16 Mar Serious vulnerability in Microsoft Exchange Server
Serious vulnerability in Microsoft Exchange Server
16 March, 2021
At the beginning of this month, the National Cyber Security Centre (NCSC) drew attention to serious vulnerabilities in Microsoft Exchange Server, an e-mail platform that is widely used by businesses and governments. Both the probability and the damage have been classified as high by the NCSC. It has since also become known that there is wide-scale misuse of these vulnerabilities.
What can go wrong?
If the vulnerabilities are exploited, it becomes possible to bypass the Microsoft Exchange Server authentication and install external code (malware) on business networks. This gives malicious parties access to all e-mail correspondence and e-mail addresses, enabling them to copy and forward them to an external address for further abuse. By installing malware, cyber criminals can also gain access to the Exchange environment for longer, even until after the released patches have been installed. The result is that your network remains vulnerable to further compromise.
What can be done?
As so often, the best defence is to install all available patches as soon as possible, and to continue monitoring the computer network extensively for possible abuse. If you suspect a breach or hack, make sure to call in the help of a reputed specialist and, if necessary, report the incident to the police and the Dutch Data Protection Authority (Dutch DPA).
Would you like to know whether your business is vulnerable or if there has already been a breach? Please contact our specialists as soon as possible:
Lucas Vousten | email@example.com | +31 (0)40 240 9516
Ties Meesters | firstname.lastname@example.org | +31 (0)40 240 9459
Joost kemps | email@example.com | +31 (0)40 240 9449
With our knowledge and by using the right tools, we can identify what has occurred in your computer network.