/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Researcher publishes a proof of concept on GitHub that uses vulnerabilities exploited by hackers to breach Microsoft Exchange servers; GitHub deleted the code

Lorenzo Franceschi-Bicchierai / VICE :

VICE Lorenzo Franceschi-Bicchierai

Discussion

  • @checkpointsw Check Point on x
    Closely monitoring the revelation of four #zeroday vulnerabilities currently affecting #Microsoft Exchange Servers, @_CPResearch_ reports over 1800 exploits and attack attempts on hundreds of organizations worldwide. Get the details: https://blog.checkpoint.com/ ... #MicrosoftExc…
  • @bleepincomputer @bleepincomputer on x
    BleepingComputer was told by a DearCry - DoejoCrypt victim that only the Microsoft Exchange server was encrypted. No other devices. By only focusing on the Exchange server, they can be launched quicker than normal human-operated ransomware attacks. https://www.bleepingcomputer.co…
  • @hackingdave Dave Kennedy on x
    Blaming red teamers is already an inaccurate statement as it's typically security researchers who publish these. It was already actively exploited with hundreds of thousands of already compromised systems with little to no direction from Microsoft. Yet offsec is to blame? https:/…
  • @hackingdave Dave Kennedy on x
    Wow, I am completely speechless here. Microsoft really did remove the PoC code from Github. This is huge, removing a security researchers code from GitHub against their own product and which has already been patched. This is not good. https://vice.com/...
  • @s1guza Siguza on x
    Honest question: did such takedowns happen before MS bought GH? https://twitter.com/...
  • @erratarob @erratarob on x
    Microsoft acquired GitHub and now censors content: https://www.vice.com/...
  • @lorenzofb Lorenzo Franceschi-Bicchierai on x
    NEW: A researcher published proof-of-concept code to hack Microsoft Exchange servers on GitHub. GitHub has now taken it down arguing it violated its “Acceptable Use Policies.” https://www.vice.com/...
  • @campuscodi Catalin Cimpanu on x
    I initially thought the researcher took down his code as there was another ProxyLogon PoC still on his account. That was removed too, and, according to this report, it was Microsoft who intervened to nuke the gists https://twitter.com/...