Hackers Exploit 70+ Microsoft Exchange Servers to Deploy Keyloggers for Credential Theft

June 24, 2025
Vulnerability / Malware

Unidentified threat actors have been targeting publicly exposed Microsoft Exchange servers to inject malicious code into login pages for credential harvesting. A recent analysis by Positive Technologies revealed two types of JavaScript keyloggers on the Outlook login page: one that saves captured data to a locally accessible file and another that transmits it directly to an external server. The Russian cybersecurity firm reported that these attacks affected 65 victims across 26 countries and continue a campaign first noted in May 2024, which targeted organizations in Africa and the Middle East. Initial findings indicated at least 30 victims among government agencies, banks, IT firms, and educational institutions, with evidence of compromises dating back to 2021. The attack chains exploit known vulnerabilities in Microsoft systems.

Cybersecurity Alert: Hackers Compromise Over 70 Microsoft Exchange Servers to Capture Credentials

Date: June 24, 2025
In a concerning development for organizations reliant on Microsoft Exchange, unidentified threat actors have been targeting publicly accessible servers to deploy malicious code on login pages designed to capture user credentials. A recent analysis by Positive Technologies sheds light on this sophisticated attack, revealing multiple instances of keylogger scripts embedded in the Outlook login interface.

The analysis highlights two distinct types of JavaScript keyloggers. One variant is configured to save the harvested credentials to a local file that can be accessed via the internet, while the other transmits the captured data to an external server in real time. This dual approach underscores the attackers’ intent to harvest sensitive information efficiently.

Positive Technologies reports that the cyber assaults have impacted at least 65 organizations across 26 countries. Notably, this ongoing campaign extends previous efforts documented in May 2024, which primarily targeted entities in Africa and the Middle East. Initial findings indicated the compromise of over 30 victims—including governmental bodies, financial institutions, IT firms, and educational organizations—with traces of activity dating back as far as 2021.

The methodologies employed in these attacks exploit known vulnerabilities inherent in systems that have not been adequately patched. This aligns with tactics outlined in the MITRE ATT&CK framework, specifically targeting initial access through exploitation of public-facing applications. The attackers display a proficiency in maintaining persistence within compromised networks while engaging in privilege escalation techniques to extend their reach and access critical resources.

Considering the scale and sophistication of these attacks, organizations using Microsoft Exchange should reassess their security protocols and ensure that their systems are up to date. Failure to address these vulnerabilities not only puts credentials at risk but also exposes entire networks to further exploitation.

As the cybersecurity landscape evolves, this incident serves as a stark reminder of the persistent threats faced by businesses around the globe. Ensuring robust security measures and monitoring practices can mitigate the risks posed by such threat actors, safeguarding sensitive data from unauthorized access. Business owners are urged to stay informed and vigilant in their strategies against evolving cyber threats, utilizing resources like the MITRE ATT&CK framework to understand potential adversary tactics and bolster their defenses.

Source link