{"id":18452,"date":"2021-09-27T08:56:25","date_gmt":"2021-09-27T08:56:25","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=18452"},"modified":"2026-04-17T18:07:45","modified_gmt":"2026-04-17T18:07:45","slug":"insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/","title":{"rendered":"Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Analysis of the Kill Chain of the LockFile Ransomware Group<\/h2>\n\n\n\n<p><strong>KDU Tool Terminating Multiple Antivirus Processes<\/strong><\/p>\n\n\n\n<p>The attacker renames the KDU tool (open-source Windows driver loader implementing DSG bypass via an exploit) autologin, copies the related program to the temporary directory, and loads and executes the designated driver file to execute code with kernel privileges to terminate the antivirus process. <\/p>\n\n\n\n<p>Our analysis of the .sys file loaded by the attacker suggests that with simple functions, this program traverses all processes in the system, locates the antivirus process according to its name, and terminates it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"915\" height=\"484\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18453\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1.jpg 915w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1-300x159.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1-768x406.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1-200x106.jpg 200w\" sizes=\"(max-width: 915px) 100vw, 915px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"987\" height=\"553\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/w.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18455\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/w.jpg 987w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/w-300x168.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/w-768x430.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/w-200x112.jpg 200w\" sizes=\"(max-width: 987px) 100vw, 987px\" \/><\/figure>\n\n\n\n<p>In the driver, process names of multiple antivirus software are saved, like McAfee, Symantec, Windows Defender, and VIPRE.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"534\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/e-1024x534.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18457\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/e-1024x534.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/e-300x156.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/e-768x400.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/e-200x104.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/e.jpg 1097w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>After the autologin.sys driver is loaded, a tool is used to obtain the output of the driver.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"549\" height=\"222\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/r.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18459\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/r.jpg 549w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/r-300x121.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/r-200x81.jpg 200w\" sizes=\"(max-width: 549px) 100vw, 549px\" \/><\/figure>\n\n\n\n<p>It is noteworthy that KDU loads the driver file to the memory for execution through mapping, instead of following the normal driver loading process. Therefore, a traditional check tool is unable to obtain the loaded driver.<\/p>\n\n\n\n<p><strong>LockFile Execution for Encryption and Self-Deletion Upon Encryption<\/strong><\/p>\n\n\n\n<p>autoupdate.exe is a 64-bit program used by LockFile to encrypt files. This program is packed using UPX.<\/p>\n\n\n\n<p>This program performs the following steps: <\/p>\n\n\n\n<p>1. Create a mutex &#8220;25a01bb859125507013a2fe9737d3c33&#8221;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"484\" height=\"141\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/t.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18462\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/t.jpg 484w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/t-300x87.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/t-200x58.jpg 200w\" sizes=\"(max-width: 484px) 100vw, 484px\" \/><\/figure>\n\n\n\n<p>2. Decode some wmic commands and execute the following seven commands using cmd \/c to terminate related processes, like VMware, VirtualBox, SQLServer, MySQL, and Oracle.<\/p>\n\n\n\n<p>wmic process where &#8220;name&nbsp; like &#8216;%vmwp%'&#8221; call terminate<\/p>\n\n\n\n<p>wmic process where &#8220;name&nbsp; like &#8216;%vbox%'&#8221; call terminate<\/p>\n\n\n\n<p>wmic process where &#8220;name&nbsp; like &#8216;%sqlservr%'&#8221; call terminate<\/p>\n\n\n\n<p>wmic process where &#8220;name&nbsp; like &#8216;%mysqld%'&#8221; call terminate<\/p>\n\n\n\n<p>wmic process where &#8220;name&nbsp; like &#8216;%omtsreco%'&#8221; call terminate<\/p>\n\n\n\n<p>wmic process where &#8220;name&nbsp; like &#8216;%tnslsnr%'&#8221; call terminate <\/p>\n\n\n\n<p>wmic process where &#8220;name&nbsp; like &#8216;%vmware%'&#8221; call terminate<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"738\" height=\"153\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/y.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18464\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/y.jpg 738w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/y-300x62.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/y-200x41.jpg 200w\" sizes=\"(max-width: 738px) 100vw, 738px\" \/><\/figure>\n\n\n\n<p>3. Obtain all logical driver letters. For a hard disk or USB flash drive, a new thread will be created to encrypt the corresponding file, add the .lockfile suffix to the file name, create a ransomware file LOCKFILE-README-&lt;computer name&gt;-&lt;time&gt;.hta (&lt;computer name&gt; is the computer name and &lt;time&gt; is the timestamp) in the driver directory, and write the encoded contents to the .hta file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"921\" height=\"514\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/g.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18466\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/g.jpg 921w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/g-300x167.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/g-768x429.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/g-200x112.jpg 200w\" sizes=\"(max-width: 921px) 100vw, 921px\" \/><\/figure>\n\n\n\n<p>After all files are encrypted, autoupdate.exe will generate the %PUBLIC%\\LOCKFILE-README.hta file and invoke mshta to execute the this HTA file.<\/p>\n\n\n\n<p>During encryption, the Rijndael algorithm (used by AES) is used to encrypt file contents.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"709\" height=\"182\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/d.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18468\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/d.jpg 709w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/d-300x77.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/d-200x51.jpg 200w\" sizes=\"(max-width: 709px) 100vw, 709px\" \/><\/figure>\n\n\n\n<p>4. Create a process to execute the following command to delete itself: cmd \/c ping 127.0.0.1 -n 5 &amp;&amp; del &#8220;%s&#8221; &amp;&amp; exit<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"898\" height=\"319\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/s.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18470\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/s.jpg 898w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/s-300x107.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/s-768x273.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/s-200x71.jpg 200w\" sizes=\"(max-width: 898px) 100vw, 898px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Attack Check<\/h2>\n\n\n\n<p>1. By reference to the event IoCs, users can check whether communication records of the following IP addresses\/domain names exist in the current network:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Domain name of C&amp;C of Cobalt Strike:<\/li><\/ul>\n\n\n\n<p>sc.microsofts.net<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>IP address for PowerShell download:<\/li><\/ul>\n\n\n\n<p>209.14.0.234<\/p>\n\n\n\n<p>45.91.83.176<\/p>\n\n\n\n<p>183.226.73.185<\/p>\n\n\n\n<p>178.63.226.197<\/p>\n\n\n\n<p>2. Check system application logs to determine whether the following event sequence exists: Front End HTTP Proxy &#8211; Autodiscover &#8211; MapiMailboxAppPool.<\/p>\n\n\n\n<p>3. Check Exchange access logs for the following signature sequences:<\/p>\n\n\n\n<ul class=\"wp-block-list\" type=\"1\"><li>\/autodiscover\/autodiscover.json@domain name\/ews\/exchange.asmx<\/li><li>\/autodiscover\/autodiscover.json@domain name\/autodiscover\/autodiscover.xml<\/li><li>\/autodiscover\/autodiscover.json@domain name\/mapi\/emsmdb<\/li><li>\/autodiscover\/autodiscover.json@domain name\/powershell\/?X-Rps-CAT=&lt;Base64 string&gt;<\/li><\/ul>\n\n\n\n<p>4. Check Exchange audit logs for the following signatures:<\/p>\n\n\n\n<ul class=\"wp-block-list\" type=\"1\"><li>New-ManagementRoleAssignment &Atilde;&nbsp; New-MailboxExportRequest<\/li><li>Export requests are written to the web directory, C:\\ProgramData, or C:\\Users\\.<\/li><li>Exchange audit logs are saved under the Exchange installation directory by default, such as C:\\Program Files\\Microsoft\\Exchange Server\\V15\\Logging\\LocalQueue\\Exchange.<\/li><\/ul>\n\n\n\n<p>5. Check whether the root directory (such as C:\\inetpub\\wwwroot\\aspnet_client\\) of ASP.Net and the frontend directory (such as C:\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy \\owa\\auth) contain malicious WebShell. Also, check whether site nodes in IIS storage configuration area files (like C:\\Windows\\System32\\inetsrv\\config\\applicationHost.config) contain suspicious virtualDirectory configuration items.<\/p>\n\n\n\n<p>According to our analysis of detected samples, we find that some attackers plant WebShells to the web path by modifying this configuration file, and create the Windows device name directory for further concealment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Versions Affected by ProxyShell Vulnerabilities:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Exchange Server 2010 (official support is no longer available)<\/li><li>Exchange Server 2013<\/li><li>Exchange Server 2016<\/li><li>Exchange Server 2019<\/li><\/ul>\n\n\n\n<p><strong>Versions Affected by PetitPotam Vulnerabilities:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Windows Server, version 20H2 (Server Core Installation)<\/li><li>Windows Server, version 2004 (Server Core installation)<\/li><li>Windows Server 2019&nbsp; (Server Core installation)<\/li><li>Windows Server 2019<\/li><li>Windows Server 2016&nbsp; (Server Core installation)<\/li><li>Windows Server 2016<\/li><li>Windows Server 2012 R2 (Server Core installation)<\/li><li>Windows Server 2012 R2<\/li><li>Windows Server 2012 (Server Core installation)<\/li><li>Windows Server 2012<\/li><li>Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)<\/li><li>Windows Server 2008 for x64-based Systems Service Pack 2<\/li><li>Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)<\/li><li>Windows Server 2008 for 32-bit Systems Service Pack 2<\/li><li>Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)<\/li><li>Windows Server 2008 R2 for x64-based Systems Service Pack 1<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">ProxyShell Vulnerability Check<\/h2>\n\n\n\n<p><strong>Script Check<\/strong><\/p>\n\n\n\n<p>Users can use the official Exchange Server running check script to check whether the current Exchange Server is affected. This script can be downloaded from the following address: https:\/\/microsoft.github.io\/CSS-Exchange\/Diagnostics\/HealthChecker\/<\/p>\n\n\n\n<p><strong>Detection with NSFOCUS Products<\/strong><\/p>\n\n\n\n<p>NSFOCUS Remote Security Assessment System (RSAS) and Web Vulnerability Scanning System (WVSS) are capable of scanning and detecting the vulnerabilities. Please upgrade them to V6.0R02F01.2405 or later.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>&nbsp;<\/td><td><strong>Update Package Version<\/strong><strong><\/strong><\/td><td><strong>Download Link<\/strong><\/td><\/tr><tr><td><strong>RSAS V6 system plug-in package<\/strong><strong><\/strong><\/td><td>V6.0R02F01.2405<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/118556<\/td><\/tr><tr><td><strong>RSAS V6&#8217;s web plug-in package<\/strong><strong><\/strong><\/td><td>V6.0R02F00.2305<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/118857<\/td><\/tr><tr><td><strong>WVSS V6&#8217;s web plug-in package<\/strong><strong><\/strong><\/td><td>V6.0R03F00.224<\/td><td>http:\/\/update.nsfocus.com\/update\/downloads\/id\/118860<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>For how to update NSFOCUS RSAS, click the following link: <a href=\"https:\/\/mp.weixin.qq.com\/s\/SgOaCZeKrNn-4uR8Yj_C3Q\">https:\/\/mp.weixin.qq.com\/s\/SgOaCZeKrNn-4uR8Yj_C3Q<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigations<\/h2>\n\n\n\n<p>Before updates are applied for vulnerability remediation, users should use an intrusion detection device to mainly monitor for Exchange Server&#8217;s illegal outreach behaviors, internal port scannings, and worm behaviors.<\/p>\n\n\n\n<p>Users are advised not to open emails from suspicious sources in case attackers exploit vulnerabilities in question to execute arbitrary code.<\/p>\n\n\n\n<p>If users cannot apply updates for the time being, keep a close eye on Exchange Server login failures, clear zombie accounts and accounts of resigned employees and suppliers, reset accounts with login failures, and change accounts&#8217; weak passwords to strong ones that meet password complexity requirements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA). A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Analysis of the Kill Chain of the LockFile Ransomware Group KDU Tool Terminating Multiple Antivirus Processes The attacker renames the KDU tool (open-source Windows driver loader implementing DSG bypass via an exploit) autologin, copies the related program to the temporary directory, and loads and executes the designated driver file to execute code with kernel privileges [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":35781,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[],"class_list":["post-18452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Analysis of the Kill Chain of the LockFile Ransomware Group KDU Tool Terminating Multiple Antivirus Processes The attacker renames the KDU tool\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-27T08:56:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1-1.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Analysis of the Kill Chain of the LockFile Ransomware Group KDU Tool Terminating Multiple Antivirus Processes The attacker renames the KDU tool\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2\",\"datePublished\":\"2021-09-27T08:56:25+00:00\",\"dateModified\":\"2026-04-17T18:07:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/\"},\"wordCount\":1190,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/q-1-1.jpg\",\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/\",\"name\":\"Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/q-1-1.jpg\",\"datePublished\":\"2021-09-27T08:56:25+00:00\",\"dateModified\":\"2026-04-17T18:07:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/q-1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/q-1-1.jpg\",\"width\":915,\"height\":484,\"caption\":\"Snippet of computer code with comments.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2 - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2 - NSFOCUS","og_description":"Analysis of the Kill Chain of the LockFile Ransomware Group KDU Tool Terminating Multiple Antivirus Processes The attacker renames the KDU tool","og_url":"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/","og_site_name":"NSFOCUS","article_published_time":"2021-09-27T08:56:25+00:00","article_modified_time":"2026-04-17T18:07:45+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1-1.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2 - NSFOCUS","twitter_description":"Analysis of the Kill Chain of the LockFile Ransomware Group KDU Tool Terminating Multiple Antivirus Processes The attacker renames the KDU tool","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1-1.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2","datePublished":"2021-09-27T08:56:25+00:00","dateModified":"2026-04-17T18:07:45+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/"},"wordCount":1190,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1-1.jpg","articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/","url":"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/","name":"Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1-1.jpg","datePublished":"2021-09-27T08:56:25+00:00","dateModified":"2026-04-17T18:07:45+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/09\/q-1-1.jpg","width":915,"height":484,"caption":"Snippet of computer code with comments."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/insights-into-ransomware-spread-using-exchange-1-day-vulnerabilities-2-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Insights into Ransomware Spread Using Exchange 1-Day Vulnerabilities 2-2"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/18452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=18452"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/18452\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35781"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=18452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=18452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=18452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}