The FBI yesterday removed malicious code from vulnerable Microsoft Exchange Servers running on-premises versions of MES software for enterprise-level e-mail service, the agency announced in a notice to private industry.
A court authorized the agency to issue a command to search for, copy and remove hundreds of malicious web shells, code that provided backdoor access to vulnerable versions of the software, to prevent adversaries from escalating unauthorized access to U.S. networks. The FBI and Department of Justice strongly encourage organizations to review the notice for previous guidance on how to patch any MES vulnerabilities or remove any additional malware the actors may have placed on victim networks.
“It’s very encouraging to see the FBI and the private sector joining forces to proactively disrupt cyber adversaries and aid known victims of cyber crime,” said John Riggi, AHA senior advisor for cybersecurity and risk. “As I stated in my testimony before the Senate Homeland Security Committee on Dec. 2, 2020, the best way to detect, deter and disrupt foreign cyber adversaries is by the private sector and government combining capabilities to actively defend the nation.”
For more on this and other cybersecurity and risk issues, hospital and health system leaders may contact Riggi at firstname.lastname@example.org.