State-sponsored hacking group Hafnium, operating out of mainland China, responsible for Microsoft mail server hack, firms announce
Microsoft and other security experts have identified a state-sponsored hacking group called Hafnium, that is operating out of mainland China.
In a blog post, Tom Burt, corporate VP of customer security and trust, said that Hafnium is a highly skilled and sophisticated actor, that “primarily targets entities in the United States for the purpose of exfiltrating information from a number of industry sectors.”
Targetted sectors include infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks and NGOs.
Mail server hack
And Microsoft Threat Intelligence Center (MSTIC) has identified Hafnium for exploiting flaws in Microsoft mail server software in order to mine email inboxes.
“Recently, Hafnium has engaged in a number of attacks using previously unknown exploits targeting on-premises Exchange Server software,” wrote Burt. “The attacks included three steps. First, it would gain access to an Exchange Server either with stolen passwords or by using the previously undiscovered vulnerabilities to disguise itself as someone who should have access.”
“Second, it would create what’s called a web shell to control the compromised server remotely,” said Burt. “Third, it would use that remote access – run from the US-based private servers – to steal data from an organisation’s network.”
Burt said that in order to protect customers from the exploits, Microsoft has released security updates that will protect customers running Exchange Server.
“We strongly encourage all Exchange Server customers to apply these updates immediately,” said Burt. “Exchange Server is primarily used by business customers, and we have no evidence that Hafnium’s activities targeted individual consumers or that these exploits impact other Microsoft products.”
Microsoft said that it has briefed appropriate US government agencies on this activity.
“This is the eighth time in the past 12 months that Microsoft has publicly disclosed nation-state groups targeting institutions critical to civil society; other activity we disclosed has targeted healthcare organisations fighting Covid-19, political campaigns and others involved in the 2020 elections, and high-profile attendees of major policymaking conferences,” noted Burt.
“We’re grateful to researchers at Volexity and Dubex who notified us about aspects of this new Hafnium activity and worked with us to address it in a responsible way,” said Burt.
A US senator and some other figures have blamed a known Microsoft flaw for the SolarWinds supply chain attack.
But Microsoft has denied this.
In January multiple US intelligence agencies declared that Russia was the likely culprit of the damaging SolarWinds supply chain compromise.
In a separate blog post, cyber-security firm Volexity said that in January it had noticed the hackers use one of the vulnerabilities to remotely steal “the full contents of several user mailboxes.”
China opposes all forms of cyber-attacks, Chinese foreign ministry spokesman Wang Wenbin was quoted by Reuters as saying at a news briefing in Beijing on Wednesday.
“China wishes relevant media and companies take a professional and responsible attitude, and base characterisations of cyber-attacks on ample evidence, rather than groundless guesses and accusations,” he said.