Threat Advisory: How to Threat Hunt (Detect) and Mitigate Microsoft Exchange Autodiscover Flaw - PowerPoint PPT Presentation

About This Presentation
Title:

Threat Advisory: How to Threat Hunt (Detect) and Mitigate Microsoft Exchange Autodiscover Flaw

Description:

MicrosoftExchange Autodiscover feature attempts to reduce the steps in the configuration journey and ease the burden on Outlook users. This brings simplicity to the table but along with a significant flaw that can lead to cybersecurity breaches. – PowerPoint PPT presentation

Number of Views:11
Slides: 14
Provided by: SharkStriker
Category: Other

less

Transcript and Presenter's Notes

Title: Threat Advisory: How to Threat Hunt (Detect) and Mitigate Microsoft Exchange Autodiscover Flaw


1
Threat Advisory How to Threat Hunt (Detect) and
Mitigate Microsoft Exchange Autodiscover Flaw
Visit https//sharkstriker.com/
2
How to Threat Hunt (Detect) and Mitigate
Microsoft Exchange Autodiscover Flaw
Microsoft Exchange Autodisover has a major flaw
that reveals user credentials. Until
now, researchers have got hold of around 372,072
Windows domain credentials, and that too within
just four months. The numbers also include 96,671
unique credentials. The more alarming thing is
that this is done by merely using Autodiscover
domains after establishing a Microsoft Exchange
server. The leaked credentials are not for any
dummy domains. Instead, these credentials are for
valid Windows domains used to authenticate and
access Microsoft Exchange servers.
3
How to Threat Hunt (Detect) and Mitigate
Microsoft Exchange Autodiscover Flaw
What is Autodiscover? Autodiscover is a service
or feature that reduces configuration and
deployment steps. The official description of
Autodiscover given on Microsofts site reads,
the Autodiscover service minimizes user
configuration and deployment steps by providing
clients access to Exchange features. For Exchange
Web Services (EWS) clients, Autodiscover is
typically used to find the EWS endpoint URL.
However, Autodiscover can also provide
information to configure clients that use other
protocols. Autodiscover works for client
applications inside or outside firewalls and in
resource forest and multiple forest
scenarios. It is basically an Exchange email
server feature that enables Outlook
administrators and clients to automatically
discover existing email servers, provide
configurations, and set up configurations. The
Autodiscover is designed to reduce the
configuration steps to make the users life
easier. However, it forgets that such designs
need to be developed with security in mind. The
reason is that cybercriminals are fond of such
features that they can use for their own
advantage.
4
How to Threat Hunt (Detect) and Mitigate
Microsoft Exchange Autodiscover Flaw
Where does the Flaw Come into Play? Autodiscover
only requires the users to provide a username and
password for their Outlook clients. It offers
simplicity by completing the rest of the
configuration part through Microsoft Exchanges
Autodiscover protocol.
5
How to Threat Hunt (Detect) and Mitigate
Microsoft Exchange Autodiscover Flaw
Where does the Flaw Come into Play? The protocol
completes the configuration by searching for a
valid Autodiscover URL in the formats mentioned
below. https//autodiscover.xyz.com/autodiscover/
autodiscover.xmlhttp//autodiscover.xyz.com/autod
iscover/autodiscover.xmlhttts//autodiscover.xyz.
onmicrosoft.com/autodiscover/autodiscover.xmlhttt
s//autodiscover.xyz.mail.onmicrosoft.com/autodisc
over/autodiscover.xmlhttps//xyz.com/Autodiscover
/Autodiscover.xmlhttp//xyz.com/Autodiscover/Auto
discover.xml The xyz.com in the above format is
replaced by the domain name that comes post the _at_
sign in the users email address. Failing to
complete the configuration, Autodiscover
initiates a back-off procedure. This is the
process where the flaw exists. During the
back-off procedure, the protocol attempts to
build an Autodiscover URL. This would concoct an
Autodiscover URL that would look something like
6
How to Threat Hunt (Detect) and Mitigate
Microsoft Exchange Autodiscover Flaw
Where does the Flaw Come into Play? http//Autod
iscover.com/Autodiscover/Autodiscover.xml. This
will enable the owner of Autodiscover.com to get
hold of all the requests and credentials that
cant reach the original domain. The below
flowchart shows the workflow of the process
7
How to Threat Hunt (Detect) and Mitigate
Microsoft Exchange Autodiscover Flaw
Where does the Flaw Come into Play? Thus, the
person owning the domain autodiscover.com gets an
opportunity here. Besides the .com, other
Autodiscover top-level domain owners, such as
autodiscover.us or autodisover.net, are at an
advantage too. All the unresponsive requests from
.us and .net domains will fall in the lap of
autodiscover.us and autodiscover.net domain
owners, respectively. Moreover, since there is
no authentication procedure required on the
server side, it becomes easier for cyberattackers
to get sensitive information. Additionally, when
it comes to the client-side, there are no
attempts to verify if the requested resource or
servers are available or even exist before
initiating the request. Thus, the users are
sending their credentials to an unknown server to
set up their Exchange account without any
knowledge. Since Microsoft Suite is a part of
almost every organization, the consequences of
domain credential leaks at such a large scale can
be enormous. In fact, it can put the entire
organization at risk, especially in the current
pandemic era where ransomware attacks are a part
of daily news. There is no easier way for an
attacker to penetrate an organization than using
the valid credentials accessed easily through
domain servers.
8
How to Threat Hunt (Detect) and Mitigate
Microsoft Exchange Autodiscover Flaw
Where does the Flaw Come into Play? Simple
research done from our end highlights that most
of the top TLDs for the Autodiscover domains are
already taken. The below image shows some of
those domains.
9
How to Threat Hunt (Detect) and Mitigate
Microsoft Exchange Autodiscover Flaw
  • How to Mitigate?
  • Mentioned below are some of the quick steps that
    you can use to mitigate the vulnerability
  • Organizations that use Microsoft Exchange should
    block all the TLD domains (autodiscover.tld) at
    the firewall, DNS, Proxy server, or local file
    host level to ensure that the devices do not
    connect to them.
  • Enterprises should ensure that basic
    authentication support is disabled and advanced
    authentication is enabled while deploying or
    configuring Exchange server setups. This is
    because basic authentication, such as HTTP, will
    send all the credentials in plain text without
    encryption, making them more accessible for the
    adversaries to intercept.

10
How to Threat Hunt (Detect) and Mitigate
Microsoft Exchange Autodiscover Flaw
How to Detect? Organizations can detect the
connection of Autodiscover to unknown servers
with the help of firewall, proxy, and endpoint
logs. However, 24/7 monitoring is essential here
to detect the connection as and when it
occurs. The detection can be done by watching
the web traffic over port 443. Enterprises need
to look if the traffic against url_path
/autodiscover/autodiscover.xml connects to any
domains that are not a part of their
organization. An open XDR solution integrated
with a firewall, proxy, EDR, Endpoint, and Cloud
applications becomes handy to detect such attacks
centrally. For instance, in the below example,
the analyst searches for url_path
/autodiscover/autodiscover.xml in the query
while excluding all trusted domains.
11
How to Threat Hunt (Detect) and Mitigate
Microsoft Exchange Autodiscover Flaw
How to Detect? Thus, only the traffic going to
unknown servers will be displayed here
In the above example, we could see traffic going
out to autodiscover.com with a matching url.path.
This hints that user credentials were sent to an
unknown (most probably attackers) server. In
case any web traffic is found going to other than
own or trusted domains that means credentials
might have been leaked. In such a scenario, it is
recommended to ask the users to change their
passwords immediately.
12
Connect With a SharkStriker
  • Also Read
  • Why Do Businesses Need Managed Security Services?
  • Understanding ORCA from sharkstriker
  • Why Go For MDR Service Provider Rather Than MSSP?
  • How XDR Gives 360 Degree Protection For Cyber
    Security?

13
Thank you
1990 N California Blvd Suite 20, Walnut Creek, CA
94596, USA
/company/sharkstriker
/thesharkstriker
1 925 5321900
/TheSharkStriker
sales_at_sharkstriker.com
/thesharkstriker
www.sharkstriker.com
Write a Comment
User Comments (0)
About PowerShow.com