{"id":19094,"date":"2021-08-26T23:44:01","date_gmt":"2021-08-26T23:44:01","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19094"},"modified":"2021-08-27T22:16:43","modified_gmt":"2021-08-27T22:16:43","slug":"microsoft-issues-proxyshell-advisory-after-attacks-begin","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/","title":{"rendered":"Microsoft Issues ProxyShell Advisory After Attacks Begin"},"content":{"rendered":"<p>Microsoft this week issued an <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/proxyshell-vulnerabilities-and-your-exchange-server\/ba-p\/2684705\">advisory<\/a> about three vulnerabilities referred to collectively as ProxyShell days after security researchers at a federal government cybersecurity agency warned that cybercriminals were actively trying to exploit them.<\/p>\n<p>The ProxyShell vulnerabilities that affect Microsoft Exchange servers were put on full display at this month\u2019s Black Hat 2021 conference when Devcore researcher Orange Tsai \u2013 who originally uncovered the vulnerabilities \u2013 compromised a Microsoft Exchange server by exploiting them during a session at the event.<\/p>\n<p>The three vulnerabilities are CVE-2021-34473, CVE-2021-34523 and CVE-2021-31207. They could lead to escalation of privileges and remote code execution if exploited, enabling hackers to execute arbitrary code on a vulnerable machine, according to a <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/current-activity\/2021\/08\/21\/urgent-protect-against-active-exploitation-proxyshell\">warning<\/a> issued by the Cybersecurity and Infrastructure Security Agency (CISA).<\/p>\n<p>In its own advisory, Microsoft this week urged organizations running Exchange servers to install patches issued in security updates in <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-may-2021-exchange-server-security-updates\/ba-p\/2335209\">May<\/a> and <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-july-2021-exchange-server-security-updates\/ba-p\/2523421\">July<\/a>, which protect against the vulnerabilities.<\/p>\n<p>\u201cBut if you have not installed either of these security updates, then your servers and data are vulnerable,\u201d Microsoft researchers said, adding that \u201cseveral times\u201d the company has <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/why-exchange-server-updates-matter\/ba-p\/2280770\">said<\/a> that \u201cit is\u00a0<em>critical<\/em>\u00a0to keep your Exchange servers updated with latest available Cumulative Update (CU) and Security Update (SU).\u201d<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Top Patch Management Tools<\/a><\/p>\n<h2>Microsoft Faces Criticism for Response<\/h2>\n<p>Microsoft is catching criticism from some cybersecurity researchers for not being forceful enough over the past several months in warning customers about the threats posed by ProxyShell and urging them to get the vulnerabilities patched.<\/p>\n<p>Security researcher Kevin Beaumont in a <a href=\"https:\/\/doublepulsar.com\/multiple-threat-actors-including-a-ransomware-gang-exploiting-exchange-proxyshell-vulnerabilities-c457b1655e9c\">blog post<\/a> said patches issued in April and May close the vulnerabilities, but added that \u201cMicrosoft\u2019s messaging of this has been knowingly awful. Microsoft decided to downplay the importance of the patches and treat them as a standard monthly Exchange patch, which have been going on for \u2014 obviously \u2014 decades. You may remember how much negative publicity March\u2019s Exchange patches caused Microsoft, with headlines such as \u2018Microsoft emails hacked.\u2019\u201d<\/p>\n<p>Beaumont also noted that \u201cMicrosoft failed to allocate CVEs for these vulnerabilities until July \u2014 4 months <em>after<\/em>\u00a0the patches were issued. Given many organizations vulnerability manage via CVE, it created a situation where Microsoft\u2019s customers were misinformed about the severity of one of the most critical enterprise security bugs of the year.\u201d<\/p>\n<p>The March Exchange patches Beaumont noted refer to similar attacks exploiting zero-day flaws folded under the umbrella of ProxyLogon.<\/p>\n<p>In a difficult year for cyber attacks, Microsoft&#8217;s ubiquitous presence has placed it at the center of a number of other <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/microsoft-security-under-scrutiny-after-recent-incidents\/\">security incidents and vulnerabilities<\/a>. At the same time, the software giant has been actively trying to improve security, even posting a string of impressive results in the difficult <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-protection-tests-endpoint-security\/\">MITRE endpoint security testing<\/a>. And this week, Microsoft was at the center of a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/tech-giants-pledge-big-money-to-cybersecurity\/\">White House initiative to improve cybersecurity<\/a>, pledging $20 billion and training resources toward the effort.<\/p>\n<h2>Exchange Under Attack<\/h2>\n<p>But thanks in part to Microsoft&#8217;s half-hearted warnings earlier this year, bad actors are once again taking a look at Microsoft Exchange after the Black Hat show and security researchers are seeing the results. John Hammond, senior security researcher with Huntress Labs, wrote in a <a href=\"https:\/\/www.huntress.com\/blog\/rapid-response-microsoft-exchange-servers-still-vulnerable-to-proxyshell-exploit?__hstc=1139630.0507ef4454ba01383c71fdf529abac34.1630007068807.1630007068807.1630008994076.2&amp;__hssc=1139630.2.1630008994076&amp;__hsfp=1273170026&amp;hsutk=0507ef4454ba01383c71fdf529abac34&amp;contentType=listing-page\">blog post<\/a> that \u201cattackers are actively scanning for vulnerable Microsoft Exchange servers and abusing the latest line of Microsoft Exchange vulnerabilities that were patched earlier this year.\u201d<\/p>\n<p>In a tweet, Huntress CEO Kyle Hansloven noted that his company by Aug. 20 had seen more than 140 webshells across more than 1,900 unpatched servers over a two-day period, with the impacted organizations including building manufacturers, seafood processors and a small residential airport.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19096\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/08\/ProxyShell-chart.png\" alt=\"proxyshell vulnerability\" width=\"662\" height=\"703\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/ProxyShell-chart.png 662w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/ProxyShell-chart-283x300.png 283w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/ProxyShell-chart-150x159.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/ProxyShell-chart-300x319.png 300w\" sizes=\"(max-width: 662px) 100vw, 662px\" \/><\/p>\n<p>The revelation prompted Rob Joyce, director of cybersecurity at CISA, to <a href=\"https:\/\/twitter.com\/NSA_CSDirector\/status\/1429035182049333249\">tweet<\/a>, \u201cNew surge in Microsoft Exchange server exploitation underway. You must ensure that you are patched and monitoring if you are hosting an instance.\u201d<\/p>\n<p>Beaumont wrote that \u201cfor nearly a month, I have been watching mass in the wild exploitation of ProxyShell. &#8230; These\u00a0vulnerabilities are worse than ProxyLogon.\u201d<\/p>\n<h2>Ransomware and ProxyShell<\/h2>\n<p>The Threat Hunter Team at Symantec in an updated <a href=\"https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/lockfile-ransomware-new-petitpotam-windows\">blog post<\/a> wrote that a new <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> family called LockFile, which has been around since at least mid-July, appears to be attacking victims\u2019 networks by exploiting the Windows PetitPotam vulnerability, gaining access to the domain controller and then expanding from there across the network.<\/p>\n<p>They initially said it was unclear how the hackers were able to gain access into Microsoft Exchange Servers, but updated post to note what Beaumont had written about the ProxyShell exploits and said that could have been the way the LockFile attackers made their way in.<\/p>\n<p>In his blog post, Huntress\u2019 Hammond wrote that by working with Beaumont and security researcher Rich Warren, they had corroborated that the \u201cwebshell and LockFile ransomware incidents we\u2019re seeing within companies may be related.\u201d<\/p>\n<h2>Unpatched Exchange Servers<\/h2>\n<p>A scan by search engine Shodan published Aug. 11 found that 18 percent of Exchange servers remain unpatched and that almost 40 percent are exposed to one of the vulnerabilities. Beaumont said he wrote a plugin that can identify unpatched systems and then worked with Shodan to put the detection plugin into their product.<\/p>\n<p>In addition, CERT in Austria also is using the scanning script to search for unpatched Exchange servers in that country.<\/p>\n<p>Jake Williams, co-founder and CTO of incident response specialist BreachQuest, told <em>eSecurity Planet<\/em> that cybercriminals can attack a weakness quickly.<\/p>\n<p>\u201cThe speed with which threat actors weaponized the ProxyShell vulnerabilities highlights why having good threat intelligence is critical,\u201d Williams said. \u201cThis vulnerability was discussed openly and the consensus among researchers was that weaponization was imminent. Those orgs with that early warning were able to prioritize patching and should not be impacted.\u201d<\/p>\n<h2>Assume Compromise<\/h2>\n<p>He noted that the CISA warning was timely but added that \u201cby the time there\u2019s a warning about active exploitation in the wild, any internet-facing assets have likely been compromised by threat actors. Organizations that haven\u2019t patched yet should be proceeding under the assumption they\u2019ve been compromised. Installing the patch now will prevent future exploitation, but any backdoors already deployed by threat actors will remain after the patch.\u201d<\/p>\n<p>In its advisory, Microsoft said the Exchange servers that are vulnerable to ProxyShell are those that don\u2019t have at least the CU with the SU from May.<\/p>\n<p>\u201cIn all of the above scenarios, you\u00a0<em>must<\/em>\u00a0install one of latest supported CUs and all applicable SUs to be protected,\u201d the company wrote. \u201cAny Exchange servers that are not on a supported CU\u00a0<em>and<\/em>\u00a0the latest available SU are vulnerable to ProxyShell and other attacks that leverage older vulnerabilities.\u201d<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f030d4e91-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f030d4e91\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f030d4e91\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f030d4e91\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f030d4e91\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f030d4e91\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f030d4e91\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft this week issued an advisory about three vulnerabilities referred to collectively as ProxyShell days after security researchers at a federal government cybersecurity agency warned that cybercriminals were actively trying to exploit them. The ProxyShell vulnerabilities that affect Microsoft Exchange servers were put on full display at this month\u2019s Black Hat 2021 conference when Devcore [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":19098,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[3790],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[394,31780,379],"class_list":["post-19094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cybersecurity","b2b_audience-awareness-and-consideration","b2b_product-email-security","b2b_product-patch-management","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft Issues ProxyShell Advisory After Attacks Begin | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Microsoft faces criticism that it downplayed a critical Exchange server vulnerability before it was exploited.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Issues ProxyShell Advisory After Attacks Begin | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Microsoft faces criticism that it downplayed a critical Exchange server vulnerability before it was exploited.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-26T23:44:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-27T22:16:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft_Exchange_logo-e1632859152723.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"114\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Microsoft Issues ProxyShell Advisory After Attacks Begin\",\"datePublished\":\"2021-08-26T23:44:01+00:00\",\"dateModified\":\"2021-08-27T22:16:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/\"},\"wordCount\":1094,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft_Exchange_logo-e1632859152723.png\",\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/\",\"name\":\"Microsoft Issues ProxyShell Advisory After Attacks Begin | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft_Exchange_logo-e1632859152723.png\",\"datePublished\":\"2021-08-26T23:44:01+00:00\",\"dateModified\":\"2021-08-27T22:16:43+00:00\",\"description\":\"Microsoft faces criticism that it downplayed a critical Exchange server vulnerability before it was exploited.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft_Exchange_logo-e1632859152723.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft_Exchange_logo-e1632859152723.png\",\"width\":500,\"height\":114,\"caption\":\"microsoft exchange\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Issues ProxyShell Advisory After Attacks Begin\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Issues ProxyShell Advisory After Attacks Begin | eSecurity Planet","description":"Microsoft faces criticism that it downplayed a critical Exchange server vulnerability before it was exploited.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Issues ProxyShell Advisory After Attacks Begin | eSecurity Planet","og_description":"Microsoft faces criticism that it downplayed a critical Exchange server vulnerability before it was exploited.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/","og_site_name":"eSecurity Planet","article_published_time":"2021-08-26T23:44:01+00:00","article_modified_time":"2021-08-27T22:16:43+00:00","og_image":[{"width":500,"height":114,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft_Exchange_logo-e1632859152723.png","type":"image\/png"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Microsoft Issues ProxyShell Advisory After Attacks Begin","datePublished":"2021-08-26T23:44:01+00:00","dateModified":"2021-08-27T22:16:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/"},"wordCount":1094,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft_Exchange_logo-e1632859152723.png","keywords":["cybersecurity"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/","url":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/","name":"Microsoft Issues ProxyShell Advisory After Attacks Begin | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft_Exchange_logo-e1632859152723.png","datePublished":"2021-08-26T23:44:01+00:00","dateModified":"2021-08-27T22:16:43+00:00","description":"Microsoft faces criticism that it downplayed a critical Exchange server vulnerability before it was exploited.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft_Exchange_logo-e1632859152723.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Microsoft_Exchange_logo-e1632859152723.png","width":500,"height":114,"caption":"microsoft exchange"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft Issues ProxyShell Advisory After Attacks Begin"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19094"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19094"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19094\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19098"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19094"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19094"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19094"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}