The United States and many Allies have blamed hackers associated with China’s Government for the Microsoft Exchange Server Cyberattack email hack. The MSPs and MSSPs can patch Exchange Server for customers. But patching customer’s servers itself is not enough to stop hackers out of the compromised servers.

Use the following links to get more information and Patch the Customer Servers:

CISA Emergency Directive 21-22 :

 

Cybersecurity and Infrastructure Security Agency (CISA) partners have observed active exploitation of vulnerabilities in Microsoft Exchange Server products. Successful exploitation of these vulnerabilities allows an unauthenticated attacker to execute arbitrary code on vulnerable Exchange Servers, enabling the attacker to gain persistent system access and access to files and mailboxes on the server and credentials stored on that system. Successful exploitation may additionally enable the attacker to compromise trust and identity in a vulnerable network.

The United States and many Allies have blamed hackers associated with China’s Government for the Microsoft Exchange Server Cyberattack email hack. The MSPs and MSSPs can patch Exchange Server for customers. But patching customer’s servers itself is not enough to stop hackers out of the compromised servers.

Use the following links to get more information and Patch the Customer Servers

Microsoft Advisory
https://msrc-blog.microsoft.com/2021/03/02/multiple-security-updates-released-for-exchange-server/

Microsoft Blog
https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/#scan-log

GIT Hub
https://github.com/microsoft/CSS-Exchange/tree/main/Security

Original CISA Alert
https://us-cert.cisa.gov/ncas/alerts/aa21-062a

CISA Emergency Directive 21-22
https://cyber.dhs.gov/ed/21-02/

Cybersecurity and Infrastructure Security Agency (CISA) partners have observed active exploitation of vulnerabilities in Microsoft Exchange Server products. Successful exploitation of these vulnerabilities allows an unauthenticated attacker to execute arbitrary code on vulnerable Exchange Servers, enabling the attacker to gain persistent system access and access to files and mailboxes on the server and credentials stored on that system. Successful exploitation may additionally enable the attacker to compromise trust and identity in a vulnerable network.