Russia-Linked Hackers Using Sophisticated Backdoor To Hijack Exchange Servers (securityweek.com) 40
wiredmikey quotes SecurityWeek: The Russia-linked threat group known as Turla has reportedly been using a sophisticated backdoor to hijack Microsoft Exchange mail servers, ESET reported... The malware, dubbed LightNeuron, allows the attackers to read and modify any email passing through the compromised mail server, create and send new emails, and block emails to prevent the intended recipients from receiving them. According to ESET, LightNeuron has been used by Turla — the group is also known as Waterbug, KRYPTON and Venomous Bear — since at least 2014 to target Microsoft Exchange servers. The cybersecurity firm has analyzed a Windows version of the malware, but evidence suggests a Linux version exists as well.
Let's vote on nickname (Score:1)
Cloudy McCloudHole
Good thing no one would ever... (Score:4, Interesting)
...use an Exchange server [wikipedia.org] to handle sensitive or classified information [battleswarmblog.com]...
Re: (Score:1)
This is incorrect. Besides public denunciations of the invasion the Obama administration threw on economic sanctions as well - something the Russian's made a point of wanting the Trump administration to get rid of after they got into office (however due to U.S. press publicity and convictions of Administration individuals associated with this I believe the sanctions still remain in place). As to pushing things further, Obama said that with Ukraine being a non Nato country and on the border with Russia, Ru
Re: (Score:1)
Oh, he did care, but McConnell blocked him.
I've tended towards avoiding exchange but (Score:2)
aren't some of the things they're making the servers do features that aren't available to normal users/administrators that could be considered useful as an add-on service?
;
Re: (Score:2)
aren't some of the things they're making the servers do features that aren't available to normal users/administrators that could be considered useful as an add-on service? ;
From what the article says it sounds like the malware is running as a Transport agent on the server. It doesn't give enough details to know if an existing admin installed that Transport agent, or if the admins could remove it or not. Without any more knowledge this smells like someone either intentionally or was tricked into installing malware onto their Exchange servers.
Do they use Microsoft's NSA back-door? (Score:3)
A little sanity here... (Score:2)
Re: A little sanity here... (Score:1)
Uses stenography? They have a Russkie shorthand writer inside the hack?
Cheesus, g-d, these GRU types are getting better by the minute.
Holy Shit (Score:1)
Do they mean to say that Exchange now runs on Linux? That would be a game changer!
Hijack Exchange Servers (Score:2)
What's in YOUR wallet? No, really: WHAT'S in your wallet?
Irony (Score:1)