A global wave of
cyberattack
A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content.
The rising dependence on increasingly complex and inte ...
s and
data breach
A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of personal information".
Attackers have a variety of motives, from financial gain to political activism, political repression, and espionage. There ...
es began in January 2021 after four
zero-day exploits were discovered in
on-premises Microsoft Exchange Server
Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft. It runs exclusively on Windows Server operating systems.
The first version was called Exchange Server 4.0, to position it as the successor to the relat ...
s, giving attackers full access to user emails and passwords on affected servers,
administrator privileges on the server, and access to connected devices on the same network. Attackers typically install a
backdoor that allows the attacker full access to impacted servers even if the server is later updated to no longer be vulnerable to the original exploits. , it was estimated that 250,000 servers fell victim to the attacks, including servers belonging to around 30,000 organizations in the United States, 7,000 servers in the United Kingdom, as well as the
European Banking Authority
The European Banking Authority (EBA) is a regulatory agency of the European Union headquartered in La Défense, Île-de-France. Its activities include conducting stress tests on European banks to increase transparency in the European financi ...
, the
Norwegian Parliament
The Storting ( ; ) is the supreme legislature of Norway, established in 1814 by the Constitution of Norway. It is located in Oslo. The unicameral parliament has 169 members and is elected every four years based on party-list proportional represe ...
, and Chile's Commission for the Financial Market (CMF).
On 2 March 2021, Microsoft released updates for
Microsoft Exchange Server 2010, 2013, 2016 and 2019 to patch the exploit; this does not retroactively undo damage or remove any backdoors installed by attackers. Small and medium businesses, local institutions, and local governments are known to be the primary victims of the attack, as they often have smaller budgets to secure against cyber threats and typically outsource
IT services
Information technology service management (ITSM) are the activities performed by an organization to design, build, deliver, operate and control IT services offered to customers.
Differing from more technology-oriented IT management approach ...
to local providers that do not have the expertise to deal with cyber attacks.
On 12 March 2021, Microsoft announced the discovery of "a new family of
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
" being deployed to servers initially infected,
encrypting
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plain ...
all files, making the server inoperable and demanding payment to reverse the damage.
On 22 March 2021, Microsoft announced that in 92% of Exchange servers the exploit has been either patched or mitigated.
Background
Microsoft Exchange is a widely used email server software and a frequent target for cyberattacks on business networks. According to Microsoft, its environment allows attackers to misuse built-in administrative tools or scripts for malicious purposes. Microsoft Exchange has previously been targeted by nation-state
threat actors.
On 5 January 2021, security testing company DEVCORE reported the vulnerability to Microsoft, which Microsoft confirmed on 8 January. On 6 January 2021, cybersecurity company Volexity detected the first known breach of a Microsoft Exchange Server instance.
By late January, Volexity detected a breach that allowed attackers to access data from two of its customers and reported the vulnerability to Microsoft. Following Microsoft's notification of the breach, Volexity reported that the hackers became less discreet in anticipation of a
patch.
On 2 March 2021, cybersecurity company
ESET reported observing multiple threat actors, in addition to
Hafnium
Hafnium is a chemical element; it has symbol Hf and atomic number 72. A lustrous, silvery gray, tetravalent transition metal, hafnium chemically resembles zirconium and is found in many zirconium minerals. Its existence was predicted by Dm ...
, exploiting the vulnerabilities.
On 10 March 2021, ''
Wired
Wired may refer to:
Arts, entertainment, and media Music
* ''Wired'' (Jeff Beck album), 1976
* ''Wired'' (Hugh Cornwell album), 1993
* ''Wired'' (Mallory Knox album), 2017
* "Wired", a song by Prism from their album '' Beat Street''
* "Wired ...
'' reported that following the patch, additional threat actors were likely to
reverse engineer
Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompl ...
the fix to target unpatched servers. Analysts at two security firms reported observing signs that attackers were preparing to deploy
cryptomining software on affected servers.
On 10 March 2021, security researcher Nguyen Jang posted
proof-of-concept
A proof of concept (POC or PoC), also known as proof of principle, is an inchoate realization of a certain idea or method in order to demonstrate its feasibility or viability. A proof of concept is usually small and may or may not be complete ...
code to Microsoft-owned
GitHub
GitHub () is a Proprietary software, proprietary developer platform that allows developers to create, store, manage, and share their code. It uses Git to provide distributed version control and GitHub itself provides access control, bug trackin ...
demonstrating how the exploit works, consisting of 169 lines of code. The program was intentionally written with errors, allowing security researchers to understand the exploit while preventing
malicious actors from using the code to access servers. Later that day, GitHub removed the code, stating that it "contains proof-of-concept code for a recently disclosed vulnerability that is being actively exploited". On 13 March, another group independently published exploit code, which required minimal modification to function. The
CERT Coordination Center
The CERT Coordination Center (CERT/CC) is the coordination center of the computer emergency response team (CERT) for the Software Engineering Institute (SEI), a non-profit United States federally funded research and development center. The CERT ...
's Will Dormann stated that the "exploit is completely out of the bag by now".
The attacks came shortly after the
2020 United States federal government data breach
In 2020, a major cyberattack suspected to have been committed by a group backed by the Russian government penetrated thousands of organizations globally including multiple parts of the United States federal government, leading to a series of ...
, which also involved the compromise of Microsoft's Outlook web application and
supply chain
A supply chain is a complex logistics system that consists of facilities that convert raw materials into finished products and distribute them to end consumers or end customers, while supply chain management deals with the flow of goods in distri ...
. Microsoft stated that there was no connection between the two incidents.
Perpetrator
Microsoft said that the attack was initially perpetrated by the
Hafnium
Hafnium is a chemical element; it has symbol Hf and atomic number 72. A lustrous, silvery gray, tetravalent transition metal, hafnium chemically resembles zirconium and is found in many zirconium minerals. Its existence was predicted by Dm ...
, a Chinese state-sponsored hacking group (
advanced persistent threat
An advanced persistent threat (APT) is a stealthy threat actor, typically a State (polity), state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the ...
) that operates out of China.
Hafnium is known to install the web shell
China Chopper.
Microsoft identified Hafnium as "a highly skilled and sophisticated actor" that historically has mostly targeted "entities in the United States for the purpose of exfiltrating information from a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks and NGOs."
[ Announcing the hack, Microsoft stated that this was "the eighth time in the past 12 months that Microsoft has publicly disclosed nation-state groups targeting institutions critical to civil society."][ As of 12 March 2021, there were, in addition to Hafnium, at least nine other distinct groups exploiting the vulnerabilities, each different styles and procedures.]
The Chinese government denied involvement, calling the accusations "groundless."
In a July 19, 2021 joint statement, the US, UK, EU, NATO
The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
, and other Western nations
The Western world, also known as the West, primarily refers to various nations and states in Western Europe, Northern America, and Australasia; with some debate as to whether those in Eastern Europe and Latin America also constitute the West. ...
accused the Ministry of State Security (MSS) of perpetrating the Exchange breach, along with other cyberattacks, "attributing with a high degree of confidence that malicious cyber actors affiliated with PRC’s MSS conducted cyber espionage operations utilizing the zero-day vulnerabilities in Microsoft Exchange Server
Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft. It runs exclusively on Windows Server operating systems.
The first version was called Exchange Server 4.0, to position it as the successor to the relat ...
disclosed in early March 2021."
Methodology
Hackers took advantage of four separate zero-day vulnerabilities to compromise Microsoft Exchange servers' Outlook Web Access (OWA), giving them access to victims' entire servers and networks as well as to emails and calendar invitations, only at first requiring the address of the server, which can be directly targeted or obtained by mass-scanning for vulnerable servers; the attacker then uses two exploits, the first allowing an attacker to connect to the server and falsely authenticate
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating ...
as a standard user. With that, a second vulnerability can then be exploited, escalating that user access to administrator privileges. The final two exploits allow attackers to upload code to the server in any location they wish, that automatically runs with these administrator privileges. Attackers then typically use this to install a web shell
A web shell is a Shell (computing), shell-like interface that enables a web server to be remotely accessed, often for the purposes of cyberattacks. A web shell is unique in that a web browser is used to interact with it.
A web shell could be pro ...
, providing a backdoor to the compromised server, which gives hackers continued access to the server as long as both the web shell remains active and the Exchange server remains on.
Through the web shell
A web shell is a Shell (computing), shell-like interface that enables a web server to be remotely accessed, often for the purposes of cyberattacks. A web shell is unique in that a web browser is used to interact with it.
A web shell could be pro ...
installed by attackers, commands can be run remotely. Among the actions observed are the downloading of all emails from servers, downloading the passwords and email addresses of users as Microsoft Exchange stores these unencrypted in memory
Memory is the faculty of the mind by which data or information is encoded, stored, and retrieved when needed. It is the retention of information over time for the purpose of influencing future action. If past events could not be remembe ...
, adding users, adding further backdoors to affected systems, accessing other systems in the network that are unsusceptible to the original exploit, and installing ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
. As patching the Exchange server against the exploit does not retroactively remove installed backdoors, attackers continue to have access to the server until the web shell, other backdoors and user accounts added by attackers are removed.
On 27 and 28 February 2021, there was an automated attack, and on 2 and 3 March 2021, attackers used a script to return to the addresses to drop a web shell to enable them to return later. Referring to the week ending 7 March, CrowdStrike
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides endpoint security, threat intelligence, and cyberattack response services.
The company has been involved in investigations of seve ...
co-founder Dmitri Alperovitch stated: "Every possible victim that hadn't patched by mid-to-end of last week has already been hit by at least one or several actors". After the patch was announced, the tactics changed when using the same chain of vulnerabilities.
Microsoft Exchange Server versions of 2010, 2013, 2016 and 2019 were confirmed to be susceptible, although vulnerable editions are yet to be fully determined. Cloud-based services Exchange Online and Office 365
Microsoft 365 (previously called Office 365) is a product family of productivity software, collaboration and cloud-based services owned by Microsoft. It encompasses online services such as Outlook.com, OneDrive, Microsoft Teams, programs form ...
are not affected.
Impact
Hackers have exploited the vulnerabilities to spy on a wide range of targets, affecting an estimated 250,000 servers. Tom Burt, Microsoft's vice president for Customer Security & Trust, wrote that targets had included disease researchers, law offices, universities, defense contractors, non-governmental organizations
A non-governmental organization (NGO) is an independent, typically nonprofit organization that operates outside government control, though it may get a significant percentage of its funding from government or corporate sources. NGOs often focus ...
, and think tanks
A think tank, or public policy institute, is a research institute that performs research and advocacy concerning topics such as social policy, political strategy, economics, military, technology, and culture. Most think tanks are non-gov ...
.
Automatic updates are typically disabled by server administrators to avoid disruption from downtime
In computing and telecommunications, downtime (also (system) outage or (system) drought colloquially) is a period when a system is unavailable. The unavailability is the proportion of a time-span that a system is unavailable or offline.
This is ...
and problems in software, and are by convention installed manually by server administrators after these updates are tested with the existing software and server-setup; as smaller organizations often operate under a smaller budget to do this in-house or otherwise outsource this to local IT providers without expertise in cybersecurity, this is often not done until it becomes a necessity, if ever. This means small and medium businesses, and local institutions such as schools and local governments are known to be the primary victims of the attack as they are more likely to not have received updates to patch the exploit. Rural victims are noted to be "largely on their own", as they are typically without access to IT service providers. On 11 March 2021, Check Point Research
Check or cheque, may refer to:
Places
* Check, Virginia
Arts, entertainment, and media
* ''Check'' (film), a 2021 Indian Telugu-language film
* "The Check" (''The Amazing World of Gumball''), a 2015 episode of ''The Amazing World of Gumball''
...
revealed that in the prior 24 hours "the number of exploitation attempts on organizations it tracks tripled every two to three hours."
Check Point Research has observed the United States
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
as being the most attacked country with 17% of all exploit attempts, followed by Germany
Germany, officially the Federal Republic of Germany, is a country in Central Europe. It lies between the Baltic Sea and the North Sea to the north and the Alps to the south. Its sixteen States of Germany, constituent states have a total popu ...
with 6%, the United Kingdom and the Netherlands
, Terminology of the Low Countries, informally Holland, is a country in Northwestern Europe, with Caribbean Netherlands, overseas territories in the Caribbean. It is the largest of the four constituent countries of the Kingdom of the Nether ...
both at 5%, and Russia
Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
with 4% of all exploits; government
A government is the system or group of people governing an organized community, generally a State (polity), state.
In the case of its broad associative definition, government normally consists of legislature, executive (government), execu ...
/military
A military, also known collectively as armed forces, is a heavily armed, highly organized force primarily intended for warfare. Militaries are typically authorized and maintained by a sovereign state, with their members identifiable by a d ...
is the most targeted sector with 23% of exploit attempts, followed by manufacturing
Manufacturing is the creation or production of goods with the help of equipment, labor, machines, tools, and chemical or biological processing or formulation. It is the essence of the
secondary sector of the economy. The term may refer ...
at 15%, banking
A bank is a financial institution that accepts Deposit account, deposits from the public and creates a demand deposit while simultaneously making loans. Lending activities can be directly performed by the bank or indirectly through capital m ...
and financial services
Financial services are service (economics), economic services tied to finance provided by financial institutions. Financial services encompass a broad range of tertiary sector of the economy, service sector activities, especially as concerns finan ...
at 14%, software vendors with 7% and healthcare at 6%.
The attack was discovered after attackers were discovered downloading all emails belonging to specific users on separate corporate Exchange servers. An undisclosed Washington
Washington most commonly refers to:
* George Washington (1732–1799), the first president of the United States
* Washington (state), a state in the Pacific Northwest of the United States
* Washington, D.C., the capital of the United States
** A ...
think tank reported attackers sending convincing emails to contacts in a social engineering attack that encouraged recipients to click on a link. On 11 March 2021, Norway's parliament, the Storting
The Storting ( ; ) is the supreme legislature of Norway, established in 1814 by the Constitution of Norway. It is located in Oslo. The Unicameralism, unicameral parliament has 169 members and is elected every four years based on party-list propo ...
, reported being a victim of the hack, stating that "data has been extracted."
The European Banking Authority
The European Banking Authority (EBA) is a regulatory agency of the European Union headquartered in La Défense, Île-de-France. Its activities include conducting stress tests on European banks to increase transparency in the European financi ...
also reported that it had been targeted in the attack, later stating in a press release that the scope of impact on its systems was "limited" and that "the confidentiality of the EBA systems and data has not been compromised".
Security company ESET identified "at least 10" advanced persistent threat
An advanced persistent threat (APT) is a stealthy threat actor, typically a State (polity), state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the ...
groups compromising IT, cybersecurity, energy, software development, public utility
A public utility company (usually just utility) is an organization that maintains the infrastructure for a public service (often also providing a service using that infrastructure). Public utilities are subject to forms of public control and ...
, real estate, telecommunications and engineering businesses, as well as Middle Eastern and South American governmental agencies. One APT group was identified deploying PowerShell
PowerShell is a shell program developed by Microsoft for task automation and configuration management. As is typical for a shell, it provides a command-line interpreter for interactive use and a script interpreter for automation via a langu ...
downloaders, using affected servers for cryptocurrency mining. Cybereason CEO Lior Div noted that APT group Hafnium "targeted small and medium-sized enterprises ... The assault against Microsoft Exchange is 1,000 times more devastating than the SolarWinds attack."
On 12 March 2021, Microsoft Security Intelligence announced "a new family of ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
" called DearCry being deployed to the servers that had been initially infected, encrypting device contents, making servers unusable and demanding payment to recover files. Microsoft stated: "There is no guarantee that paying the ransom will give you access to your files."
On 18 March 2021, an affiliate of ransomware cybergang REvil claimed they had stolen unencrypted data from Taiwanese hardware and electronics corporation Acer, including an undisclosed number of devices being encrypted, with cybersecurity firm Advanced Intel linking this data breach and ransomware attack to the Microsoft Exchange exploits. Advanced Intel detected one of Acer's Microsoft Exchange servers first being targeted on 5 March 2021. REvil has demanded a $50 million U.S. dollar
The United States dollar (symbol: $; currency code: USD) is the official currency of the United States and several other countries. The Coinage Act of 1792 introduced the U.S. dollar at par with the Spanish silver dollar, divided it int ...
ransom, claiming if this is paid they would "provide a decryptor, a vulnerability report, and the deletion of stolen files", and stating that the ransom would double to $100 million U.S. dollars if not paid on 28 March 2021.
Responses
On 2 March 2021, the Microsoft Security Response Center (MSRC) publicly posted an out-of-band Common Vulnerabilities and Exposures
The Common Vulnerabilities and Exposures (CVE) system, originally Common Vulnerability Enumeration, provides a reference method for publicly known information security, information-security vulnerability (computing), vulnerabilities and exposures ...
(CVE) release, urging its clients to patch their Exchange servers to address a number of critical vulnerabilities
Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves ...
. On 15 March, Microsoft released a one-click PowerShell
PowerShell is a shell program developed by Microsoft for task automation and configuration management. As is typical for a shell, it provides a command-line interpreter for interactive use and a script interpreter for automation via a langu ...
tool, The Exchange On-Premises Mitigation Tool, which installs the specific updates protecting against the threat, runs a malware scan which also detects installed web shells, and removes threats that were detected; this is recommended as a temporary mitigation measure, as it does not install other available updates.
On 3 March 2021, the U.S. Cybersecurity and Infrastructure Security Agency
The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government, coordinating cyber ...
(CISA) issued an emergency directive forcing government networks to update to a patched version of Exchange. On 8 March, CISA tweeted what NBC News
NBC News is the news division of the American broadcast television network NBC. The division operates under NBCUniversal Media Group, a division of NBCUniversal, which is itself a subsidiary of Comcast. The news division's various operations r ...
described as an "unusually candid message" urging "ALL organizations across ALL sectors" to address the vulnerabilities.
Other official bodies expressing concerns included the White House
The White House is the official residence and workplace of the president of the United States. Located at 1600 Pennsylvania Avenue Northwest (Washington, D.C.), NW in Washington, D.C., it has served as the residence of every U.S. president ...
, Norway's National Security Authority and the Czech Republic's Office for Cyber and Information Security. On 7 March 2021, CNN
Cable News Network (CNN) is a multinational news organization operating, most notably, a website and a TV channel headquartered in Atlanta. Founded in 1980 by American media proprietor Ted Turner and Reese Schonfeld as a 24-hour cable ne ...
reported that the Biden administration
Joe Biden's tenure as the List of presidents of the United States, 46th president of the United States began with Inauguration of Joe Biden, his inauguration on January 20, 2021, and ended on January 20, 2025. Biden, a member of the Democr ...
was expected to form a task force to address the breach; the Biden administration has invited private-sector organizations to participate in the task force and will provide them with classified information as deemed necessary. U.S. National Security Advisor Jake Sullivan
Jacob Jeremiah Sullivan (born November 28, 1976) is an American attorney who served as the National Security Advisor (United States), U.S. national security advisor from 2021 to 2025 under President Joe Biden.
Sullivan previously served as Dire ...
stated that the U.S. is not yet in a position to attribute blame for the attacks.
In July 2021, the Biden administration, along with a coalition of Western allies, formally blamed China for the cyber attack. The administration highlighted the ongoing threat of from Chinese hackers, but did not accompany the condemnation with any form of sanctions. According to White House press secretary Jen Psaki, the administration is not ruling out future consequences for China.
See also
* Chinese cyberwarfare
Cyberwarfare is the strategic use of computer technology to disrupt the functions of a state or organization, specifically through the deliberate targeting of information systems for military or tactical purposes. In the People's Republic of Chin ...
* Chinese espionage in the United States
* Cyberwarfare in the United States
Cyberwarfare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the United States ...
* Global surveillance disclosures (2013–present)
During the 2010s, international media reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leake ...
* List of data breaches
This is a list of reports about data breaches, using data compiled from various sources, including press reports, government news releases, and mainstream news articles. The list includes those involving the theft or compromise of 30,000 or more ...
* 2020 United States federal government data breach
In 2020, a major cyberattack suspected to have been committed by a group backed by the Russian government penetrated thousands of organizations globally including multiple parts of the United States federal government, leading to a series of ...
References
{{Hacking in the 2020s
2021 in computing
Internet security
Microsoft software
Computer security exploits
Cyberattacks
Data breaches
Hacking in the 2020s
Software bugs