ビュー:

製品の対応


Exchange Serverの脆弱性(CVE-2021-26855等)に対するトレンドマイクロ製品のソリューションは以下となります。

 
トレンドマイクロの対策検出名/ポリシー/ルール名
Deep Discovery Inspector Rule Rule 4527 :  CVE-2021-26855 - Exchange Server Side Request Forgery Exploit SB - HTTP (REQUEST)
 Rule 4532: CVE-2021-26855 - Exchange Server Side Request Forgery Exploit - HTTP (REQUEST) - Variant 2
Tippingpoint Filter Rule Rule 39101 :  HTTP: Microsoft Exchange Server Side Request Forgery Vulnerability
Deep Security Rule 1010854: Microsoft Exchange Server Remote Code Execution Vulnerability (CVE-2021-26855)
DPI(Deep Packet Inspection)

弊社で確認している、本脆弱性を利用した攻撃キャンペーンに対応したソリューションは以下となります。
 
トレンドマイクロの対策パターン番号リリース日検出名/ポリシー/ルール名
ウィルスパターン (VSAPI/Smart Scan)16.585.0010-Mar-21Trojan.ASP.SECCHECKER.A
16.583.009-Mar-21Backdoor.ASP.SECCHECHECKER.A
16.585.0010-Mar-21Backdoor.ASP.CHOPPER.ASPGIG
16.587.0011-Mar-21Backdoor.ASP.WEBSHELL.UWMANM
16.587.0011-Mar-21Trojan.PS1.BOXTER.A
スパイウェアパターン (SSAPI/Smart Scan)2.389.0010-Mar-21HackTool.PS1.PowerCat.A
Deep Security
DPI(Deep Packet Inspection)
Rule 1010855:  - Microsoft Exchange - HAFNIUM Targeted Vulnerabilities
Rule 1007170 - Identified Suspicious China Chopper Webshell Communication (ATT&CK T1100)
Tippingpoint Filter RuleThreatDV malware filtersRule :  39283 HTTP: Covenant Grunt Runtime Detection (Default Profile - Plaintext)
Rule :  39284 HTTP: Covenant Grunt Runtime Detection (Default profile - Base64 Encoded)
Rule :  39285 HTTP: Backdoor.Shell.Krypcoihilo.A Runtime Detection
Rule :  39295 HTTP: Whafnium Webshell Payload Detected
post-exploitation detection filtersRule :  26898: Tunneling: reGeorg SOCKS Proxy Checkin Traffic
Rule :  26899: Tunneling: reGeorg SOCKS Proxy Traffic Checkin Response
Rule :  26900: Tunneling: reGeorg SOCKS Proxy Sending Command Traffic
Rule :  34152: HTTP: China Chopper PHP Webshell Traffic Detected (My Script RunInBrowser Control Command)
Rule :  34153: HTTP: China Chopper PHP Webshell Traffic Detected (Control Commands)
Rule :  34154: HTTP: China Chopper ASP Webshell Traffic Detected (Control Commands)
Rule :  34257: HTTP: China Chopper ASPX Webshell Traffic Detected (Control Commands)
Rule :  35779: HTTP: China Chopper ASP/JSP Webshell Payload Detection
Rule :  36192: HTTP: China Chopper ASP Webshell Payload Only Detection


■SECURITY ALERT: Microsoft Exchange 0-Day Exploit Detection, Protection and Response
https://success.trendmicro.com/solution/000285882