Daniel StepanicAndrew Pease

Detection and response for the actively exploited ProxyShell vulnerabilities

上周,Elastic Security 观察到与 ProxyShell 相关的 Microsoft Exchange 漏洞被利用。 查看该帖子来查找有关此活动的最新发布的详细信息。

阅读时间:1 分钟安全研究
ProxyShell 漏洞主动利用检测及响应

On August 21, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released an urgent notice related to the exploitation of ProxyShell vulnerabilities (CVE-2021-31207, CVE-2021-34473, CVE-2021-34523). By chaining these vulnerabilities together, threat actors are compromising unpatched Microsoft Exchange servers and gaining footholds into enterprise networks. Security vendors and researchers are also observing these attacks tied to post-exploitation behavior such as deploying ransomware to victim environments.

Elastic Security identified indicators of compromise (IoCs) indicating similar activity as reported by the industry. The details of this activity can be found in our Discuss forum, highlighting our perspective of what we have observed in our own telemetry.

Please visit the Discuss forum for full details on our identified IoCs.