If you rely on a Microsoft Exchange server to handle email for your company, there is something you should be aware of. Recent research by security and analytics company Varonis has discovered that an affiliate of Hive ransomware has begun targeting Exchange servers that are vulnerable to ProxyShell security issues.

If the group in question finds a vulnerable server, they’ll install a variety of backdoors including Cobalt Strike beacon. That allows them to come back later and snoop around in your network for anything of value, steal administrator account credentials, make off with your company’s proprietary data, or encrypt your files and demand payment from you to get them back.

The exploited flaws are being tracked as CVE-2021-34473, CVE-2021-34523, and CVE-2021-31297. All 3 range in severity from 7.2 (high) to 9.8 (critical).

This group is hardly unique in exploiting these flaws.  They’ve been used by other hacker groups including Cuba, Babuk, BlackByte, Conti, and others.  The fact that the exploits seem to be growing in popularity among the hacking community is the most troubling aspect of the recent discovery.

Hive has been around since at least June of last year (2021) and the group has evolved considerably since they first appeared. That prompted the FBI to release a report detailing their activities and tactics to better prepare IT professionals for attacks the group might make against their organizations.

In October 2021, the Hive gang added Linus and Free BSD variants to their growing bank of tricks and they became one of the most active ransomware operations as measured by the frequency of their attacks.

Just last month, researchers operating out of Sentinel Labs discovered that the group is utilizing a new obfuscation technique in a bid to better mask the malicious payloads they introduce to infected networks.

All of this points to the fact that the Hive group is actively working to improve the efficiency and effectiveness of their attacks.  Stay vigilant and be on the alert for this group.  They’ve got a well deserved reputation for being dangerous.

Related Posts - TKS Blog
Microsoft 365 Cloud Modernization: IT Director Roadmap
For IT Directors, cloud migration is no longer about whether to move to Microsoft 365; it’s about how to modernize correctly without creating long-term architectural...
Read more
How Microsoft 365 Migration Impacts Workflow
You’ve probably heard leadership talk about cloud migration or Microsoft 365 modernization. These phrases often come up in company updates, IT meetings, or strategic planning...
Read more
Cloud Computing for Business Growth: Scalability, Migration & Multi-Cloud Strategy
Organizations that rely solely on traditional, on-premises infrastructure often struggle with scalability, rising IT costs, limited agility, and increased operational risk. Cloud computing technology has fundamentally...
Read more
Phishing: 6 Real Subject Lines Your Team Will See in 2026
  Start 2026 smarter, with security habits your whole team can actually use. You know the drill: it’s 8:03 a.m., you’ve barely had your first sip of...
Read more

Used with permission from Article Aggregator