Microsoft Data Breach: Quick Answers Remain Crucial for Companies

18. March 2021

The attack on Microsoft Exchange Server is still classified as business-critical by the Federal Office for Information Security  (see German security warning) and is still causing great uncertainty among companies. Meanwhile, additional hacker groups are focusing on the vulnerability which means that attack methods continue to vary and the threat situation is becoming increasingly complex.

There are security updates to fix the vulnerability. However, how do companies get information about their threat situation?

Of course, system administrators should immediately install the security updates provided by Microsoft. It is important though to conduct further security checks. This is the only way to learn whether hackers have already been active. If your IT systems were already compromised before the updates were applied, attackers can also gain access in the future through built-in backdoors or further extend their attack. Therefore, you should immediately check the following:

  • Are your systems affected by the vulnerability?
  • Has the vulnerability already been exploited on your systems and have any traces been covered up?
  • Are attackers currently active in your systems?
  • Have backdoors or remote shells been installed on your servers?

Act quickly – We are here for you

We provide you with quick answers by performing a THOR forensic scan. This pragmatic process approach identifies the vulnerability, shows whether it has already been exploited and indicates if hackers have created backdoors. You quickly gain clarity and can act accordingly. An extensive IT forensic investigation only makes sense in cases of a well-founded suspicion.

Contact us, we are happy to help you.

Also interesting:

Andrea Tubach is the new CEO of usd AG

Andrea Tubach is the new CEO of usd AG

Yesterday, at usd's Annual General Meeting and the subsequent meeting of the new Supervisory Board, long-prepared personnel changes were unanimously approved and then celebrated with an atmosphere of deep friendship: Andrea Tubach takes over as CEO. The founder and...

Security Advisories on Vtiger

Security Advisories on Vtiger

The pentest professionals at usd HeroLab examined Vtiger Open Source Edition 8.2.0 during the execution of their pentests. Our analysts discovered two vulnerabilities in the Vtiger software that allow low-privileged authorized users to upload files and execute...

NIS-2 Draft Bill under Examination: Everything You Need to Know

NIS-2 Draft Bill under Examination: Everything You Need to Know

A few days ago, the AG KRITIS published the latest draft bill on the NIS-2 Implementation Law (NIS2UmsuCG) on its website. Which requirements could become relevant for you if the law is passed in this version? Our experts have analyzed the draft for you and summarized...

Categories

Categories