04-Mar-2021 00:20
Hi
we're publishing the owa/outlook through f5 ltm and yesterday we received and update that new kind of attack is targeting exchange servers
https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/
is there anything else we can do on f5 machine other than updating our exchange servers to prevent this kind of attack?
today we are implementing owa web access through apm and 2fa , and direct access to other URLs like:
"/microsoft-server-activesync*"
"/ews*"
"/enterprisevault/*"
"/autodiscover*"
"/mapi*"
"/ecp*"
"/oab*"
Has anyone went through this?
04-Mar-2021 11:09
APM seems like the way to go, if you add authentication before traffic reaching the Exchange server you have a good protection.
it remains kinda unclear in which path the attacks focus, this website suggests one. but things move quickly probably.
https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/
06-Mar-2021 02:14
if you have ASM / AWAF this is useful to check:
https://devcentral.f5.com/s/articles/HAFNIUM-APT-Group-Exploiting-Microsoft-Exchange-Vulnerabilities
06-Mar-2021 22:19
Thank you boneyard 🙂 Great articles
We do have the APM along with 2fa on the OWA
we'll check also the ASM option
I saw also that DevCentral published ASM template to have OWA in blocking mode from day one
https://devcentral.f5.com/s/articles/new-asm-outlook-web-access-owa-2016-template-for-bigip-v13-29413