Cyber criminals and nation-state actors believed to be affiliated with the Chinese government continue to exploit recently announced vulnerabilities in Microsoft Exchange on-premises products, posing a serious risk to federal agencies and private organizations, the Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency said this week in a joint advisory.

The advisory provides technical indicators of compromise for which recipients are advised to scan their networks and immediately implement the prescribed patches.

鈥淪uccessful exploitation of these vulnerabilities allows an attacker to access victims鈥 Exchange Servers, enabling them to gain persistent system access and control of an enterprise network,鈥 the advisory notes. 鈥淚t has the potential to affect tens of thousands of systems in the United States and provides adversaries with access to networks containing valuable research, technology, personally identifiable information (PII), and other sensitive information from entities in multiple U.S. sectors. FBI and CISA assess that adversaries will continue to exploit this vulnerability to compromise networks and steal information, encrypt data for ransom, or even execute a destructive attack. Adversaries may also sell access to compromised networks on the dark web.鈥

John Riggi, AHA senior advisor for cybersecurity and risk, said, 鈥淭his is now a cyber race. The adversaries are acutely aware that they have been exposed and that their covert access to a reported 60,000 organizations worldwide may end soon as patches are implemented. They will no doubt attempt to exfiltrate as much data as possible, conduct ransomware attacks or burrow deeper into the networks before their access ends. It is imperative that affected organizations implement the prescribed patches as soon as possible. Breach reports or request for assistance from the government should be directed to the FBI鈥檚 24/7 CyWatch at 855-292-3937.鈥

For further information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org.

Related News Articles

Chairperson's File
Public
Cybersecurity and physical threats are unfortunately significant enterprise risks for health care, regardless of size or location. Every hospital, physician鈥
Headline
The Cybersecurity and Infrastructure Security Agency April 17 released guidance to reduce risks associated with a reported breach of Oracle cloud services.鈥
Headline
The National Counterintelligence and Security Center, the FBI, and the Defense Counterintelligence and Security Center yesterday released guidance on鈥
AHA Cyber Intel
While the rate of cyberattacks on hospitals has risen dramatically, the severity of the impacts has also grown exponentially. Let鈥檚 look at the state of cyber鈥
Headline
The House Energy and Commerce Oversight and Investigations Subcommittee April 1 discussed cybersecurity threats in legacy medical devices during a hearing. The鈥
Headline
The Trump Administration March 28 announced that it renewed for one year the public emergency for ongoing malicious cyber-enabled activities against the U.S.鈥