Daniel StepanicAndrew Pease

Detection and response for the actively exploited ProxyShell vulnerabilities

지난 주에 Elastic Security는 ProxyShell과 관련된 Microsoft Exchange 취약점이 악용되는 것을 관찰했습니다. 게시물을 검토하여 이 활동에 대한 새로 공개된 세부 정보를 확인하세요.

1분 읽기보안 연구
활발하게 악용되고 있는 ProxyShell 취약점 탐지 및 대응

On August 21, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released an urgent notice related to the exploitation of ProxyShell vulnerabilities (CVE-2021-31207, CVE-2021-34473, CVE-2021-34523). By chaining these vulnerabilities together, threat actors are compromising unpatched Microsoft Exchange servers and gaining footholds into enterprise networks. Security vendors and researchers are also observing these attacks tied to post-exploitation behavior such as deploying ransomware to victim environments.

Elastic Security identified indicators of compromise (IoCs) indicating similar activity as reported by the industry. The details of this activity can be found in our Discuss forum, highlighting our perspective of what we have observed in our own telemetry.

Please visit the Discuss forum for full details on our identified IoCs.