Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Keylogger Targets Microsoft Exchange Servers
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Keylogger Targets Microsoft Exchange Servers

Highlights

  • Cybersecurity breach discovered in Microsoft Exchange Servers.

  • Credentials stolen since 2021, affecting various sectors globally.

  • Organizations urged to patch vulnerabilities and enhance security measures.

Ethan Moreno
Last updated: 21 May, 2024 - 6:23 am 6:23 am
Ethan Moreno 12 months ago
Share
SHARE

A notable cybersecurity breach has been uncovered within Microsoft Exchange Servers, posing significant threats to businesses and governmental bodies worldwide. Positive Technologies’ Expert Security Centre (PT ESC) identified the sophisticated keylogger embedded on the main page of Microsoft Exchange Servers. The malicious actors have been stealing private credentials since 2021. This breach has resulted in the compromise of governmental agency logins across various countries. Notably, educational institutions, corporations, and IT firms have also been victims of this extensive cyber-attack.

Contents
Discovery and Attack MechanismImpact and Affected EntitiesRecommendations for Organizations

Earlier incidents involving Microsoft Exchange Servers have highlighted persistent vulnerabilities. Previous breaches involved different attack vectors, but the objective of credential theft remains consistent. Comparatively, the recent keylogger incident represents a more covert and sophisticated intrusion, exploiting known vulnerabilities like ProxyShell. Despite previous patches and security advisories, the attackers continue to find new ways to infiltrate these servers, indicating a need for more dynamic and proactive defenses.

Similarly, past reports showed that the geographical reach of such attacks is broad, impacting various regions and sectors. The current incident mirrors this trend, with affected entities spanning across Africa and the Middle East, including countries like Russia, the UAE, and Nigeria. This widespread impact underscores the imperative for global collaboration in cybersecurity measures to protect sensitive information from such persistent threats.

Discovery and Attack Mechanism

PT ESC discovered the keylogger while responding to an incident involving a compromised Microsoft Exchange Server. The investigation revealed that malicious code was embedded in the clkLgn() function on the server’s primary page. This code recorded user credentials, such as usernames and passwords, and stored them in a file accessible via a specific internet path. The exploitation of the ProxyShell vulnerability enabled attackers to inject the keylogger, redirecting the obtained credentials to an accessible file.

Impact and Affected Entities

The keylogger attack has impacted over 30 victims, mainly targeting government agencies. Educational institutions, corporations, and IT companies were also affected. The breach has extended to various countries, notably in Africa and the Middle East, affecting nations like Russia, the UAE, Kuwait, Oman, Niger, Nigeria, Ethiopia, Mauritius, Jordan, and Lebanon. These breaches highlight the pervasive nature of the threat and its potential to compromise sensitive information on a wide scale.

Recommendations for Organizations

– Check for the stealer code on the primary page of Microsoft Exchange Server.
– Ensure all known vulnerabilities, including ProxyShell, are promptly patched.
– Regularly monitor server logs for unusual activities and unauthorized access attempts.
– Implement multi-factor authentication and other advanced security measures.

This incident emphasizes the necessity of maintaining robust cybersecurity protocols and staying vigilant against evolving threats. As attackers persist in exploiting vulnerabilities in widely used software, organizations must prioritize proactive security measures to safeguard their sensitive information. Continuous monitoring and timely patching of known vulnerabilities are critical steps towards enhancing cybersecurity defenses.

Organizations using Microsoft Exchange Servers should take immediate steps to scan for any embedded keylogger codes and patch any identified vulnerabilities. Employing multi-factor authentication and monitoring server logs for unusual activities can further bolster their security posture. The widespread impact of this breach serves as a reminder of the importance of global cooperation and the need for heightened vigilance in cybersecurity practices.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Trump Urges Colorado to Release Jailed Clerk Over Election Breach

Google Targets Vulnerabilities in May Security Update

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article U.S. Regulators Investigate VW ID.4 Door Issues
Next Article AI Chatbots Show Major Vulnerabilities

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tesla Semi Gains Momentum with US Foods Collaboration
Electric Vehicle
AMD’s New Graphics Card Threatens Nvidia’s Market Share
Computing
Dodge Charger Hits Tesla Cybertruck in Failed Stunt
Electric Vehicle
Sonair Unveils ADAR Sensor to Enhance Robot Safety
Robotics
Apple Plans to Add Camera to Future Apple Watch Models
Wearables
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?