{"id":89737,"date":"2021-11-10T10:36:14","date_gmt":"2021-11-10T10:36:14","guid":{"rendered":"https:\/\/www.stellarinfo.com\/blog\/?p=89737"},"modified":"2023-07-20T06:51:03","modified_gmt":"2023-07-20T06:51:03","slug":"babuk-ransomware-targeting-exchange-servers","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/","title":{"rendered":"&#8216;Tortilla&#8217; Attacking Microsoft Exchange Servers with Babuk Ransomware"},"content":{"rendered":"<?xml encoding=\"utf-8\" ?><?xml encoding=\"utf-8\" ?><p>Tortilla, a new threat actor, is targeting organizations with unpatched Exchange Servers vulnerable to ProxyShell attacks. The threat actor is using the <strong>China Chopper Web Shell<\/strong> to spread the Babuk ransomware and demanding $10,000 ransom in XMR (Monero) cryptocurrency to decrypt the data encrypted by the ransomware.<\/p><p><strong>Tortilla&rsquo;s ransom note:<\/strong><\/p><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"753\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/ransome-note-babuk-ransomware-1-1024x753.png\" alt=\"ransome note babuk ransomware\" class=\"wp-image-89738 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/ransome-note-babuk-ransomware-1-1024x753.png 1024w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/ransome-note-babuk-ransomware-1-300x221.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/ransome-note-babuk-ransomware-1-768x565.png 768w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/ransome-note-babuk-ransomware-1.png 1309w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><p><strong>Source: Cisco<\/strong><\/p><h2 class=\"wp-block-heading\" id=\"what-is-babuk-ransomware?\">What is Babuk Ransomware?<\/h2><p>Babuk ransomware is a new ransomware discovered in early 2021 after it impacted at least 5 major organizations, including Washington D.C. Police Department. One of them even paid $85,000 ransom to the threat actors in order to get their data back.<\/p><p>It was only after the source code of the first Babuk ransomware and builder was leaked on hacking forums that new threat actors and groups, such as Tortilla, began utilizing the ransomware to modify and launch their attacks.<\/p><p>Babuk is one of the most infamous ransomware that encrypts the targeted Exchange Server, interrupts backups, and deletes VSS copies (Volume Shadow Copies), leaving no option for recovery.<\/p><p>Although the threat actors behind the Babuk ransomware are targeting Exchange servers across the globe, most of its victims are from the United States. Some attacks are also noticed in Germany, Brazil, Thailand, and the United Kingdom. Furthermore, the attacks are predicted to increase as attackers are constantly scanning for vulnerable Exchange Servers using the auto-discover URL.<\/p><h2 class=\"wp-block-heading\" id=\"how-is-tortilla-attacking-vulnerable-exchange-servers-with-babuk-ransomware?\">How is Tortilla Attacking Vulnerable Exchange Servers with Babuk Ransomware?<\/h2><p>ProxyShell is a set of three vulnerabilities (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207) identified by Microsoft in August 2021. When chained together, these vulnerabilities allow an attacker to bypass authentication, run malicious scripts, install web shells, backdoors, and perform unauthorized remote code execution on the targeted Exchange Server.<\/p><p>Although Microsoft released updates back in April 2021 and May 2021 to patch ProxyShell vulnerabilities, several organizations are still unpatched and vulnerable to ProxyShell attacks.<\/p><p>The threat actor starts the attack by exploiting the ProxyShell vulnerabilities to access the targeted Exchange Server. Once inside, the attacker drops DLL or .NET executable files on the compromised Exchange Server. Next, the Exchange Internet Information Services or IIS worker process <strong>w3wp.exe<\/strong> that handles the web requests sent to the IIS web server. The IIS process executes the malicious payload to execute another evasive PowerShell command, which bypasses the endpoint protection and invokes a web request to download the payload loader called &lsquo;tortilla.exe.&rsquo;<\/p><p>This loader connects to the Pastebin.pl site to download a payload, loaded into the memory, and injected into the .NET framework process. This eventually starts to encrypt the server data and mounted drives with Babuk ransomware. &nbsp;<\/p><p>Although Czech cybersecurity firm Avast earlier released a decryptor for Babuk ransomware, it doesn&rsquo;t work for this Babuk ransomware variant.<\/p><p>The decryptor can decrypt files or data encrypted using the .babuk, .babyk, or .doydo extensions or whose keys were leaked with the Babuk ransomware source code.<\/p><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"608\" height=\"432\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/babuk-ransowmare-decrypt-2.png\" alt=\"babuk ransowmare decrypt\" class=\"wp-image-89739 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/babuk-ransowmare-decrypt-2.png 608w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/babuk-ransowmare-decrypt-2-300x213.png 300w\" sizes=\"auto, (max-width: 608px) 100vw, 608px\" \/><\/figure><h2 class=\"wp-block-heading\" id=\"how-to-protect-your-organization-from-babuk-ransomware?\">How to Protect your Organization from Babuk Ransomware?<\/h2><p>According to a report by <a href=\"https:\/\/www.shodan.io\/search\/report?query=http.title%3Aoutlook+exchange\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Shodan<\/a>, a search engine that allows users to search different types of Internet-connected servers, more than 25000 Exchange Servers are still unpatched and vulnerable to ProxyShell attacks as of November 9, 2021.<\/p><figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"759\" height=\"511\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/vulnerable-exchange-servers-proxyshell-babuk-ransowmare-3.png\" alt=\"vulnerable exchange servers proxyshell babuk ransowmare\" class=\"wp-image-89740 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/vulnerable-exchange-servers-proxyshell-babuk-ransowmare-3.png 759w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/vulnerable-exchange-servers-proxyshell-babuk-ransowmare-3-300x202.png 300w\" sizes=\"auto, (max-width: 759px) 100vw, 759px\" \/><\/figure><p>To protect your organization from Babuk ransomware, update the Exchange Server. There is no other way around.<\/p><p>It is highly suggested that you identify the vulnerabilities on your Exchange Server and patch them using latest Microsoft Cumulative Updates or Security Updates released for supported Exchange Server versions.<\/p><p>You can follow the steps discussed below to identify the vulnerabilities and patch them to safeguard your organization against ProxyShell attacks.<\/p><ul class=\"wp-block-list\"><li>Download the Exchange Server Health Checker Script or <a href=\"https:\/\/microsoft.github.io\/CSS-Exchange\/Diagnostics\/HealthChecker\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">HealthChecker.ps1<\/a>. The script supports Exchange Server 2013, 2016, and 2019.<\/li><li>Open PowerShell and navigate to the folder where HealthChecker.ps1 script is located.<\/li><li>Then run the following command to execute the script:<\/li><\/ul><pre class=\"wp-block-preformatted\"><strong>.\\HealthChecker.ps1 -BuildHtmlServersReport<\/strong><\/pre><ul class=\"wp-block-list\"><li>You may also run the script for a specific server by using -Server parameter.<\/li><\/ul><pre class=\"wp-block-preformatted\"><strong>.\\HealthChecker.ps1 -Server Exch01 -BuildHtmlServersReport<\/strong><\/pre><p>If the output displays an error or the script does not run, execute the following command in EMS and run the HealthChecker.ps1 script.<\/p><pre class=\"wp-block-preformatted\"><strong>Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass<\/strong><\/pre><p>This will generate an HTML file. Open this HTML file in any web browser to check the server&rsquo;s health status, vulnerabilities, and issues.<\/p><p>Then fix the issues and patch the vulnerabilities by downloading and installing the updates released by Microsoft.<\/p><p>Refer to <a href=\"https:\/\/assistants.microsoft.com\/assistants\/#\/session\/6d1d44d2-8a06-4f42-be9f-ba6f99345470\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Exchange Deployment Assistant<\/a> to learn steps to update and patch your Exchange Server with the latest CUs and protect against malicious attacks.<\/p><h2 class=\"wp-block-heading\" id=\"final-thoughts\">Final Thoughts<\/h2><p>The Tortilla threat actor is exploiting ProxyShell vulnerabilities that were patched back in May 2021 by Microsoft. However, there are several thousand organizations that are still not patched and vulnerable to ProxyShell attacks. If your organization is one of those, installing the latest Exchange Server Cumulative and Security Updates is the best defense.<\/p><p>But if you are the unfortunate one whose server is already compromised or crashed after the malicious attack, build a new server and use the backup to restore mailboxes on the new server. You can also use Exchange recovery software, such as <a href=\"https:\/\/www.stellarinfo.com\/edb-exchange-server-recovery.htm\" target=\"_blank\" rel=\"noreferrer noopener\">Stellar Repair for Exchange<\/a>, if backups aren&rsquo;t available, obsolete, or do not work. The software can help you quickly recover mailboxes from the compromised Exchange Server database and restore them to a new Exchange Server or Office 365 tenant in a few clicks.<\/p><p>Never use the compromised server even if it is fixed or working. You can use the EOMT tool by Microsoft to detect if your server is compromised.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tortilla, a new threat actor, is targeting organizations with unpatched Exchange Servers&hellip; <a class=\"more-link\" href=\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/\">Continue reading <span class=\"screen-reader-text\">&#8216;Tortilla&#8217; Attacking Microsoft Exchange Servers with Babuk Ransomware<\/span><\/a><\/p>\n","protected":false},"author":32,"featured_media":89741,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5298],"tags":[2312,2313],"class_list":["post-89737","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-babuk-ransomware","tag-babuk-ransomware-targeting-exchange-servers","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&#039;Tortilla&#039; Attacking Microsoft Exchange Servers with Babuk Ransomware<\/title>\n<meta name=\"description\" content=\"Explore the Babuk ransomware in detail and mentioned the steps to protect your vulnerable Exchange Server from such malicious attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&#039;Tortilla&#039; Attacking Microsoft Exchange Servers with Babuk Ransomware\" \/>\n<meta property=\"og:description\" content=\"Explore the Babuk ransomware in detail and mentioned the steps to protect your vulnerable Exchange Server from such malicious attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/raavisingh\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-10T10:36:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-20T06:51:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/Tortilla-Attacking-Microsoft-Exchange-Server-with-Babuk-Ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ravi Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/ravi51ngh\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ravi Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/\"},\"author\":{\"name\":\"Ravi Singh\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\"},\"headline\":\"&#8216;Tortilla&#8217; Attacking Microsoft Exchange Servers with Babuk Ransomware\",\"datePublished\":\"2021-11-10T10:36:14+00:00\",\"dateModified\":\"2023-07-20T06:51:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/\"},\"wordCount\":896,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/Tortilla-Attacking-Microsoft-Exchange-Server-with-Babuk-Ransomware.jpg\",\"keywords\":[\"babuk ransomware\",\"babuk ransomware targeting exchange servers\"],\"articleSection\":[\"Ransomware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/\",\"name\":\"'Tortilla' Attacking Microsoft Exchange Servers with Babuk Ransomware\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/Tortilla-Attacking-Microsoft-Exchange-Server-with-Babuk-Ransomware.jpg\",\"datePublished\":\"2021-11-10T10:36:14+00:00\",\"dateModified\":\"2023-07-20T06:51:03+00:00\",\"author\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\"},\"description\":\"Explore the Babuk ransomware in detail and mentioned the steps to protect your vulnerable Exchange Server from such malicious attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#primaryimage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/Tortilla-Attacking-Microsoft-Exchange-Server-with-Babuk-Ransomware.jpg\",\"contentUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/Tortilla-Attacking-Microsoft-Exchange-Server-with-Babuk-Ransomware.jpg\",\"width\":1000,\"height\":600,\"caption\":\"Tortilla Attacking Microsoft Exchange Servers with Babuk Ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stellarinfo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8216;Tortilla&#8217; Attacking Microsoft Exchange Servers with Babuk Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/\",\"name\":\"Stellar Data Recovery Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\",\"name\":\"Ravi Singh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g\",\"caption\":\"Ravi Singh\"},\"description\":\"Ravi Singh is a Senior Writer at Stellar\u00ae. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 7 years of experience in technical writing. He writes about Microsoft Exchange, Microsoft 365, Email Migration, Linux, Windows, Mac, DIY Tech, and Smart Home. Ravi spends most of his weekends working with IoT (DIY Smart Home) devices and playing Overwatch. He is also a solo traveler who loves hiking and exploring new trails.\",\"sameAs\":[\"https:\/\/stellarinfo.com\/blog\",\"https:\/\/facebook.com\/raavisingh\",\"https:\/\/instagram.com\/ravi.s1ngh\",\"https:\/\/linkedin.com\/in\/ravi-singh-5a65356a\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/ravi51ngh\",\"https:\/\/youtube.com\/ravisingh9\"],\"url\":\"https:\/\/www.stellarinfo.com\/blog\/author\/ravi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"'Tortilla' Attacking Microsoft Exchange Servers with Babuk Ransomware","description":"Explore the Babuk ransomware in detail and mentioned the steps to protect your vulnerable Exchange Server from such malicious attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/","og_locale":"en_US","og_type":"article","og_title":"'Tortilla' Attacking Microsoft Exchange Servers with Babuk Ransomware","og_description":"Explore the Babuk ransomware in detail and mentioned the steps to protect your vulnerable Exchange Server from such malicious attacks.","og_url":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/","og_site_name":"Stellar Data Recovery Blog","article_author":"https:\/\/facebook.com\/raavisingh","article_published_time":"2021-11-10T10:36:14+00:00","article_modified_time":"2023-07-20T06:51:03+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/Tortilla-Attacking-Microsoft-Exchange-Server-with-Babuk-Ransomware.jpg","type":"image\/jpeg"}],"author":"Ravi Singh","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/ravi51ngh","twitter_misc":{"Written by":"Ravi Singh","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/"},"author":{"name":"Ravi Singh","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11"},"headline":"&#8216;Tortilla&#8217; Attacking Microsoft Exchange Servers with Babuk Ransomware","datePublished":"2021-11-10T10:36:14+00:00","dateModified":"2023-07-20T06:51:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/"},"wordCount":896,"commentCount":0,"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/Tortilla-Attacking-Microsoft-Exchange-Server-with-Babuk-Ransomware.jpg","keywords":["babuk ransomware","babuk ransomware targeting exchange servers"],"articleSection":["Ransomware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/","url":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/","name":"'Tortilla' Attacking Microsoft Exchange Servers with Babuk Ransomware","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/Tortilla-Attacking-Microsoft-Exchange-Server-with-Babuk-Ransomware.jpg","datePublished":"2021-11-10T10:36:14+00:00","dateModified":"2023-07-20T06:51:03+00:00","author":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11"},"description":"Explore the Babuk ransomware in detail and mentioned the steps to protect your vulnerable Exchange Server from such malicious attacks.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#primaryimage","url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/Tortilla-Attacking-Microsoft-Exchange-Server-with-Babuk-Ransomware.jpg","contentUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2021\/11\/Tortilla-Attacking-Microsoft-Exchange-Server-with-Babuk-Ransomware.jpg","width":1000,"height":600,"caption":"Tortilla Attacking Microsoft Exchange Servers with Babuk Ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"&#8216;Tortilla&#8217; Attacking Microsoft Exchange Servers with Babuk Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.com\/blog\/#website","url":"https:\/\/www.stellarinfo.com\/blog\/","name":"Stellar Data Recovery Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11","name":"Ravi Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g","caption":"Ravi Singh"},"description":"Ravi Singh is a Senior Writer at Stellar\u00ae. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 7 years of experience in technical writing. He writes about Microsoft Exchange, Microsoft 365, Email Migration, Linux, Windows, Mac, DIY Tech, and Smart Home. Ravi spends most of his weekends working with IoT (DIY Smart Home) devices and playing Overwatch. He is also a solo traveler who loves hiking and exploring new trails.","sameAs":["https:\/\/stellarinfo.com\/blog","https:\/\/facebook.com\/raavisingh","https:\/\/instagram.com\/ravi.s1ngh","https:\/\/linkedin.com\/in\/ravi-singh-5a65356a\/","https:\/\/x.com\/https:\/\/twitter.com\/ravi51ngh","https:\/\/youtube.com\/ravisingh9"],"url":"https:\/\/www.stellarinfo.com\/blog\/author\/ravi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/89737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/comments?post=89737"}],"version-history":[{"count":2,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/89737\/revisions"}],"predecessor-version":[{"id":89743,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/89737\/revisions\/89743"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media\/89741"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media?parent=89737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/categories?post=89737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/tags?post=89737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}