Microsoft has some great tips to help you spot Outlook security flaws

Red padlock open on electric circuits network dark red background
(Image credit: Shutterstock/Chor muang)

Microsoft has released a new guide to help users determine whether or not a threat actor tried to steal sensitive data by exploiting a recently patched zero-day vulnerability found in its Outlook email client.

The vulnerability is tracked as CVE-2023-23397, and it’s described as a privilege escalation security flaw on Windows, allowing threat actors to steal NTLM hashes without the victim interacting on their side of the endpoint. The attack is called NTLM-relay zero-click attack.

Tarlogic describes NTLM hashes as “cryptogrpahic formats” in which Windows stores user passwords. These hashes are stored in the Security Account Manager (SAM), or NTDS file of a domain controller. “They are a fundamental part of the mechanism used to authenticate a user through different communications protocols,” it says.

Multiple signs of exploitation

To leverage the flaw and steal these hashes, a threat actor can send a specially crafted message with extended MAPI properties. These will contain UNC paths (Universal naming convention paths, used to access network resources) to attacker-controlled Server Message Block (SMB) shares. 

Now, back to what Microsoft did - the Redmond software giant claims there are multiple signs of exploitation that IT teams can analyze: telemetry data from firewalls, proxies, VPN tools, RDP Gateway logs, Azure Active Directory sign-in logs for Exchange Online users, or IIS Logs for Exchange Server. 

They can also look for data like Windows event logs, or telemetry data from endpoint detection and response solutions. Threat actors will often target Exchange EWS/OWA users, and look to change mailbox folder permissions to grant themselves persistent access, which is also what IT teams can look for, Microsoft concluded. 

"To address this vulnerability, you must install the Outlook security update, regardless of where your mail is hosted (e.g., Exchange Online, Exchange Server, some other platform) or your organization’s support for NTLM authentication," the Microsoft Incident Response team said.

Finally, the company also released a script that helps admins automate the process and determine if any Exchange users were compromised. 

Via: BleepingComputer

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Outlook
Dangerous Microsoft Outlook flaw could let hackers send out malware via email
Flag of the People's Republic of China overlaid with a technological network of wires and circuits.
One of the biggest flaws exploited by Salt Typhoon hackers has had a patch available for years
A phone sitting on a laptop keyboard with the Microsoft Outlook logo on the screen.
US government warns users to patch this critical Microsoft Outlook bug
Image of someone clicking a cloud icon.
Microsoft's new expanded logging capabilities could mean big changes for US government devices
The best free firewall
Microsoft fixes Power Pages security flaw, tells users to be on their guard
Representational image of a cybercriminal
Microsoft just patched a host of worrying security issues, so update now
Latest in Security
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Coinbase targeted after recent Github attacks
hacker.jpeg
Key trusted Microsoft platform exploited to enable malware, experts warn
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Oracle
Oracle denies data breach after hacker claims to hold six million records
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Latest in News
A phone showing a ChatGPT app error message
ChatGPT is down for many – here's what's going on
AirPods Max with USB-C in every color
Apple's AirPods Max with USB-C will get lossless audio in April, but you'll need to go wired
A woman sitting in a chair looking at a Windows 11 laptop
It looks like Microsoft might have thought better about banishing Copilot AI shortcut from Windows 11
US flags
US government IT contracts set to be centralized in new Trump order
Tesla Roadster 2
Tesla is still taking deposits on its long overdue Roadster, despite promising it would arrive in 2020
Samsung HW-Q990D soundbar with Halloween theme over the top
Samsung promises to repair soundbars bricked by its disastrous software update for free – but it'll probably involve shipping