{"id":2839,"date":"2021-03-09T12:06:34","date_gmt":"2021-03-09T12:06:34","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=2839"},"modified":"2021-03-09T12:06:34","modified_gmt":"2021-03-09T12:06:34","slug":"how-to-protect-your-customers-from-hafnium","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2021\/03\/resources\/how-to-protect-your-customers-from-hafnium\/","title":{"rendered":"How to Protect Your Customers from HAFNIUM"},"content":{"rendered":"<p>On March 2nd 2021, zero-day vulnerabilities affecting Microsoft Exchange were publicly disclosed. These vulnerabilities are being actively exploited in the wild by HAFNIUM, a threat actor believed to be a nation state. According to an <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/current-activity\/2021\/03\/02\/microsoft-releases-out-band-security-updates-exchange-server\" target=\"_blank\" rel=\"noopener\">alert from the CISA<\/a>:<\/p>\n<p>\u201c<em>Microsoft has released out-of-band security updates to address vulnerabilities affecting Microsoft Exchange Server 2013, 2016, and 2019. A remote attacker can exploit three remote code execution vulnerabilities\u2014CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065\u2014to take control of an affected system and can exploit one vulnerability\u2014CVE-2021-26855\u2014to obtain access to sensitive information. <strong><i>These vulnerabilities are being actively exploited in the wild<\/i><\/strong>.<\/em>\u201d<\/p>\n<p><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/current-activity\/2021\/03\/03\/cisa-issues-emergency-directive-and-alert-microsoft-exchange\" target=\"_blank\" rel=\"noopener\">CISA issued an emergency directive<\/a> urging organizations to patch on-premises Exchange Servers while performing associated security scans to see if attackers are in the systems.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>What should Sophos customers do?<\/strong><\/h2>\n<p><strong>The Sophos MTR team has published\u00a0<\/strong><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/03\/05\/hafnium-advice-about-the-new-nation-state-attack\/\" target=\"_blank\" rel=\"noopener\"><strong>a step-by-step guide<\/strong><\/a><strong>\u00a0on how to search a customer\u2019s network for signs of compromise.<\/strong><\/p>\n<p>The good news is that Sophos MTR, network, and endpoint customers have multiple protections against the exploitation of the new vulnerabilities.<\/p>\n<p>A <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/03\/08\/protecting-sophos-customers-from-hafnium\/\" target=\"_blank\" rel=\"noopener\">Sophos News article<\/a> has been published which reviews many of these protections:<\/p>\n<ul>\n<li>Related AV signatures that have blocked HAFNIUM, and advice on what to do if they\u2019ve been triggered<\/li>\n<li>Queries Sophos EDR customers can run to identify potential web shells for investigation<\/li>\n<li>IPS signatures for Sophos Firewall customers<\/li>\n<\/ul>\n<p>Multiple security advisories have already been sent to MTR customers outlining the issue and what the MTR is doing to keep customers protected.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Sophos Managed Threat Response (MTR) and Rapid Response <\/strong><\/h2>\n<p>Organizations have been requesting more info over the past few days about what services Sophos has that can validate their exposure. <strong>Sophos MTR Advanced is the ideal solution to stay protected against advanced attacks like HAFNIUM<\/strong>.<\/p>\n<p>Existing MTR customers can rest easy knowing that the MTR was immediately looking for any related activity in their networks.<\/p>\n<p>If a non-MTR customer is seeing signs that they may be experiencing related adversarial activity we recommend they contact the <a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-threat-response\/rapid-response.aspx\" target=\"_blank\" rel=\"noopener\">Sophos Rapid Response team<\/a> immediately.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On March 2nd 2021, zero-day vulnerabilities affecting Microsoft Exchange were publicly disclosed. These vulnerabilities are being actively exploited in the wild by HAFNIUM, a threat actor believed to be a nation state. According to an alert from the CISA: \u201cMicrosoft [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":300000351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[41,124,21],"coauthors":[64],"class_list":["post-2839","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-resources","tag-managed-threat-response","tag-sophos-rapid-response","tag-threats-malware"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2019\/11\/featured-image-cybersecurity.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/2839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=2839"}],"version-history":[{"count":4,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/2839\/revisions"}],"predecessor-version":[{"id":2843,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/2839\/revisions\/2843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=2839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=2839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=2839"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=2839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}