The compromise is actively being used to access organization’s emails, create backdoors that will allow future network infiltration attacks, launch ransomware and cause disruption to an organization. Unfortunately the attacks require minimal skill to execute and attack software is begin actively used across the internet.
We recommend you check with your IT team, or managed service provider, to determine if you host Microsoft Exchange on your network. If so, we encourage you to take the following actions:
Due to the ease of compromise, the existing attack tools, and the known attacks, it is not good enough to simply patch Microsoft Exchange, the second step must be taken to verify no compromise has already occurred.
See our SolarWinds Orion E-Focus located here for additional information on creating layers of cyber defense to protect your organization.
If you need assistance, please feel free to reach out to our Cyber Security Services team.
Readers should not act upon information presented without individual professional consultation.
Any federal tax advice contained in this communication (including any attachments): (i) is intended for your use only; (ii) is based on the accuracy and completeness of the facts you have provided us; and (iii) may not be relied upon to avoid penalties.