FBI says will remove backdoors from hacked Microsoft Exchange servers

FBI has launched a mega operation to copy and remove malicious web shells from hundreds of vulnerable computers in the US

Topics
Microsoft | FBI | Microsoft applications

IANS  |  San Francisco 

The Federal Bureau of Investigation (FBI) has launched a mega operation to copy and remove malicious web shells from hundreds of vulnerable computers in the US that were running on-premises versions of Exchange Server software used to provide enterprise-level email service.

A court in Houston has authorised an operation to "copy and remove" backdoors from hundreds of Exchange email servers that have been compromised by nation-state hackers, including from China.

"Today's court-authorised removal of the malicious web shells demonstrates the Department's commitment to disrupt hacking activity using all of our legal tools, not just prosecutions," Assistant Attorney General John C. Demers for the Justice Department's National Security Division said in a statement on Tuesday.

Earlier reports have claimed that five different hacking groups (including China-backed hacking group called 'Hafnium') are exploiting vulnerabilities in the business email servers of

Through January and February this year, certain hacking groups exploited zero-day vulnerabilities in Microsoft Exchange Server software to access email accounts and place web shells for continued access.

Web shells are pieces of code or scripts that enable remote administration.

Other hacking groups followed suit starting in early March after the vulnerability and patch were publicised.

Many infected system owners successfully removed the web shells from thousands of computers. Others appeared unable to do so, and hundreds of such web shells persisted unmitigated.

"This operation removed one early hacking group's remaining web shells which could have been used to maintain and escalate persistent, unauthorised access to US networks," the informed.

The conducted the removal by issuing a command through the web shell to the server, which was designed to cause the server to delete only the web shell (identified by its unique file path).

Throughout March, Microsoft and other industry partners released detection tools, patches and other information to assist victim entities in identifying and mitigating the cyber incident.

Despite these efforts, by the end of March, hundreds of web shells remained on certain US-based computers running Microsoft Exchange Server software.

--IANS

na/rs

(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

Dear Reader,


Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.
We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor

Read our full coverage on Microsoft
First Published: Wed, April 14 2021. 10:32 IST
RECOMMENDED FOR YOU
RECOMMENDED FOR YOU