My guess:

Email phish to an admin/gained access planted the dll

On 10/7/2015 11:12 AM, Michael B. Smith wrote:

The Exchange team had more to say off-the-record. This is for public consumption.

But “we” had it right to start with.  The server was already compromised.

*From:*[email protected] [mailto:[email protected]] *On Behalf Of *Kurt Buff
*Sent:* Wednesday, October 7, 2015 1:59 PM
*To:* [email protected]
*Cc:* ntsysadm
*Subject:* Re: [NTSysADM] RE: [Exchange] So, how did they plant the malware?

How very bland. I'm still left wanting more details.

The original security report doesn't specifically call out an OWA vuln, so I'm wondering how the victim screwed up. Probably something really basic, but no way to tell at this point.

Even so, thank you Michael.

Kurt

On Wed, Oct 7, 2015 at 10:11 AM, Michael B. Smith <[email protected] <mailto:[email protected]>> wrote:

The Exchange Team’s response, hot off the presses:

http://blogs.technet.com/b/exchange/archive/2015/10/07/no-new-security-vulnerability-in-outlook-web-access-owa.aspx

*From:*[email protected] <mailto:[email protected]> [mailto:[email protected] <mailto:[email protected]>] *On Behalf Of *Andrew S. Baker
*Sent:* Wednesday, October 7, 2015 12:03 PM
*To:* ntsysadm
*Cc:* [email protected] <mailto:[email protected]>
*Subject:* Re: [NTSysADM] RE: [Exchange] So, how did they plant the malware?

This is absolutely a "need more info" type of scenario.

Nothing in the article begins to hint at an actual OWA weakness, in any event.


*ASB
**http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>*_
_**Providing Virtual CIO Services (IT Operations & Information Security) for the SMB market…*

* GPG: *1AF3 EEC3 7C3C E88E B0EF 4319 8F28 A483 A182 EF3A

On Wed, Oct 7, 2015 at 11:37 AM, Michael B. Smith <[email protected] <mailto:[email protected]>> wrote:

We've been discussing this on a couple of closed lists. Long-story short - insufficient data at this time.

The wording of the story is also of some concern. "Outlook mailserver"? Not Exchange?

Also, how was the DLL injected? Was the server already compromised? If so, game over and it isn't OWA's fault.


-----Original Message-----
From: [email protected] <mailto:[email protected]> [mailto:[email protected] <mailto:[email protected]>] On Behalf Of Kurt Buff
Sent: Wednesday, October 7, 2015 11:32 AM
To: [email protected] <mailto:[email protected]>; ntsysadm
Subject: [Exchange] So, how did they plant the malware?

The article is short on details, and so is the security firm's PDF.
Very scary, but nothing in the way of actionable intelligence, AFAICT http://arstechnica.com/security/2015/10/new-outlook-mailserver-attack-steals-massive-number-of-passwords/




Reply via email to