On 2021-02-28, we noticed that the vulnerabilities were used by other threat actors, starting with Tick and quickly joined by LuckyMouse, Calypso and the Winnti Group. This suggests that multiple threat actors gained access to the details of the vulnerabilities before the release of the patch, which means we can discard the possibility that they built an exploit by reverse engineering Microsoft updates.
Finally, the day after the release of the patch, we started to see many more threat actors (including Tonto Team and Mikroceen) scanning and compromising Exchange servers en masse. Interestingly, all of them are APT groups interested in espionage, except for one outlier (DLTMiner), which is linked to a known cryptomining campaign. A summary of the timeline is shown in Figure 1.
Microsoft Confident Exchange Hack Is State-Sponsored Operation | Hacking
technewsworld.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from technewsworld.com Daily Mail and Mail on Sunday newspapers.
US taking whole of government response to apparent China-backed Microsoft hack
washingtonexaminer.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from washingtonexaminer.com Daily Mail and Mail on Sunday newspapers.