{"id":12663,"date":"2021-03-16T19:45:00","date_gmt":"2021-03-16T23:45:00","guid":{"rendered":"https:\/\/192.168.1.20\/wordpress\/?p=12663"},"modified":"2023-12-01T04:30:42","modified_gmt":"2023-12-01T04:30:42","slug":"three-red-chinese-flags-that-microsoft-should-have-noticed","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/2021\/03\/16\/three-red-chinese-flags-that-microsoft-should-have-noticed\/","title":{"rendered":"Three Red (Chinese) Flags That Microsoft Should Have Noticed"},"content":{"rendered":"\n

Three Red (Chinese) Flags That Microsoft Should Have Noticed<\/h2>\n\n\n\n

The recent, so called \u201cHAFNIUM breach\u201d of Microsoft Exchange servers could have been avoided if only Microsoft had been better attuned to how sovereign hackers think, act and attack. Every indication is that this hack resulted from China, but it was only a matter of time that one of the world\u2019s dark corners would exploit these vulnerabilities. Compared to the financial and reputational damage to its clients and to Microsoft, these liabilities could have been reduced, maybe avoided altogether. Now Microsoft is scrambling (AGAIN) to contain the damage and explain how this will never happen again.  Compared to their potential liabilities (and financial damages) Microsoft and clients could have spent pennies on the dollar to remedy and protect. <\/p>\n\n\n\n

There were several red flags that a smart system could have detected to stop the data theft. First red flag, MS Exchange servers typically access only other mail servers and Microsoft servers for updates. But the hackers surmised that MEGA, a file-sharing site that is not a mail server, was also in the loop.  Sending mail to MEGA sites should not have been allowed from a Microsoft Exchange server.<\/p>\n\n\n\n

Second red flag, mail server protocols, typically SMTP, are not used by the MEGA site and therefore, data should not have been allowed to be transferred from Exchange servers to MEGA. Such communication should be blocked by a simple firewall rule.<\/p>\n\n\n\n

Third red flag, when sending mail data there is an expected distribution to different servers. For example, it would be unusual \u2013 and suspicious \u2013 if a large volume of data is sent to a single IP address, even over a number of days or longer periods of time. Inventive monitoring and control techniques would have detected, displayed and delayed massive data downloads.<\/p>\n\n\n\n

Microsoft was most likely aware of the zero-day exploits, security issues in their system. Had they shared these vulnerabilities and avoided the \u2018hope\u2019 strategy, Microsoft could have protected their client information by:<\/p>\n\n\n\n