AGL 38.78 Decreased By ▼ -0.72 (-1.82%)
AIRLINK 194.29 Increased By ▲ 17.66 (10%)
BOP 10.84 Increased By ▲ 0.75 (7.43%)
CNERGY 6.87 No Change ▼ 0.00 (0%)
DCL 10.19 Increased By ▲ 0.26 (2.62%)
DFML 43.13 Increased By ▲ 0.39 (0.91%)
DGKC 96.61 Decreased By ▼ -1.56 (-1.59%)
FCCL 38.07 Decreased By ▼ -1.24 (-3.15%)
FFBL 81.43 Decreased By ▼ -0.43 (-0.53%)
FFL 14.03 Decreased By ▼ -0.36 (-2.5%)
HUBC 118.98 Decreased By ▼ -2.46 (-2.03%)
HUMNL 14.77 Decreased By ▼ -0.57 (-3.72%)
KEL 5.74 Increased By ▲ 0.08 (1.41%)
KOSM 8.49 Increased By ▲ 0.37 (4.56%)
MLCF 46.54 Decreased By ▼ -1.57 (-3.26%)
NBP 77.23 Increased By ▲ 1.41 (1.86%)
OGDC 194.78 Decreased By ▼ -2.63 (-1.33%)
PAEL 34.74 Increased By ▲ 2.36 (7.29%)
PIBTL 8.38 Increased By ▲ 0.23 (2.82%)
PPL 174.57 Decreased By ▼ -0.93 (-0.53%)
PRL 33.17 Decreased By ▼ -0.92 (-2.7%)
PTC 24.57 Increased By ▲ 2.23 (9.98%)
SEARL 110.04 Increased By ▲ 6.84 (6.63%)
TELE 8.90 Increased By ▲ 0.39 (4.58%)
TOMCL 34.83 Decreased By ▼ -0.20 (-0.57%)
TPLP 11.69 Increased By ▲ 0.43 (3.82%)
TREET 18.56 Decreased By ▼ -0.59 (-3.08%)
TRG 60.06 Increased By ▲ 1.50 (2.56%)
UNITY 36.49 Increased By ▲ 1.63 (4.68%)
WTL 1.75 Increased By ▲ 0.16 (10.06%)
BR100 11,701 Increased By 49.8 (0.43%)
BR30 35,411 Decreased By -67.2 (-0.19%)
KSE100 109,054 Increased By 815 (0.75%)
KSE30 33,849 Increased By 155.6 (0.46%)

SAN FRANCISCO: Microsoft on Tuesday moved to defend against a dangerous new threat to Exchange email servers while the fight continued against hackers taking advantage of a flaw patched last month.

The US Cybersecurity and Infrastructure Security Agency, part of the Department of Homeland Security, called on government departments to immediately install the latest software update released by Microsoft.

“These vulnerabilities pose an unacceptable risk to the Federal enterprise and require an immediate and emergency action,” CISA said in a notice.

“This determination is based on the likelihood of the vulnerabilities being weaponized, combined with the widespread use of the affected software across the Executive Branch and high potential for a compromise of integrity and confidentiality of agency information.”

Both CISA and Microsoft said it did not appear that hackers had taken advantage of the newly discovered weakness to break into Exchange email systems.

“Although we are not aware of any active exploits in the wild, our recommendation is to install these updates immediately to protect your environment,” Microsoft said in a post about the patch.

CISA and Microsoft said that the vulnerabilities were different from those fixed last month, when the US tech company disclosed that a state-sponsored hacking group operating out of China was exploiting security flaws in its Exchange email services to steal data from business users.

The company said the hacking group, which it has named “Hafnium,” is a “highly skilled and sophisticated actor.”

Hafnium has in the past targeted US-based companies including infectious disease researchers, law firms, universities, defense contractors, think tanks and NGOs.

The potentially devastating hack is believed to have affected at least 30,000 Microsoft email servers in government and private networks and has prompted calls for a firm response to state-sponsored attacks which could involve “hacking back” or other measures.

Microsoft in March released updates to fix the security flaws, which apply to on-premises versions of the software rather than cloud-based versions, and urged customers to apply them.

US Justice Department officials on Tuesday announced that, with backing from a court, they purged “malicious web shells” hackers had planted in hundreds of computers running Exchange Server software.

Web shells are bits of computer code that allow hackers to reach into computers remotely, and had been planted early this year by taking advantage of a weakness in Exchange, according to a Justice Department release.

“Today’s operation removed one early hacking group’s remaining web shells, which could have been used to maintain and escalate persistent, unauthorized access to US networks,” Justice Department officials said.

Comments

Comments are closed.