All You Need to Know: The Four Zero Days in Microsoft Exchange Servers

All You Need to Know: The Four Zero Days in Microsoft Exchange Servers

By, Adi Ikan, Head of Network Research and Protection

Lotem Finkelsteen, Threat Intelligence Group Manager  


Yaniv Balmas, Head of Cyber Research


Sagi Tzadik, Security Researcher


  • Check Point Software has seen hundreds of exploit attempts against organizations worldwide.

  • Over the past 24 hours the amount of exploit attempts have doubled every few hours.

  • The most targeted country was Turkey (19%), followed by the US (18%) and Italy (10%).

  • Of the targeted organizations 17% belong to the Government and Military sectors and 14% in manufacturing.

  • To date hackers have yet to carry out the full chain off attack successfully.

  • Since the recently disclosed vulnerabilities on Microsoft Exchange Servers, a full race has started amongst hackers and security professionals. Global experts are using massive preventative efforts to combat hackers who are working day-in and day-out to produce an exploit that can successfully leverage the remote code execution vulnerabilities in Microsoft Exchange.


    Check Point Research (CP) has outlined the disclosed vulnerabilities, the targeted organizations by country and industry, and provides recommendations to prevent the attacks which we believe are yet to come.


    Current attack attempts in numbers



    Check Point Research has seen that of the targeted organizations, 17% belong to the Government and Military sectors and 14% are in manufacturing.


    Looking at the attack from a geographical perspective, the most targeted country was Turkey (19%), followed by the US (18%) and Italy (10%).


    Behind-the-scenes of the Zero Days


    On March 3, 2021 Microsoft released an emergency patch for its Exchange Server product, the most popular mail server worldwide. All incoming and outgoing emails, calendar invitations and virtually anything accessed within Outlook goes through the E ..

    Support the originator by clicking the read the rest link below.