Skip to content
Facebook Instagram X-twitter Youtube Linkedin

West Coast: (800) 700-7683 — East Coast: (800) 821-1782 — 9033 9th St. Rancho Cucamonga, CA 91730

We Buy Used IT Equipment

Powered By DES

  • Sell Your Equipment
    • Servers
      • Cisco
      • Dell
      • IBM
      • HP
      • Lenovo
      • SuperMicro
    • Backup Tapes
      • LTO Tapes
        • LTO10
        • LTO9
        • LTO8
        • LTO7
        • LTO6
        • LTO5
        • LTO4
        • LTO3
        • LTO Cleaning Tape
      • 3592 Tapes
        • 3592 JK
        • 3592 JE
        • 3592 JD
        • 3592 JC
        • 3592 JB
        • 3592 JA
      • T10k T2 Tapes
      • MLR/SLR Tapes
        • IBM MLR1 SLR32
        • Imation SLR32
        • Sony SLR5
        • Tandberg SLR
        • MLR/SLR Cleaning Tape
      • 4mm Tapes
        • DDS7 – DAT320
        • DDS6 – DAT160
        • DDS5 – DAT72
        • DDS4 – DAT40
      • 8mm VXA Tapes
    • Data Storage
      • Hard Drives
        • HGST
        • Hitachi
        • HP
        • IBM
        • Kingston
        • Samsung
        • Seagate
        • Toshiba
        • Western Digital
      • Storage Arrays
    • Networking
      • Routers
      • Switches
    • VoIP and Telecom
    • Memory
      • Server Memory
      • Laptop Memory
      • Desktop Memory
      • DDR3
      • DDR4
      • DDR5
    • CPUs and Processors
      • Intel Core
      • Intel Xeon
      • AMD
    • Laptops
      • Apple
      • Asus
      • Dell
      • HP
      • IBM Lenovo
      • Samsung
      • Toshiba
    • Tape Drives and Libraries
    • SFP Transceivers
      • Cisco SFP Transceivers
      • HPE SFP Transceivers
    • Scrap Electronics
    • Submit Your List
  • Services
    • Secure IT Asset Disposition
      • Secure Shipping
    • Data Center Services
      • Takeouts
      • Relocation
      • Liquidation
      • Other On-Site Services
    • Data Destruction
      • Data Destruction Compliance
        • Certificate of Data Destruction
        • Physical Data Destruction
        • Permanent Data Erasure
        • Magnetic Degaussing
      • Data Tape Erasure
      • Hard Drive Disposition
        • Hard Drive Sanitization
    • Electronics Recycling
    • Global Advantage Partner
    • Donate to Charity
  • Buy Equipment
    • Backup Tape
    • Data Center Equipment
    • New Equipment
    • Refurbished Equipment
      • Refurbished Servers
    • Warranty Information
  • Lifecycle & Sustainability
    • Lifecycle Services
      • Secure IT Asset Disposition
      • Electronics Recycling
      • Donate IT Equipment to Charity
      • Our ITAD Process
      • Secure Equipment Shipping
    • Resources
      • IT Equipment Recycling
      • E Waste Recycling
      • IT Asset Disposition Guide
      • Data Center Decommissioning
      • Comprehensive Guide to ITAD
      • Guide to Donating IT Equipment to Charity
  • Blog
  • About Us
    • Contact Us
    • Our Processes
    • ITAD White Paper
    • Newsletter
    • References
    • Privacy Policy
    • FAQ
    • Sitemap
  • Get A Quote
  • Sell Your Equipment
    • Servers
      • Cisco
      • Dell
      • IBM
      • HP
      • Lenovo
      • SuperMicro
    • Backup Tapes
      • LTO Tapes
        • LTO10
        • LTO9
        • LTO8
        • LTO7
        • LTO6
        • LTO5
        • LTO4
        • LTO3
        • LTO Cleaning Tape
      • 3592 Tapes
        • 3592 JK
        • 3592 JE
        • 3592 JD
        • 3592 JC
        • 3592 JB
        • 3592 JA
      • T10k T2 Tapes
      • MLR/SLR Tapes
        • IBM MLR1 SLR32
        • Imation SLR32
        • Sony SLR5
        • Tandberg SLR
        • MLR/SLR Cleaning Tape
      • 4mm Tapes
        • DDS7 – DAT320
        • DDS6 – DAT160
        • DDS5 – DAT72
        • DDS4 – DAT40
      • 8mm VXA Tapes
    • Data Storage
      • Hard Drives
        • HGST
        • Hitachi
        • HP
        • IBM
        • Kingston
        • Samsung
        • Seagate
        • Toshiba
        • Western Digital
      • Storage Arrays
    • Networking
      • Routers
      • Switches
    • VoIP and Telecom
    • Memory
      • Server Memory
      • Laptop Memory
      • Desktop Memory
      • DDR3
      • DDR4
      • DDR5
    • CPUs and Processors
      • Intel Core
      • Intel Xeon
      • AMD
    • Laptops
      • Apple
      • Asus
      • Dell
      • HP
      • IBM Lenovo
      • Samsung
      • Toshiba
    • Tape Drives and Libraries
    • SFP Transceivers
      • Cisco SFP Transceivers
      • HPE SFP Transceivers
    • Scrap Electronics
    • Submit Your List
  • Services
    • Secure IT Asset Disposition
      • Secure Shipping
    • Data Center Services
      • Takeouts
      • Relocation
      • Liquidation
      • Other On-Site Services
    • Data Destruction
      • Data Destruction Compliance
        • Certificate of Data Destruction
        • Physical Data Destruction
        • Permanent Data Erasure
        • Magnetic Degaussing
      • Data Tape Erasure
      • Hard Drive Disposition
        • Hard Drive Sanitization
    • Electronics Recycling
    • Global Advantage Partner
    • Donate to Charity
  • Buy Equipment
    • Backup Tape
    • Data Center Equipment
    • New Equipment
    • Refurbished Equipment
      • Refurbished Servers
    • Warranty Information
  • Lifecycle & Sustainability
    • Lifecycle Services
      • Secure IT Asset Disposition
      • Electronics Recycling
      • Donate IT Equipment to Charity
      • Our ITAD Process
      • Secure Equipment Shipping
    • Resources
      • IT Equipment Recycling
      • E Waste Recycling
      • IT Asset Disposition Guide
      • Data Center Decommissioning
      • Comprehensive Guide to ITAD
      • Guide to Donating IT Equipment to Charity
  • Blog
  • About Us
    • Contact Us
    • Our Processes
    • ITAD White Paper
    • Newsletter
    • References
    • Privacy Policy
    • FAQ
    • Sitemap
  • Get A Quote

Microsoft Exchange Server’s Hacked!

Data Security, Servers
  • Steven
  • March 29, 2021
  • 2:23 pm
Browse:
Home Data Security Microsoft Exchange Server’s Hacked!

A universal wave of cyber attacks and data breaches started in early January after four zero-day exploits were discovered in on-premises Microsoft Exchange Servers. Zero-day exploits are unknown exploits in the wild that exposes a vulnerability in software or hardware and can create complicated problems well before anyone realizes something is wrong. At first, a zero-day exploit leaves no opportunity for detection, giving attackers full access to user emails and passwords, administrator privileges, and access to connected devices on the same network. As of March 9, 2021, it was estimated that 250,000 servers fell victim to the attacks, including servers belonging to around 30,000 organizations in the United States.



Zero-Day Exploits

A zero-day exploit exposes a vulnerability in software or hardware. A zero-day attack happens once that software or hardware vulnerability is exploited and attackers release malware before a developer has an opportunity to create a patch to fix it. A great example would be a company’s developers creating software that contains an unknown vulnerability. An attacker notices the weakness before the developer does or even has a chance to fix it. The attacker writes and executes exploit code while the vulnerability is still available. In most cases, either the public recognizes the flaw in the form of identity theft, or the developer catches it and creates a band-aid (patch) to stop the bleeding. These types of attacks are seldom discovered immediately. Sometimes it takes months or years before a developer learns of the vulnerability that led to the attack in the first place.



What Happened with the Microsoft Server Exchange Hack?

Microsoft Exchange Server is an email inbox, calendar, and collaboration solution with users ranging from corporate giants to small and medium-sized businesses around the world. Microsoft was made aware of four zero-day bugs sometime in early January by a DEVCORE researcher. In early March, Microsoft released patches to stop the four critical exposures in its Microsoft Exchange Server software. At the time, Microsoft announced that the bugs were being actively exploited in limited, targeted attacks. It is believed that the hackers acquired Proof-of-Concept attack code that Microsoft shared with antivirus companies as part of the company’s Microsoft Active Protections Program (Mapp). 

While bug fixes have been released, the extent of Exchange Server hack depends on the speed and application of the patches, meanwhile, the number of victims continues to increase. Microsoft is also looking into possible links between Proof-of-Concept attack code issued privately to cybersecurity partners and vendors before the patch release.

SolarWinds Orion: The Biggest Hack of the Year



Who is Responsible for the Cyber-Attack?

Microsoft has announced that the recent Server Exchange attacks using the zero-day flaws were traced back to Hafnium. Hafnium is an advanced persistent threat (APT) group from China. Originating in China, Hafnium uses a network of virtual private servers (VPS) located in the US to conceal their location. However, Microsoft said they have continued to see an increase in the use of these vulnerabilities in attacks targeting unpatched systems by multiple malicious groups outside Hafnium. When zero-day vulnerabilities are discovered and emergency security patches are released, the effects can be substantial. Problems can often be traced back to awareness of new patches, slow uptake, or reasons why IT staff cannot apply a fix. 


Which Vulnerabilities Were Exposed?

According to Microsoft, the vulnerabilities, known as ProxyLogon, impacted on-premises Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019. Microsoft’s Exchange Online was not affected. 

Here is a list of the vulnerabilities that were exposed in the attack:

  • CVE-2021-26855: CVSS 9.1: a Server Side Request Forgery (SSRF) vulnerability leading to crafted HTTP requests being sent by unauthenticated attackers. Servers need to be able to accept untrusted connections over port 443 for the bug to be triggered.
  • CVE-2021-26857: CVSS 7.8: an insecure deserialization vulnerability in the Exchange Unified Messaging Service, allowing arbitrary code deployment under SYSTEM. However, this vulnerability needs to be combined with another or stolen credentials must be used.
  • CVE-2021-26858: CVSS 7.8: a post-authentication arbitrary file write vulnerability to writes to paths. 
  • CVE-2021-27065: CVSS 7.8: a post-authentication arbitrary file write vulnerability to writes to paths. 

If used in an attack chain, all of these vulnerabilities can lead to Remote Code Execution (RCE), server hijacking, backdoors, data theft, and potentially further malware deployment.



How You Can Check Your Servers for Vulnerability

Microsoft is advising IT administrators and customers to apply the security patches without delay. However, just because patches are applied doesn’t mean that servers haven’t already been compromised. The tech giant has published a script on GitHub available to IT administrators to run that includes indicators of compromise linked to the four vulnerabilities. If there are any signs of suspicious behavior dating back as far as September 1, 2020, the Cybersecurity and Infrastructure Security Agency (CISA) needs agencies to disconnect them from the Internet to mitigate the risk of further damage.


Browse:
Home Data Security Microsoft Exchange Server’s Hacked!

Get A Quote

Fill our form here
PrevPreviousAll of the Equipment You Need to Build a Gaming PC
NextCambridge-1: The UK’s Fastest SupercomputerNext
Picture of Steven

Steven

Expertise: Steven is a skilled software developer and designer who’s all about creating scalable web applications. He’s got a sharp eye for detail and a love for innovation, focusing on front-end development, UX/UI design, and blending cool tech like AI and machine learning into easy-to-use interfaces. He’s also fluent in many programming languages. Education: Steven graduated with a Bachelor of Science in Computer Science from UC Berkeley, where he earned honors. While at Berkeley, he got involved with the Computer Science club and worked on a bunch of open-source projects. Experience: Steven has been shaping his career by working with start-ups and freelancing as a developer and designer. He’s been hands-on with creating cool, user-friendly solutions—everything from writing clean code to designing sleek interfaces. Freelancing has let him dive into all sorts of projects, sharpen his skills, and bring awesome ideas to life. This mix of start-up energy and freelance creativity has made Steven super adaptable and great at making things happen. Outside of Work: When Steven isn’t busy with coding, he loves spending time outdoors. He’s big on hiking and nature photography, often hitting the trails on weekends. In his downtime he is trying out new spicy food recipes, and playing the guitar.
All Posts

Client
Testimonials

“The buyback program was easy for me to use. I simply sent WEBUY an email with the list of surplus items that I had. WEBUY replied back with a quoted value. I then shipped WBUY the tapes and quickly received payment. The process was very easy and I felt good that I wasn’t throwing the equipment into the landfill and someone else can make use of them.

I will do business with WBUY again.”

Bay Industries Inc.

“I have to say once I found you the process was relatively quick and straightforward. Your website provided great details and once I submitted my inventory within 24 hours I had a quote and confirmation of the dollar amount.

The entire process from shipment to check in hand was painless and quick, I will most definitely use this service again and have already recommended it to my other peers.”

Masons of California

Subscribe to our newsletter

Your inbox deserves better. Sign up for regular updates, insights, and deals!

  • Sorry, this service is unavailable in your country.

  • Should be Empty:
Visit Us
  • 9th St. Rancho Cucamonga, CA 91730
  • West Coast: (800) 700-7683
  • East Coast: (800) 821-1782
  • Local: (909) 466-7680
We Buy Used IT Equipment

Powered By DES

Facebook Instagram X-twitter Youtube Linkedin
BUY EQUIPMENT
  • Backup Tape
  • New Equipment
  • Refurbished Equipment
  • Warranty Info
  • Backup Tape
  • New Equipment
  • Refurbished Equipment
  • Warranty Info
SELL EQUIPMENT
  • Servers
  • Backup Tape
  • Removable Storage
  • Telecom & VOIP
  • Networking & Switches
  • Memory
  • CPUs and Processors
  • Laptops
  • Tape Drives
  • SFP Transceivers
  • Scrap Electronics
  • Servers
  • Backup Tape
  • Removable Storage
  • Telecom & VOIP
  • Networking & Switches
  • Memory
  • CPUs and Processors
  • Laptops
  • Tape Drives
  • SFP Transceivers
  • Scrap Electronics
SERVICES
  • IT Asset Disposition
  • Data Destruction
  • Data Center Services
  • Secure Shipping
  • Donate Your Assets
  • International Sales
  • Onsite Services
  • Electronics Recycle
  • IT Asset Disposition
  • Data Destruction
  • Data Center Services
  • Secure Shipping
  • Donate Your Assets
  • International Sales
  • Onsite Services
  • Electronics Recycle
STAY INFORMED
  • Blog
  • About Us
  • Contact Us
  • Our Process
  • FAQ
  • Sitemap
  • Blog
  • About Us
  • Contact Us
  • Our Process
  • FAQ
  • Sitemap

© 2025 All Rights Reserved. Website created with ❤ by mrrssy.

Skip to content
Open toolbar Accessibility Tools

Accessibility Tools

  • Increase TextIncrease Text
  • Decrease TextDecrease Text
  • GrayscaleGrayscale
  • High ContrastHigh Contrast
  • Negative ContrastNegative Contrast
  • Light BackgroundLight Background
  • Links UnderlineLinks Underline
  • Readable FontReadable Font
  • Reset Reset
  • SitemapSitemap
  • FeedbackFeedback