Cybercriminals continue to exploit Microsoft Exchange unpatched servers. Cybersecurity investigators at Sophos report an unknown attack after trying to use ProxyLogon to exploit the malicious Monero crypto-miner from Exchange servers, while a paid load is held on the damaged Exchange server.

360 Mobile Vision - 360mobilevision.com North & South Carolina Security products and Systems Installations for Commercial and Residential - $55 Hourly Rate. ACCESS CONTROL, INTRUSION ALARM, ACCESS CONTROLLED GATES, INTERCOMS AND CCTV INSTALL OR REPAIR 360 Mobile Vision - 360mobilevision.com is committed to excellence in every aspect of our business. We uphold a standard of integrity bound by fairness, honesty and personal responsibility. Our distinction is the quality of service we bring to our customers. Accurate knowledge of our trade combined with ability is what makes us true professionals. Above all, we are watchful of our customers interests, and make their concerns the basis of our business.

Cyber ​​attackers are scanning the Internet for compromising Microsoft Exchange servers that can exploit us to create a cryptocurrency. “Free money for attackers,” warns cybersecurity researchers.

Monero is not valuable as Bitcoin, but it is easy to install and, especially for cybercriminals, provides a lot of anonymity, which makes the wallet owner – and those who follow the attack – difficult to track.

Cybersecurity investigators in Sophos reported that the Monero wallet of the threat actor after the attack began earning money on March 9 (Patch Tuesday when Exchange updates were released as part of the review cycle), coinciding with a time when researchers first saw the attack.

Over time, the attacker lost several servers and the outcome of the crypto mines declined, but then he acquired more new ones than he did with the initial loss, Sophos reported.

While the risk of cryptocurrency miners may not sound as bad as hacking or loss of sensitive data, there is still a concern for organizations.

The post Cybercriminals are Doing Microsoft Exchange Exploitation by installing Cryptojacking appeared first on Virtualattacks.

By admin