Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The new US visa rules require applicants to set the privacy of their social media accounts publicly

A federal judge with a lawsuit over AI training on books without author’s permission

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers target over 70 Microsoft Exchange servers and steal credentials via keyloggers
Identity

Hackers target over 70 Microsoft Exchange servers and steal credentials via keyloggers

userBy userJune 24, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 24, 2025Ravi LakshmananVulnerability/Malware

Microsoft Exchange Server

It has been observed that unidentified threat actors target publicly exposed Microsoft Exchange servers and inject malicious code into login pages that collect qualifications.

In a new analysis released last week, Positive Technology said it identified two types of keylogger codes listed in JavaScript on its Outlook login page.

Those who store the collected data in a local file that is accessible via the Internet, and those who immediately send the collected data to an external server

Cybersecurity

Russian cybersecurity vendors show the continuation of the campaign, which was first documented in May 2024 as targeting entities in Africa and the Middle East, targeting entities in Africa and the Middle East.

At the time, the company said more than 30 victims across government agencies, banks, IT companies and educational institutions had detected evidence of the first compromise date back to 2021.

Attack chain involves leveraging known flaws in Microsoft Exchange Server (such as ProxyShell) to insert keylogger code into the login page. Currently, we don’t know who is behind these attacks.

Below is a list of some of the weaponized vulnerabilities –

CVE-2014-4078-IIS Security Feature Bypass Vulnerability CVE-2020-0796-Windows SMBV3 Client/Server Remote Code Execution Vulnerability CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-20-27065–27065-MICROSOFT EXARCHING SERVERABANCE) CVE-2021-31206-Microsoft Exchange Server Remote Code Execution Vulnerability CVE-2021-31207, CVE-2021-34473, CVE-2021-34523-Microsoft Exchange Server Security Features BYPASS Vulnerability (ProxyShell)

“Malicious JavaScript code reads and processes data from the authentication form and sends it to a specific page on the compromised Exchange server via an XHR request.”

“The source code for the target page contains handler functions that read incoming requests and write data to a file on the server.”

Files containing stolen data can be accessed from external networks. It is known that selection variants with local keylogging also collect user cookies, user agent strings, and timestamps.

One advantage of this approach is that there is little chance of detection as there is no outbound traffic to send information.

Meanwhile, the second variant detected by positive technology uses telegram bots via XHR Get Request using passwords stored in Apikey and Authtoken headers, respectively, via XHR Get Requests.

Cybersecurity

The second method involves using a Domain Name System (DNS) tunnel in conjunction with HTTPS POST requests that send user credentials and pass through your organization’s defenses.

22 compromised servers have been discovered by government organizations, followed by infectious diseases in IT, industry and logistics companies. Vietnam, Russia, Taiwan, China, Pakistan, Lebanon, Australia, Zambia, Netherlands and Turkey are one of the top 10 goals.

“The numerous Microsoft Exchange servers accessible from the Internet remain vulnerable to older vulnerabilities,” the researchers said. “By embedding malicious code into legitimate authentication pages, attackers can capture user credentials in plain text while still leaving them undetected for a long period of time.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow data processing problems in Lyft were the ultimate foundation
Next Article Google will deploy a new Gemini model that can be run locally on robots
user
  • Website

Related Posts

The new US visa rules require applicants to set the privacy of their social media accounts publicly

June 24, 2025

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

June 24, 2025

CTEM conversations we all need

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The new US visa rules require applicants to set the privacy of their social media accounts publicly

A federal judge with a lawsuit over AI training on books without author’s permission

Researchers find ways to shut down CryptoMiner campaigns using bad stocks and Xmrogue

Amazon will spend more than $4 billion to expand its major delivery to rural US communities

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.