Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Proxy Exploit Chains Used To Attack Exchange Servers

February 8, 2023

The ProxyLogon, ProxyShell, ProxyNotShell, and OWASSRF exploit chains were used to attack Microsoft Exchange servers across a range of sectors including real estate, law firms, manufacturing, consulting, wholesale, and arts and entertainment. Exploitation of the flaws resulted in systems infected with web shells, ransomware, remote access tools, and backdoors. Multiple legitimate Windows binaries were used to carry out the attacks including PowerShell, Rundll32, Ping, and Net.