Advertisement
Australia markets closed
  • ALL ORDS

    7,937.50
    -0.40 (-0.01%)
     
  • ASX 200

    7,683.00
    -0.50 (-0.01%)
     
  • AUD/USD

    0.6495
    +0.0006 (+0.09%)
     
  • OIL

    82.92
    -0.44 (-0.53%)
     
  • GOLD

    2,336.10
    -6.00 (-0.26%)
     
  • Bitcoin AUD

    99,606.75
    -3,287.23 (-3.19%)
     
  • CMC Crypto 200

    1,397.63
    -26.47 (-1.86%)
     
  • AUD/EUR

    0.6072
    +0.0016 (+0.27%)
     
  • AUD/NZD

    1.0951
    +0.0021 (+0.19%)
     
  • NZX 50

    11,946.43
    +143.15 (+1.21%)
     
  • NASDAQ

    17,517.12
    +45.65 (+0.26%)
     
  • FTSE

    8,040.38
    -4.43 (-0.06%)
     
  • Dow Jones

    38,470.27
    -33.42 (-0.09%)
     
  • DAX

    18,088.70
    -48.95 (-0.27%)
     
  • Hang Seng

    17,201.27
    +372.34 (+2.21%)
     
  • NIKKEI 225

    38,460.08
    +907.92 (+2.42%)
     

'URGENT': Aussies warned over Microsoft email hack attack

UKRAINE - 2021/02/05: In this photo illustration a Microsoft logo is seen on a mobile phone and a pc screen. (Photo Illustration by Pavlo Gonchar/SOPA Images/LightRocket via Getty Images)
Australian business leaders have been warned that their systems may still be vulnerable to being hacked. (Photo Illustration by Pavlo Gonchar/SOPA Images/LightRocket via Getty Images) (SOPA Images via Getty Images)

Australian individuals and business leaders have been urged by the government's lead cyber security agency to shore up their versions of Microsoft Exchange or risk being hacked.

In an online alert, the Australian Cyber Security Centre (ASCS) said several Australian organisations had been impacted by the recent attack on Microsoft email servers carried out by hackers from Hafnium, a state-sponsored group operating out of China.

But some organisations are still exposed, the cyber security agency warned.

"The ... ACSC has identified extensive targeting, and has confirmed compromises, of Australian organisations with vulnerable Microsoft Exchange deployments," it said in a statement.

ADVERTISEMENT

"A large number of Australian organisations are yet to patch vulnerable versions of Microsoft Exchange, leaving them vulnerable to compromise. The ACSC urges these organisations to do so urgently."

If the vulnerabilities were exploited by hackers, an attacker would be able to write files, execute code and have a high degree of access to the Microsoft Windows operating system.

"Microsoft has observed instances where the attacker has uploaded web shells to maintain persistent access to compromise Exchange servers," the ASCS said.

In a Microsoft blog post that is being constantly updated, the tech giant said it was seeing instances of malicious actors beyond Hafnium that were taking advantage of unpatched, still-vulnerable versions of Microsoft Exchange.

What should I do?

If your organisation uses Microsoft Exchange, you should update your version of Microsoft Exchange to the latest version.

Organisations will need to patch up these vulnerabilities:

  • CVE-2021-26855 - server-side request forgery (SSRF) vulnerability in Exchange.

  • CVE-2021-26857 - insecure deserialization vulnerability in the Unified Messaging service.

  • CVE-2021-26858 - post-authentication arbitrary file write vulnerability in Exchange.

  • CVE-2021-27065 - post-authentication arbitrary file write vulnerability in Exchange.

Microsoft has also released security patches for 2013, 2016 and 2019 versions of Microsoft Exchange, with further details on the security updates here. You can find Microsoft's blog post on how to install the security updates here.

If your organisation has been affected by this hack attack, the ASCS urged Australians to get in touch via 1300 CYBER1.

"Because we are aware of active exploits of related vulnerabilities in the wild (limited targeted attacks), our recommendation is to install these updates immediately to protect against these attacks," Microsoft said in a comprehensive blog post from 2 March.

Follow Yahoo Finance on Facebook, LinkedIn, Instagram and Twitter, and subscribe to the free Fully Briefed daily newsletter.