{"id":638,"date":"2025-03-05T16:20:49","date_gmt":"2025-03-05T16:20:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/?p=638"},"modified":"2025-03-05T16:20:52","modified_gmt":"2025-03-05T16:20:52","slug":"research-paper-cyse280","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/05\/research-paper-cyse280\/","title":{"rendered":"Research Paper- CYSE280"},"content":{"rendered":"\n<p>Abstract: This paper will be discussing the 2021 Microsoft Exchange Server breach<\/p>\n\n\n\n<p>Introduction<\/p>\n\n\n\n<p>I chose to write about the 2021 Microsoft Exchange Server which impacted both the<\/p>\n\n\n\n<p>government and financial sector which interested me because of the methods that hacker group<\/p>\n\n\n\n<p>used in order to infiltrate the exchange servers and the impacts of the breach on the financial and<\/p>\n\n\n\n<p>government sector. Microsoft exchange servers is used for securing emails and protecting<\/p>\n\n\n\n<p>sensitive data from hackers. I also chose to write this paper on the data breach of Microsoft<\/p>\n\n\n\n<p>exchange server because I wanted to detail the types of attacks used in the attack such as zero-<\/p>\n\n\n\n<p>day vulnerabilities and ransomware. I also wanted to talk about damages and the data leaked by<\/p>\n\n\n\n<p>the hackers after the data breach.<\/p>\n\n\n\n<p>A data breach is described as \u201cAn incident in which sensitive data is accessed and stolen\u201d<\/p>\n\n\n\n<p>(Kim &amp; Soloman, 2016, p.503). The exploits used in this data was four zero-day vulnerabilities<\/p>\n\n\n\n<p>that the hacker used because there was a vulnerability in the Microsoft Exchange server that<\/p>\n\n\n\n<p>Microsoft wasn\u2019t aware of which made the hacker infiltrate the server and steal sensitive data.<\/p>\n\n\n\n<p>According to Osborne, (2021), one of the vulnerabilities that could have caused the attack was<\/p>\n\n\n\n<p>Proxy Logon which was used in an attack which led to the hackers being able to have access to<\/p>\n\n\n\n<p>the Microsoft Exchange servers \u201cthrough bugs or stolen credentials and they can create a web<\/p>\n\n\n\n<p>shell to hijack the system and execute commands remotely.\u201d Another method that hackers used<\/p>\n\n\n\n<p>to infiltrate the Microsoft Exchange Servers was a ransomware called Dear Cry which according<\/p>\n\n\n\n<p>to (Weston, 2021) was the result of \u201cunpatched software the hackers managed to compromise<\/p>\n\n\n\n<p>on-premises Exchange servers which also encrypted user data\u201d The hackers was doing this while<\/p>\n\n\n\n<p>they were also attacking Microsoft exchange servers using four zero-day vulnerabilities<\/p>\n\n\n\n<p>Microsoft responded to the breach by releasing patches which according to (Carlson,<\/p>\n\n\n\n<p>2021) \u201caddressed the exchange server versions 2010,2013,2016, and 2019 which included the<\/p>\n\n\n\n<p>software vulnerabilities CVE-2021-26855, CVE-2021-26857, CVE-2021-2658, and CVE-2021-<\/p>\n\n\n\n<p>27065 which together comprised the Proxy Logon that caused the data breach of Microsoft<\/p>\n\n\n\n<p>Exchange Servers.\u201d The group responsible for the data breach is Hanfum which is based out of<\/p>\n\n\n\n<p>China and is known to attack U.S based companies like Microsoft and they managed to get into<\/p>\n\n\n\n<p>over 400,000 Microsoft exchange servers accounts and leaked the users\u2019 sensitive information<\/p>\n\n\n\n<p>like email addresses, usernames, and passwords.<\/p>\n\n\n\n<p>Conclusion<\/p>\n\n\n\n<p>The lesson that can be learned from this data breach is to make sure that companies are<\/p>\n\n\n\n<p>aware of vulnerabilities of their systems to avoid a data breach like what happened to Microsoft.<\/p>\n\n\n\n<p>I would also recommend that companies educate their employees on certain methods that I have<\/p>\n\n\n\n<p>mentioned in the paper like zero-day vulnerabilities, and ransomware so they can know what to<\/p>\n\n\n\n<p>avoid in the event of a data breach. I would also recommend companies to have data backup to<\/p>\n\n\n\n<p>prevent the encryption of data due to ransomware.<\/p>\n\n\n\n<p>Resources<\/p>\n\n\n\n<p>Osborne, C. (2021, April 19). <em>Everything you need to know about the microsoft exchange server hack<\/em>. ZDNET. https:\/\/www.zdnet.com\/article\/everything-you-need-to-know-about-microsoft-exchange-server-hack\/<\/p>\n\n\n\n<p>Kim, D., &amp; Solomon, M. (2023). <em>Fundamentals of Information Systems Security <\/em>(3rd ed.). Jones &amp; Bartlett Learning.<\/p>\n\n\n\n<p>Carlson, B. (2021, May 6). <em>The microsoft exchange server hack: A timeline<\/em>. CSO Online. https:\/\/www.csoonline.com\/article\/570653\/the-microsoft-exchange-server-hack-a-timeline.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstract: This paper will be discussing the 2021 Microsoft Exchange Server breach Introduction I chose to write about the 2021 Microsoft Exchange Server which impacted both the government and financial sector which interested me because of the methods that hacker group used in order to infiltrate the exchange servers and the impacts of the breach &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/05\/research-paper-cyse280\/\">Continue reading<\/a><\/p>\n","protected":false},"author":25235,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/638"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/users\/25235"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/comments?post=638"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/638\/revisions"}],"predecessor-version":[{"id":639,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/638\/revisions\/639"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/media?parent=638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/categories?post=638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/tags?post=638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}