AGL 38.48 Decreased By ▼ -0.08 (-0.21%)
AIRLINK 203.02 Decreased By ▼ -4.75 (-2.29%)
BOP 10.17 Increased By ▲ 0.11 (1.09%)
CNERGY 6.54 Decreased By ▼ -0.54 (-7.63%)
DCL 9.58 Decreased By ▼ -0.41 (-4.1%)
DFML 40.02 Decreased By ▼ -1.12 (-2.72%)
DGKC 98.08 Decreased By ▼ -5.38 (-5.2%)
FCCL 34.96 Decreased By ▼ -1.39 (-3.82%)
FFBL 86.43 Decreased By ▼ -5.16 (-5.63%)
FFL 13.90 Decreased By ▼ -0.70 (-4.79%)
HUBC 131.57 Decreased By ▼ -7.86 (-5.64%)
HUMNL 14.02 Decreased By ▼ -0.08 (-0.57%)
KEL 5.61 Decreased By ▼ -0.36 (-6.03%)
KOSM 7.27 Decreased By ▼ -0.59 (-7.51%)
MLCF 45.59 Decreased By ▼ -1.69 (-3.57%)
NBP 66.38 Decreased By ▼ -7.38 (-10.01%)
OGDC 220.76 Decreased By ▼ -1.90 (-0.85%)
PAEL 38.48 Increased By ▲ 0.37 (0.97%)
PIBTL 8.91 Decreased By ▼ -0.36 (-3.88%)
PPL 197.88 Decreased By ▼ -7.97 (-3.87%)
PRL 39.03 Decreased By ▼ -0.82 (-2.06%)
PTC 25.47 Decreased By ▼ -1.15 (-4.32%)
SEARL 103.05 Decreased By ▼ -7.19 (-6.52%)
TELE 9.02 Decreased By ▼ -0.21 (-2.28%)
TOMCL 36.41 Decreased By ▼ -1.80 (-4.71%)
TPLP 13.75 Decreased By ▼ -0.02 (-0.15%)
TREET 25.12 Decreased By ▼ -1.33 (-5.03%)
TRG 58.04 Decreased By ▼ -2.50 (-4.13%)
UNITY 33.67 Decreased By ▼ -0.47 (-1.38%)
WTL 1.71 Decreased By ▼ -0.17 (-9.04%)
BR100 11,890 Decreased By -408.8 (-3.32%)
BR30 37,357 Decreased By -1520.9 (-3.91%)
KSE100 111,070 Decreased By -3790.4 (-3.3%)
KSE30 34,909 Decreased By -1287 (-3.56%)

SAN FRANCISCO: Microsoft on Tuesday moved to defend against a dangerous new threat to Exchange email servers while the fight continued against hackers taking advantage of a flaw patched last month.

The US Cybersecurity and Infrastructure Security Agency, part of the Department of Homeland Security, called on government departments to immediately install the latest software update released by Microsoft.

“These vulnerabilities pose an unacceptable risk to the Federal enterprise and require an immediate and emergency action,” CISA said in a notice.

“This determination is based on the likelihood of the vulnerabilities being weaponized, combined with the widespread use of the affected software across the Executive Branch and high potential for a compromise of integrity and confidentiality of agency information.”

Both CISA and Microsoft said it did not appear that hackers had taken advantage of the newly discovered weakness to break into Exchange email systems.

“Although we are not aware of any active exploits in the wild, our recommendation is to install these updates immediately to protect your environment,” Microsoft said in a post about the patch.

CISA and Microsoft said that the vulnerabilities were different from those fixed last month, when the US tech company disclosed that a state-sponsored hacking group operating out of China was exploiting security flaws in its Exchange email services to steal data from business users.

The company said the hacking group, which it has named “Hafnium,” is a “highly skilled and sophisticated actor.”

Hafnium has in the past targeted US-based companies including infectious disease researchers, law firms, universities, defense contractors, think tanks and NGOs.

The potentially devastating hack is believed to have affected at least 30,000 Microsoft email servers in government and private networks and has prompted calls for a firm response to state-sponsored attacks which could involve “hacking back” or other measures.

Microsoft in March released updates to fix the security flaws, which apply to on-premises versions of the software rather than cloud-based versions, and urged customers to apply them.

US Justice Department officials on Tuesday announced that, with backing from a court, they purged “malicious web shells” hackers had planted in hundreds of computers running Exchange Server software.

Web shells are bits of computer code that allow hackers to reach into computers remotely, and had been planted early this year by taking advantage of a weakness in Exchange, according to a Justice Department release.

“Today’s operation removed one early hacking group’s remaining web shells, which could have been used to maintain and escalate persistent, unauthorized access to US networks,” Justice Department officials said.

Comments

Comments are closed.