| 
		Microsoft says Chinese hackers targeted groups via server software
		 Send a link to a friend 
		
		 [March 03, 2021]  By 
		Raphael Satter and Christopher Bing 
 WASHINGTON (Reuters) - A China-linked 
		cyber-espionage group has been remotely plundering email inboxes using 
		freshly discovered flaws in Microsoft mail server software, the company 
		and outside researchers said on Tuesday - an example of how commonly 
		used programs can be exploited to cast a wide net online.
 
 In a blog post, Microsoft said the hacking campaign made use of four 
		previously undetected vulnerabilities in different versions of the 
		software and was the work of a group it dubs HAFNIUM, which it described 
		as a state-sponsored entity operating out of China.
 
		
		 
		
 In a separate blog post, cyber-security firm Volexity said that in 
		January it had seen the hackers use one of the vulnerabilities to 
		remotely steal "the full contents of several user mailboxes." All they 
		needed to know were the details of Exchange server and of the account 
		they wanted to pillage, Volexity said.
 
 China opposes all forms of cyber-attacks, Chinese foreign ministry 
		spokesman Wang Wenbin said at a news briefing in Beijing on Wednesday.
 
 "China wishes relevant media and companies take a professional and 
		responsible attitude, and base characterizations of cyber-attacks on 
		ample evidence, rather than groundless guesses and accusations," he 
		said.
 
 Ahead of the Microsoft announcement, the hackers' increasingly 
		aggressive moves began to attract attention across the cybersecurity 
		community.
 
 Mike McLellan, director of intelligence for Dell Technologies Inc's 
		Secureworks, said ahead of the Microsoft announcement that he had 
		noticed a sudden spike in activity touching Exchange servers overnight 
		on Sunday, with around 10 customers affected at his firm.
 
		
            [to top of second column] | 
            
			 
            
			 A computer keyboard lit 
			by a displayed cyber code is seen in this illustration picture taken 
			on March 1, 2017. REUTERS/Kacper Pempel/Illustration 
            
			 
Microsoft's suite of products has been under scrutiny since the hack of 
SolarWinds, the Texas-based software firm that served as a springboard for 
several intrusions across government and the private sector. In other cases, 
hackers took advantage of the way customers had set up their Microsoft services 
to compromise their targets or dive further into affected networks.
 Hackers who went after SolarWinds also breached Microsoft itself, accessing and 
downloading source code - including elements of Exchange, the company's email 
and calendaring product.
 
 McLellan said that for now, the hacking activity he had seen appeared focused on 
seeding malicious software and setting the stage for a potentially deeper 
intrusion rather than aggressively moving into networks right away.
 
 "We haven't seen any follow-on activity yet," he said. "We're going to find a 
lot of companies affected but a smaller number of companies actually exploited."
 
 
 
Microsoft said targets included infectious disease researchers, law firms, 
higher education institutions, defense contractors, policy think tanks, and 
non-governmental groups.
 
 (Reporting by Raphael Satter and Christopher Bing; Editing by Dan Grebler and 
Raju Gopalakrishnan)
 
				 
			[© 2021 Thomson Reuters. All rights 
				reserved.] Copyright 2021 Reuters. All rights reserved. This material may not be published, 
			broadcast, rewritten or redistributed.  
			Thompson Reuters is solely responsible for this content. |