BTC $59831.0676
ETH $3015.4573
BNB $566.4599
SOL $140.9834
XRP $0.5220
stETH $3005.3363
DOGE $0.1350
TON $5.3168
ADA $0.4610
AVAX $34.1621
TRX $0.1228
wstETH $3513.7983
DOT $7.2084
WETH $3015.9473
WBTC $59803.6422
BCH $438.9622
LINK $13.6917
MATIC $0.7220
UNI $7.1335
ICP $13.3736
LTC $80.8834
DAI $1.0004
IMX $2.2476
FDUSD $1.0022
CAKE $2.5561
RNDR $7.8325
NEAR $6.3289
ETC $26.0608
HBAR $0.1037
PEPE $0.0000
MNT $0.9999
FIL $5.9394
STX $2.1190
OKB $49.2303
ATOM $8.6578
WIF $2.8221
TAO $406.7622
VET $0.0354
MKR $2777.1963
KAS $0.1070
GRT $0.2542
USDE $0.9989
XMR $122.8785
FET $2.0407
XLM $0.1108
AR $34.0444
INJ $23.6785
BTC $59831.0676
ETH $3015.4573
BNB $566.4599
SOL $140.9834
XRP $0.5220
stETH $3005.3363
DOGE $0.1350
TON $5.3168
ADA $0.4610
AVAX $34.1621
TRX $0.1228
wstETH $3513.7983
DOT $7.2084
WETH $3015.9473
WBTC $59803.6422
BCH $438.9622
LINK $13.6917
MATIC $0.7220
UNI $7.1335
ICP $13.3736
LTC $80.8834
DAI $1.0004
IMX $2.2476
FDUSD $1.0022
CAKE $2.5561
RNDR $7.8325
NEAR $6.3289
ETC $26.0608
HBAR $0.1037
PEPE $0.0000
MNT $0.9999
FIL $5.9394
STX $2.1190
OKB $49.2303
ATOM $8.6578
WIF $2.8221
TAO $406.7622
VET $0.0354
MKR $2777.1963
KAS $0.1070
GRT $0.2542
USDE $0.9989
XMR $122.8785
FET $2.0407
XLM $0.1108
AR $34.0444
INJ $23.6785
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • What is the new ProxyNotShell exploit capable of?


    It has become known that the new ProxyNotShell exploit uses recently discovered vulnerabilities in Microsoft Exchange Server.

    ProxyNotShell exploits 2 vulnerabilities:

    • CVE-2022-41040 (CVSS: 8.8) is an elevation of privilege vulnerability in Microsoft Exchange Server. It allows an attacker to remotely exploit the second bug;
    • CVE-2022-41082 (CVSS: 8.8) is a bug in Microsoft Exchange Server that allows an authorized cybercriminal to compromise the underlying Exchange server using PowerShell, which can lead to a complete compromise.

    Microsoft has yet to release a fix, but has advised users to add a block rule as a mitigation measure. You can also block incoming traffic to Exchange servers containing critical claims for protection, but only if such a measure does not affect vital operations.

    Both vulnerabilities were discovered during an attack on the Vietnamese company GTSC at the end of September. Individually, the vulnerabilities are not particularly dangerous, but exploits that combine them together can potentially lead to catastrophic consequences.

    At the same time, a low level of privileges is required to exploit vulnerabilities, which makes it easier for a hacker to work. The exploit provides an attacker with the ability to:

    • remotely read emails directly from the organization's server;
    • hack a company via remote code execution using CVE-2022-41040;
    • inject malware into the Exchange server using CVE-2022-41082.

    What's more, a hacker only needs to find one valid email address and password combination on a given Exchange server, which is an easy task because this attack bypasses MFA or FIDO authentication for Outlook Web Access logins.

    Author DeepWeb
    Intel Alder Lake processor source code leaked online
    The US government said what Chinese hackers have been using to attack critical US infrastructure since 2020

    Comments 0

    Add comment