How Did the Exchange Server Exploit Leak?

Breach Notification
,
Cyberwarfare / Nation-State Attacks
,
Email Security & Protection

Microsoft Investigating; Devcore Pentesters Say They’re in the Clear


March 14, 2021    

How Did the Exchange Server Exploit Leak?

It has been an open question as to how a half-dozen hacking groups began exploiting Exchange servers in an automated fashion in the days leading up to Microsoft’s patches. But there are strong signs that exploit data leaked, and the question now is: Who leaked it?

See Also: The CISO’S Guide to Metrics that Matter in 2021


A Taiwanese computer security researcher indicated on Friday that exploit code he developed and privately shared with Microsoft in early January ended up in hostile hands.


It’s an unsatisfactory prospect that how the Exchange exploit leak occurred may never be solved. But it may direct questions back to Microsoft as to whether the MAPP is still worth it. 

The exploit was used to attack tens of thousands of Exchange email servers before Microsoft deployed software patches on March 2. Microsoft is now investigating whether one of its partners is at fault.


The answer as to who leaked the exploit information is important, as it may provide insight into how a little-known vulnerability was suddenly spun into mass, indiscriminate attacks against Exchange servers in late February. Two weeks on, Microsoft says ransomware is now moving in (see DearCry Ransomware Targets Unpatched Exchange Servers).


The researcher, Cheng-da Tsai, who is known by the handle Orange Tsai, works for the Taipei-based security consultancy Devcore. Microsoft credited Tsai and Devcore with finding two of the four vulnerabilities it patched for Exchange server on March 2.


Tsai tweeted on Friday that attack code analyzed by Palo Alto Network’s
Unit 42 intelligence team was substantially similar to that which he developed and sent to Microsoft on Jan. 5. He writes that he hardcoded his nickname as the password for the webshell, which is “orange.”



However, Devcore is confident that it did not leak the exploit. Contacted on Saturday, Devcore CEO Allen Own declined to comment, but referred to a previously issued statement that an investigation turned up nothing suspicious. Now, attention has turned to Microsoft.


Microsoft: We Didn’t Leak, But…


Microsoft says it has found no indications that it leaked the data. But the company is investigating whether one of its partners did. The development was reported on Friday by the Wall Street Journal and Bloomberg.


“We are looking at what might have caused the spike of malicious activity and have not yet drawn any conclusions,” the company says in a statement.


Microsoft provides information on exploits and attacks ahead of time to a group of vetted partners that are part of the Microsoft Active Protections Program (MAPP).


The idea is that giving advance information allows those companies to fine-tune the defenses in their own products ahead of a patch release. The Wall Street Journal reports that Microsoft shared data on the Exchange flaws with MAPP partners on Feb. 23.


A fierce flurry of worldwide attacks ensued. Between Feb. 26 and March 3, 68,000 distinct IPs were compromised, according to the Shadowserver Foundation, a nonprofit organization that investigates malicious activity across the Internet. Security experts have warned that no vulnerable Exchange server was likely to have been left untouched in the days before and following the patch release.


“The MAPP program is used successfully ahead of every Update Tuesday cycle,” Microsoft says. “If it turns out that a MAPP partner was the source of a leak, they would face consequences for breaking the terms of participation in the program.”


Of 82 MAPP partners, 10 are based in China. Microsoft attributed the initial attacks to Hafnium, a group it says is state-sponsored and is based out of China.


Microsoft has given a MAPP partner the boot before. In May 2012, Microsoft cut off Hangzhou DPTech Technologies Co., Ltd., a company based in China, for leaking data related to CVE-2012-0002.


Luigi Auriemma, the security researcher who found CVE-2012-0002, tells me he was surprised to check proof-of-concept code that turned up on Chinese forums and found it to be the same as what he developed. Auriemma says there’s always the possibility of malicious actors or sloppy handling when sensitive data is sent to third parties.


“Microsoft knows it,” says Auriemma, who is CEO of the Revuln conference series and an independent security researcher with Aluigi. “The attackers know it too.”


Leak Source May Remain Unknown


Tsai and Devcore had been looking closely for bugs in Exchange server since October, according to a timeline it published on a website it set up for the flaws, which it groups under the name “ProxyLogon.”


The timeline says the first bug, CVE-2021-26855, was discovered on Dec. 10, and the second one, CVE-2021-27065, was discovered on Dec. 30. A day later, Devcore then successfully chained the two together for a remote code execution attack.


Tsai and Devcore reported the vulnerabilities to Microsoft on Jan. 5 through its Microsoft Security Response Center portal.


But attacks using CVE-2021-26855 were seen even before then. The security company Volexity says it saw the first attacks on Jan. 3. That’s two days before Microsoft received the information from Devcore, making it impossible that either it or a MAPP partner could have leaked it.


Other data suggests that an Exchange attack using CVE-2021-26855 may have occurred as early as November 2020, according to a blog post by Joe Slowik, senior security researcher with DomainTools.


If Devcore indeed was not compromised, the findings from Volexity and DomainTools suggest that perhaps someone else already found the bug and was using it in a low-key way.



DomainTools’ timeline of how the Exchange server attacks developed, showing one possible incident in early November.

There’s a chance we’ll never know who leaked it. Although Microsoft’s MAPP partners in China are likely in an investigative spotlight, the information could have leaked through a MAPP partner that doesn’t know it has been compromised by attackers.


It’s an unsatisfactory prospect that this mystery may not be solved. But it may direct questions back to Microsoft as to whether the MAPP is still worth it. After the 2012 incident, Microsoft defended the benefits of MAPP but acknowledged its risks.


Maarten Van Horenbeeck, who was then a Microsoft senior program manager and is now CISO of Zendesk, wrote a sound justification for MAPP and how it helped participants develop better defenses. But “we recognize that there is the potential for vulnerability information to be misused,” he wrote.


As sleepless incident responders around the world continue their work to secure systems, that reasoning may no longer hold.

Similar Posts