Ransom-seeking hackers are taking advantage of Microsoft flaw — expert

WASHINGTON — Ransom-seeking hackers have begun taking advantage of a recently disclosed flaw in Microsoft’s widely used mail server software, a researcher said late Wednesday—a serious escalation that could portend widespread digital disruption.

The disclosure, made on Twitter by Microsoft Corp. security program manager Phillip Misner, is the realization of worries that have been coursing through the security community for days.

Since March 2, when Microsoft announced the discovery of serious vulnerabilities in its Exchange software, experts have warned that it was only a matter of time before ransomware gangs began using them to shake down organizations across the internet.

Mr. Misner didn’t immediately respond to follow-up messages and Microsoft did not return emails seeking comment. The U.S. Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation also didn’t immediately respond.

Even though the security holes announced by Microsoft have since been fixed, organizations worldwide have failed to patch their software, leaving them open to exploitation. In Germany alone, officials have said that up to 60,000 networks remained vulnerable.

The fixes are free, but experts attribute the sluggish pace of many customers’ updates in part to the complexity of Exchange’s architecture.

All manner of hackers have begun taking advantage of the holes—one security firm recently counted 10 separate hacking groups using the flaws—but ransomware operators are among the most feared.

Those groups work by locking users out of their devices and data unless the victims cough up big chunks of digital currency. They now potentially have access “into a huge number of vulnerable systems,” said Brett Callow of Canadian cybersecurity company Emsisoft.

He said more modest companies—many of whom lack the ability or awareness to update their software—could be particularly affected by the latest variant of ransomware.

“This is a potentially serious risk to small businesses,” he said. — Raphael Satter/Reuters

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>