{"id":97373,"date":"2022-04-25T06:56:18","date_gmt":"2022-04-25T06:56:18","guid":{"rendered":"https:\/\/www.stellarinfo.com\/blog\/?p=97373"},"modified":"2023-07-20T06:57:49","modified_gmt":"2023-07-20T06:57:49","slug":"hive-ransomware-exchange-servers-proxyshell-attack","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/","title":{"rendered":"Hive Ransomware Affiliate Targeting Microsoft Exchange Servers"},"content":{"rendered":"<?xml encoding=\"utf-8\" ?><?xml encoding=\"utf-8\" ?><p>Microsoft Exchange Servers have now become a target of an affiliate of the Hive ransomware group. Varonis &mdash; a data security and analytics firm &mdash; recently shared details of a ransomware attack investigation carried out by their forensics team on one of their customers&rsquo; servers. The team found that multiple file servers and devices in the organization were compromised and encrypted by a threat group called <strong>Hive<\/strong>.<\/p><p><strong>Hive, <\/strong>first came to light in June 2021, is one of the most active threat groups targeting Exchange Servers with <a href=\"https:\/\/www.stellarinfo.com\/blog\/patch-proxyshell-vulnerabilities-on-microsoft-exchange-servers\/\">ProxyShell<\/a> (authentication bypass) vulnerabilities. <strong>ProxyShell<\/strong> is a set of three vulnerabilities (CVE-2021-31207, CVE-2021-34523, and CVE-2021-34473) when chained together, allow the threat actors to bypass authentication and execute malicious codes, install web shells, etc. The ProxyShell vulnerabilities have been exploited by various threat groups earlier to spread <a href=\"https:\/\/www.stellarinfo.com\/blog\/babuk-ransomware-targeting-exchange-servers\/\">Babuk<\/a>, <a href=\"https:\/\/www.stellarinfo.com\/blog\/blackbyte-ransomware-attacks-exchange-servers-with-proxyshell-flaws\/\">BlackByte<\/a>, <a href=\"https:\/\/www.stellarinfo.com\/blog\/cuba-ransomware-targeting-vulnerable-exchange-servers\/\">Cuba<\/a>, <a href=\"https:\/\/www.stellarinfo.com\/blog\/lockfile-ransomware-encrypting-microsoft-exchange-servers\/\">LockFile<\/a>, etc., ransomware on Exchange Servers.<\/p><p>Though these vulnerabilities were patched by Microsoft in April and May 2021, many Exchange Servers are still unpatched. According to a report by <a href=\"https:\/\/www.shodan.io\/search\/facet?query=http.title%3Aoutlook+exchange&amp;facet=vuln.verified\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Shodan<\/a>, more than 7000 verified Exchange Servers are still unpatched and vulnerable to ProxyShell attacks.<\/p><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"551\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/exchange-servers-vulnerable-to-ProxyShell-vulnerabilities-and-attacks-by-Hive-Ransomware-1024x551.png\" alt=\"exchange servers vulnerable to ProxyShell vulnerabilities and attacks by Hive Ransomware\" class=\"wp-image-97379 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/exchange-servers-vulnerable-to-ProxyShell-vulnerabilities-and-attacks-by-Hive-Ransomware-1024x551.png 1024w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/exchange-servers-vulnerable-to-ProxyShell-vulnerabilities-and-attacks-by-Hive-Ransomware-300x162.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/exchange-servers-vulnerable-to-ProxyShell-vulnerabilities-and-attacks-by-Hive-Ransomware-768x413.png 768w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/exchange-servers-vulnerable-to-ProxyShell-vulnerabilities-and-attacks-by-Hive-Ransomware.png 1133w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><h2 class=\"wp-block-heading\" id=\"how-are-hive-attacking-vulnerable-exchange-servers?\">How are Hive Attacking Vulnerable Exchange Servers?<\/h2><p>The ProxyShell vulnerabilities lie in the Microsoft Exchange Client Access Server (CAS), usually exposed to the internet. This makes it easier for the threat actors to identify or find Exchange Servers with ProxyShell vulnerabilities, exploit the vulnerabilities, and compromise the organization&rsquo;s network, servers, and devices.<\/p><p>The Hive ransomware group uses an affiliate-based ransomware variant (or Ransomware-as-a-service) to target vulnerable Exchange Servers and enables affiliates to utilize the compromised servers as they desire.<\/p><p>According to <a href=\"https:\/\/www.varonis.com\/blog\/hive-ransomware-analysis\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Varonis<\/a>, the Hive group uses the common ransomware tactics, techniques, and procedures (TTP) to exploit the Exchange Server vulnerabilities, compromise the server, and encrypt the business data for a ransom.<\/p><p>After encrypting or stealing the data, a plaintext ransom note is dropped on the victims&rsquo; system, threatening them to meet their conditions, or their data will be published on <strong>HiveLeaks<\/strong>&mdash; a tor site on the dark web. &nbsp;<\/p><h2 class=\"wp-block-heading\" id=\"how-to-protect-your-organization-from-hive-ransomware-attack?\">How to Protect your Organization from Hive Ransomware Attack?<\/h2><p>To protect your organization from Hive and other ransomware threat groups targeting ProxyShell vulnerabilities and other flaws in Exchange Server, update your servers with the latest Cumulative Update or Security Update.<\/p><p>There is no other way around to protect your servers from these attacks. So, in addition to installing updates, you should also take active measures to strengthen your server security.<\/p><p>Organizations running Exchange Server 2010 should immediately upgrade to Exchange 2016 or later to continue receiving Security Updates and patch vulnerabilities. &nbsp;<\/p><h2 class=\"wp-block-heading\" id=\"steps-to-protect-exchange-server-from-hive-(proxyshell-attack)\">Steps to Protect Exchange Server from Hive (ProxyShell Attack)<\/h2><p>You can follow the steps discussed below to identify the vulnerabilities and fix or patch them to safeguard your organization against ProxyShell and other malicious attacks.<\/p><h3 class=\"wp-block-heading\">Step 1: Check Exchange Server Health<\/h3><p>You can use Microsoft Exchange Server Health Checker Script (HealthChecker.ps1) to check your server&rsquo;s health and identify the issues and vulnerabilities you need to patch.<\/p><p>The steps are as follows:<\/p><ul class=\"wp-block-list\"><li>Download the <a href=\"https:\/\/github.com\/microsoft\/CSS-Exchange\/releases\/latest\/download\/HealthChecker.ps1\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">HealthChecker.ps1<\/a>. The script currently supports Exchange Server 2013, 2016, and 2019.<\/li><li>Open <strong>Exchange Management Shell (EMS)<\/strong> and use the &lsquo;<strong>cd<\/strong>&lsquo; command to navigate to the location where HealthChecker.ps1 script is located. For instance,<\/li><\/ul><pre class=\"wp-block-preformatted\">cd C:\\Users\\UserName\\Downloads\\<\/pre><ul class=\"wp-block-list\"><li>Then run the following command to execute the <strong>HealthChecker.ps1<\/strong> on the server.<\/li><\/ul><pre class=\"wp-block-preformatted\">.\\HealthChecker.ps1<\/pre><ul class=\"wp-block-list\"><li>You may also generate a detailed HTML report by executing the following command.<\/li><\/ul><pre class=\"wp-block-preformatted\">.\\HealthChecker.ps1 -BuildHtmlServersReport<\/pre><p>A detailed HTML report is created at the same location where HealthChecker.ps1 script is located. Double-click the HTML file to open it in a web browser window.<\/p><figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"440\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/exchange-server-health-checker-script-found-vulnerabilities-hive-ransomware-1024x440.png\" alt=\"exchange server health checker script found vulnerabilities hive ransomware\" class=\"wp-image-97380 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/exchange-server-health-checker-script-found-vulnerabilities-hive-ransomware-1024x440.png 1024w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/exchange-server-health-checker-script-found-vulnerabilities-hive-ransomware-300x129.png 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/exchange-server-health-checker-script-found-vulnerabilities-hive-ransomware-768x330.png 768w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/exchange-server-health-checker-script-found-vulnerabilities-hive-ransomware.png 1181w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><p>If you receive a warning or error message while running the script, bypassing the script execution policy using the following command in EMS.<\/p><pre class=\"wp-block-preformatted\">Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass<\/pre><h3 class=\"wp-block-heading\">Step 2: Download and Install Exchange Server Updates<\/h3><p>Check the <strong>Security Vulnerabilities<\/strong> section and apply the required patches by installing the latest Cumulative Update, followed by Security Update available for your Exchange Server version. Refer to our detailed guide to&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/article\/install-exchange-cumulative-updates.php\" target=\"_blank\" rel=\"noreferrer noopener\">download and install Cumulative and Security updates on Exchange Server.<\/a><\/p><h2 class=\"wp-block-heading\" id=\"conclusion\">Conclusion<\/h2><p>The Hive ransomware gang is one of the most active groups currently targeting unpatched Exchange Servers &mdash; exploiting the ProxyShell vulnerabilities. Although Microsoft patched the vulnerabilities back in April and May 2021, thousands of servers are still vulnerable and exposed to the internet.<\/p><p>To safeguard your organization and data from malicious attacks and ransomware, install the latest Cumulative Update or Security Update available for your Exchange Server version as soon as possible.<\/p><p>However, if you become a victim of a malicious attack, set up a new server and restore the mailboxes from the backup. You can also use <a href=\"https:\/\/www.stellarinfo.com\/edb-exchange-server-recovery.htm\">Exchange recovery software<\/a>, such as&nbsp;Stellar Repair for Exchange, to recover mailboxes if the server has failed or databases on the compromised server become inaccessible or damaged. The tool can repair the Exchange database, extract mailboxes, and save them as PST. You may also export the recovered mailboxes directly to your newly set up Exchange Server. This helps avoid downtime and quickly resume your organization&rsquo;s normal operations and activities.<\/p><p>We recommend you follow our frequently updated detailed <a href=\"https:\/\/www.stellarinfo.com\/blog\/microsoft-exchange-remote-code-execution-vulnerability-flaws-and-fixes\/\">blog on the latest Exchange Server updates<\/a> on newer threats, vulnerabilities, and fixes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Exchange Servers have now become a target of an affiliate of&hellip; <a class=\"more-link\" href=\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/\">Continue reading <span class=\"screen-reader-text\">Hive Ransomware Affiliate Targeting Microsoft Exchange Servers<\/span><\/a><\/p>\n","protected":false},"author":32,"featured_media":97385,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5298],"tags":[],"class_list":["post-97373","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hive Ransomware Affiliate Targeting Microsoft Exchange Servers<\/title>\n<meta name=\"description\" content=\"Learn how Hive ransomware group is targeting the Exchange Servers and steps you need to take to protect your vulnerable Exchange Servers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hive Ransomware Affiliate Targeting Microsoft Exchange Servers\" \/>\n<meta property=\"og:description\" content=\"Learn how Hive ransomware group is targeting the Exchange Servers and steps you need to take to protect your vulnerable Exchange Servers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/raavisingh\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-25T06:56:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-20T06:57:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/Microsoft-Exchange-servers-hacked-to-deploy-Hive-ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ravi Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/ravi51ngh\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ravi Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/\"},\"author\":{\"name\":\"Ravi Singh\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\"},\"headline\":\"Hive Ransomware Affiliate Targeting Microsoft Exchange Servers\",\"datePublished\":\"2022-04-25T06:56:18+00:00\",\"dateModified\":\"2023-07-20T06:57:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/\"},\"wordCount\":846,\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/Microsoft-Exchange-servers-hacked-to-deploy-Hive-ransomware.jpg\",\"articleSection\":[\"Ransomware\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/\",\"name\":\"Hive Ransomware Affiliate Targeting Microsoft Exchange Servers\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/Microsoft-Exchange-servers-hacked-to-deploy-Hive-ransomware.jpg\",\"datePublished\":\"2022-04-25T06:56:18+00:00\",\"dateModified\":\"2023-07-20T06:57:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\"},\"description\":\"Learn how Hive ransomware group is targeting the Exchange Servers and steps you need to take to protect your vulnerable Exchange Servers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#primaryimage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/Microsoft-Exchange-servers-hacked-to-deploy-Hive-ransomware.jpg\",\"contentUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/Microsoft-Exchange-servers-hacked-to-deploy-Hive-ransomware.jpg\",\"width\":1000,\"height\":600,\"caption\":\"Hive Ransomware Affiliate Targeting Microsoft Exchange Servers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stellarinfo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hive Ransomware Affiliate Targeting Microsoft Exchange Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/\",\"name\":\"Stellar Data Recovery Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11\",\"name\":\"Ravi Singh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g\",\"caption\":\"Ravi Singh\"},\"description\":\"Ravi Singh is a Senior Writer at Stellar\u00ae. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 7 years of experience in technical writing. He writes about Microsoft Exchange, Microsoft 365, Email Migration, Linux, Windows, Mac, DIY Tech, and Smart Home. Ravi spends most of his weekends working with IoT (DIY Smart Home) devices and playing Overwatch. He is also a solo traveler who loves hiking and exploring new trails.\",\"sameAs\":[\"https:\/\/stellarinfo.com\/blog\",\"https:\/\/facebook.com\/raavisingh\",\"https:\/\/instagram.com\/ravi.s1ngh\",\"https:\/\/linkedin.com\/in\/ravi-singh-5a65356a\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/ravi51ngh\",\"https:\/\/youtube.com\/ravisingh9\"],\"url\":\"https:\/\/www.stellarinfo.com\/blog\/author\/ravi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hive Ransomware Affiliate Targeting Microsoft Exchange Servers","description":"Learn how Hive ransomware group is targeting the Exchange Servers and steps you need to take to protect your vulnerable Exchange Servers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/","og_locale":"en_US","og_type":"article","og_title":"Hive Ransomware Affiliate Targeting Microsoft Exchange Servers","og_description":"Learn how Hive ransomware group is targeting the Exchange Servers and steps you need to take to protect your vulnerable Exchange Servers.","og_url":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/","og_site_name":"Stellar Data Recovery Blog","article_author":"https:\/\/facebook.com\/raavisingh","article_published_time":"2022-04-25T06:56:18+00:00","article_modified_time":"2023-07-20T06:57:49+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/Microsoft-Exchange-servers-hacked-to-deploy-Hive-ransomware.jpg","type":"image\/jpeg"}],"author":"Ravi Singh","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/ravi51ngh","twitter_misc":{"Written by":"Ravi Singh","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/"},"author":{"name":"Ravi Singh","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11"},"headline":"Hive Ransomware Affiliate Targeting Microsoft Exchange Servers","datePublished":"2022-04-25T06:56:18+00:00","dateModified":"2023-07-20T06:57:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/"},"wordCount":846,"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/Microsoft-Exchange-servers-hacked-to-deploy-Hive-ransomware.jpg","articleSection":["Ransomware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/","url":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/","name":"Hive Ransomware Affiliate Targeting Microsoft Exchange Servers","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/Microsoft-Exchange-servers-hacked-to-deploy-Hive-ransomware.jpg","datePublished":"2022-04-25T06:56:18+00:00","dateModified":"2023-07-20T06:57:49+00:00","author":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11"},"description":"Learn how Hive ransomware group is targeting the Exchange Servers and steps you need to take to protect your vulnerable Exchange Servers.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#primaryimage","url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/Microsoft-Exchange-servers-hacked-to-deploy-Hive-ransomware.jpg","contentUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2022\/04\/Microsoft-Exchange-servers-hacked-to-deploy-Hive-ransomware.jpg","width":1000,"height":600,"caption":"Hive Ransomware Affiliate Targeting Microsoft Exchange Servers"},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.com\/blog\/hive-ransomware-exchange-servers-proxyshell-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hive Ransomware Affiliate Targeting Microsoft Exchange Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.com\/blog\/#website","url":"https:\/\/www.stellarinfo.com\/blog\/","name":"Stellar Data Recovery Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/7dea10d15c0307370e21d7da07d0cd11","name":"Ravi Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e95cad83fe279b559794f62193f34300d01db8f9f2ec45ce529b7ecde3796ba?s=96&d=mm&r=g","caption":"Ravi Singh"},"description":"Ravi Singh is a Senior Writer at Stellar\u00ae. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 7 years of experience in technical writing. He writes about Microsoft Exchange, Microsoft 365, Email Migration, Linux, Windows, Mac, DIY Tech, and Smart Home. Ravi spends most of his weekends working with IoT (DIY Smart Home) devices and playing Overwatch. He is also a solo traveler who loves hiking and exploring new trails.","sameAs":["https:\/\/stellarinfo.com\/blog","https:\/\/facebook.com\/raavisingh","https:\/\/instagram.com\/ravi.s1ngh","https:\/\/linkedin.com\/in\/ravi-singh-5a65356a\/","https:\/\/x.com\/https:\/\/twitter.com\/ravi51ngh","https:\/\/youtube.com\/ravisingh9"],"url":"https:\/\/www.stellarinfo.com\/blog\/author\/ravi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/97373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/comments?post=97373"}],"version-history":[{"count":14,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/97373\/revisions"}],"predecessor-version":[{"id":97393,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/97373\/revisions\/97393"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media\/97385"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media?parent=97373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/categories?post=97373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/tags?post=97373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}