Cyberint National Center specialists recently sent a notification about a ransomware campaign (called " Black Kingdom ") used to exploit MS Exchange's ProxyLogon vulnerabilities for encryption of servers. How does the attack work and what can you do to protect yourself?
The attacker uses these vulnerabilities to run a PowerShell script that downloads the ransomware executable from the " yuuuuu44 [.] Com " domain , then distributes it to other stations on the network. As an operating mode, the ransomware product encrypts files on the infected station using random extensions and creates a ransom text file (called decrypt_file.TxT or ReadMe.txt ) .
To prevent infection with this ransomware, we recommend that you urgently apply the latest updates available to vulnerable servers, if you haven't already!
Also, as additional protection measures, it is recommended:
use of an antivirus solution for servers
performing a regular backup (daily, weekly) for critical data and information. We recommend that data be saved on offline storage devices (servers, NAS, HDD), in protected locations, and that access be limited.
disable the RDP service on all stations and servers in the network, if it is not used or not necessarily necessary
setting the execution policy for PowerShell scripts in restricted mode .
UPDATE 16.03.2021
The use of the SD-WAN system is, therefore, an upgrade from outdated computer network frameworks of the past as they are detached from traffic management and hardware-based monitoring functions.
Microsoft released a new set of additional guidelines last night to investigate and fix local Exchange Server vulnerabilities.
Comments
Post a Comment