Monday, August 23, 2021

Lockfile Ransomware hackers again targeting Microsoft Exchange Server Vulnerability

LockFile Ransomware hackers are again seen targeting vulnerabilities that were officially patched by Microsoft in March 2021. And news is out that the said file encrypting malware has already targeted some well-known companies belonging to manufacturing, finance engineering and tourism sector operating in US and Asia on a specific note.

Researchers from Cybersecurity firm Symantec were the first to detect such malicious activity on the web and have released an alert to all companies across the globe, saying that the situation might deteriorate and turn worse if the IT staff and CTOs do not pay attention.

Kevin Beaumont, the former staff member of Microsoft, was the first to alert the world on this issue and, based on his warning, Symantec reiterated the exchange server hack cautionary as a fact in its latest media update.

Therefore, all those using Microsoft Exchange Servers (on premise and not the cloud based Office 365) should be cautious about the remote code execution vulnerabilities say experts and this includes 8 federal organizations working for the US Government and includes systems running for Department of Homeland Security’s Cybersecurity and Infrastructure Security shortly known as CISA.

Mr. Beaumont has released an online tool to allow email exchange servers to scan for Exchange Server vulnerability 2021 and the National Computer Emergency Response Team in Austria has become the first user to scan so.

Meanwhile, CISA has reacted to the LockFile Ransomware threat and is urging companies to update their Exchange Servers software with the May 2021 released fix that remediates three Proxyshell Vulnerabilities that prevent them from falling prey to Microsoft exchange server hack 2021.

The post Lockfile Ransomware hackers again targeting Microsoft Exchange Server Vulnerability appeared first on Cybersecurity Insiders.


August 23, 2021 at 08:48PM

0 comments:

Post a Comment