Skip to content

Exabeam Introduces First Connected System for AI Agent Behavior Analytics and AI Security Posture Insight — Read More

An Exchange Vulnerability in Ransomware

  • Mar 26, 2021
  • Gorka Sadowski
  • 3 minutes to read

Table of Contents

    A New Crowbar for an Old Burglar

    A few days ago, in an article by Lawrence Abrams, a new ransomware flavor has been discussed in depth and I truly recommend that you read it.  

    The short story is this. Microsoft started by observing the HAFNIUM group was attacking on-premises Exchange servers using several zero-day attacks. Subsequently Microsoft recently disclosed details on this campaign. Then, once the cat was out of the bag, all kinds of organized attackers started leveraging these vulnerabilities and weaponizing this attack against unpatched on-prem Exchange servers to help plan and distribute a new ransomware flavor (Decry). These groups have been quite fast and effective. 

    Attackers managed to operate under a week dwell time: 

    • A campaign using a series of vulnerabilities gets disclosed on March 2, 2021 (obviously the vulnerability existed before that) 
    • The exploit technique gets weaponized, used in the wild and discovered on March 9th 

    Are you patched?

    So that’s a theoretical seven-day window between disclosure and payday for attackers. Have you patched your on-premises Exchange server already? Did you do it by March 9th? If so, congratulations, you are in the absolute minority. However, for most, chances are your Exchange server was not patched by then. That means that you need to assume breach. Now your job is not only detection, but investigation and continuous threat hunting for this attack. 

    Ransomware Kill Chain

    We have seen this situation before. In fact, a few years back, Exabeam’s research team coined the term “Ransomware Kill Chain” in a research report where we discussed in depth not only the financial motivation of the attackers, but also how the attacks unfold in stages and appear as a timeline of events. This work is as relevant now as it was then. Nothing has changed. Back then, our research team looked at the new attack flow and concluded that besides the new infection vector, the kill chain remained the same, which means – you can still be effective in detecting it even without zero-day signatures. Why is that? While the code and actors change, the attack is still surfacing by connecting the activities that unfold. As long as you can connect the dots and stitch it all back together with the proper context, you will understand what is happening. 

    A timeline of events, that unfolds stage by stage, is still the best way to connect the otherwise scarce information into a solid investigation that allows analysts to respond to a threat, even through different iterations and changes of the threat (such as a new exploit, new zero-day, new vulnerability, etc.). This is exactly what Exabeam Smart Timelines does continuously, and automatically. 

    What can you do?

    So, what can you do about this latest Exchange-based ransomware? 

    • If you are an Exabeam customer – detection as well as timeline-based continuous threat hunting is already in place for ransomware, so you have the floodlight where you need it. 
    • If you are not an Exabeam customer – we have guidelines for your SIEM. Read our ransomware research paper for guidelines on how to effectively understand as well as detect ransomware with log signals. 

    Stay safe out there. 

    Gorka Sadowski

    Gorka Sadowski

    Chief Strategy Officer | Exabeam | Gorka Sadowski is Chief Strategy Officer at Exabeam. In his role, Gorka assists the executive team and functional leaders across the company with developing, communicating, executing, and sustaining corporate strategic initiatives. Gorka has more than 30 years of security experience spanning leadership roles across product management, sales, marketing, and operations. Most recently, he was senior director and security and risk management analyst at Gartner driving coverage for security information and event management (SIEM), security operation center (SOC), and managed detection and response (MDR), while also leading research for IT leaders on emerging topics. Prior to Gartner, he led business development at Splunk where he established and built the Splunk security ecosystem. Prior to Splunk, he established presence for LogLogic in Southern Europe, ran security activities for Unisys in France and launched the first partner-led intrusion detection and prevention system (IDPS) in the industry as lead for NetScreen’s Emerging Technology efforts. A certified CISSP, he received a computer science degree from Universite de Pau in France before moving to the U.S. as a Ph.D. candidate in network security at the University of Miami.

    More posts by Gorka Sadowski

    Learn More About Exabeam

    Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.

    • Guide

      Insider Threats: When the Attacker Has Valid Credentials

    • Podcast

      Safety Third: Why Security Shouldn’t Be Your Top Priority

    • White Paper

      A Strategic Framework for Selecting Your Cloud-Native SIEM

    • Guide

      Nine Questions Every CIO Must Ask About Their SIEM

    • Blog

      Decoding the 2025 MITRE ATT&CK® Evals: A Call for Clarity and a Guide for Analysts

    • Blog

      Model Context Protocol Server: The Universal Remote for AI Agents

    • Show More