IBM Final Case Study
IBM Final Case Study
-Attack Category:
Zero-day exploit
-Company:
Microsoft
-Affected parties:
250,000 total servers
30,000 in USA
7,000 servers in UK
The European Banking Authority
The Norwegian Parliament
Chile's Commission for the Financial
Market.
© Copyright IBM Corp. 2023
1. Description of the Attack Category:
Event 2
The first breach of a Microsoft Exchange Server instance was observed by cybersecurity company Volexity
2 on 6 January 2021.
Event 3
At the end of January, Volexity had observed a breach allowing attackers to spy on two of their customers,
3 and alerted Microsoft of the vulnerability. After Microsoft was alerted of the breach, Volexity noted the
hackers became more aggresive in anticipation of a patch from Microsoft side.
Timeline
Event 4
Worldwide cyberattacks and data breaches began in January 2021, giving attackers full access to
4 customers emails and passwords on affected servers, administrator privileges on the server, and access to
connected devices on the same network.
Event 5
On 2 March 2021, another cybersecurity company, ESET, reported that they were observing multiple
5 attackers besides Hafnium exploiting the vulnerabilities in Microsoft servers.
Event 6
On 2 March 2021, Microsoft rolled out updates for Microsoft Exchange Server versions 2010, 2013, 2016
6 and 2019 to patch the exploit; but this did not retroactively undid damage or removed any backdoors
installed already by the attackers.
In this box, provide an overall vulnerability summary.
Vulnerabilities