Comment from Tenable on ProxyShell attacks

The Cybersecurity & Infrastructure Security Agency has urgently warned organisations about in-the-wild-attacks targeting ProxyShell. By exploiting ProxyShell flaws, attackers could execute arbitrary code on a vulnerable machine.

Below is what Claire Tills, senior research engineer, Tenable, has to say on ProxyShell attacks.

“Attackers began scanning for servers vulnerable to the ProxyShell attack chain almost as soon as Orange Tsai’s presentation went live. Given the popularity of its predecessor, ProxyLogon, with attackers, we knew exploitation was coming. These vulnerabilities are likely popular because of the ubiquity of Microsoft Exchange — threat actors know they have a higher potential for successful attacks by targeting services like this. The former success of attacks leveraging ProxyLogon also draws attackers to ProxyShell, relying on attacks and tactics known to work.

ProxyShell is now being used to deploy the LockFile ransomware and I expect other actors will integrate it into their attacks. The threat is certainly real, as CISA warned organizations over the weekend of in-the-wild exploitation. To protect against attacks, organizations should ensure they’re applying the patches released in April and May for Microsoft Exchange Servers.” — Claire Tills, senior research engineer, Tenable

Related posts

Securonix Launches Agentic Mesh and Productivity-Based AI Model for SOC

Sanjeev Sadanand Patkar Joins FYERS Assets as Chief Investment Officer

Tally Solutions Moves TallyPrime Cloud Access to Oracle Cloud

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More