or it can cause problems elsewhere.
Also, don’t just assume I have your best ineterest at hear and implement it without first checking if this is the correct way to fix the problem. Just search online for “fix android apps crashing”.
It keeps saying my Kroger app has been hacked I have at&t SecurityAnd it says about 30 of my passwords are compromised does this mean I have Been hacked need help please
My apps are crashing I can’t open some of my apps
I’ve been hacked and they have all my personal info along with all my acts n card info what do u do
Sorry this is not are real alert either they just are gathering your info again
I hate this
My small business has been affected across all boards to many unbelievable heartbreaking accounts to mention. I was charged and subscribed to several accounts I didn’t sign up for this is horrible!!!