Buongiorno,

la questione è stata portata alla mia attenzione da un recente
intervento di Antonio [1] in lista, che ringrazio.

Executive summary: il 5 Marzo BSI ha emanato un comunicato stampa (e una
relazione PDF in DE) perché ha trovato via Shodan [2] che decine di
migliaia (17K secondo i ben informati) di server MS Excange non sono
ancora stati aggiornati con aggiornamenti di sicurezza critici.

Sarà mica una novità?

Sapete quante notizie o ricerche si possono confezionare grazie a Shodan
in merito a quanti dispositivi server, router e "IoT" connessi a
internet sono vulnerabili a qualche "attacco NON zero-day" (di cui è
disponibile la "patch")?

Beh se non lo sapevate, *sapetelo*:
https://duckduckgo.com/?q=shodan+discovered+vulnerable+devices&ia=web

«Critical vulnerabilities in Exchange servers»

https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfehlungen/Empfehlungen-nach-Angriffszielen/Server/Microsoft-Exchange_Schwachstelle/schwachstelle_exchange_server_node.html
--8<---------------cut here---------------start------------->8---

  According to the IT service provider Shodan, tens of thousands of
  Exchange servers in Germany were vulnerable to attack via the Internet
  and are very likely already infected with malware. This situation
  affects companies and organisations of all sizes.

  The BSI recommends installing the security updates provided by
  Microsoft without delay. Vulnerable Exchange systems should be checked
  for relevant anomalies as a matter of urgency due to the high risk of
  attack.

  You will find a BSI cyber security warning containing information and
  measures for dealing with these vulnerabilitie: [Microsoft Exchange
  Schwachstellen Detektion und Reaktion].

  The relevant information is continually updated on the BSI website.

[Microsoft Exchange Schwachstellen Detektion und Reaktion]
</SharedDocs/Downloads/DE/BSI/Cyber-Sicherheit/Vorfaelle/Exchange-Schwachstellen-2021/MSExchange_Schwachstelle_Detektion_Reaktion.pdf?__blob=publicationFile&v=6>

  Additional information:
  ───────────────────────

  [Press releases from the BSI - 5. März 2021]

  [Recording of the BSI-Livestream "Informationen und Hilfestellungen" -
  11. März 2021 on YouTube]

  [Further information and links, including external support services]


[Press releases from the BSI - 5. März 2021]
<file:DE/Service-Navi/Presse/Pressemitteilungen/Presse2021/210305_Exchange-Schwachstelle.html?nn=1010128>

[Recording of the BSI-Livestream "Informationen und Hilfestellungen" -
11. März 2021 on YouTube] <https://youtu.be/QcqRRc-VoB0>

[Further information and links, including external support services]
<file:DE/IT-Sicherheitsvorfall/Unternehmen/unternehmen_node.html>

--8<---------------cut here---------------end--------------->8---

Loving, 380°


[1] https://server-nexa.polito.it/pipermail/nexa/2024-April/052462.html

[2] https://www.shodan.io/
«Shodan is the world's first search engine for Internet-connected
devices. Discover how Internet intelligence can help you make better
decisions.»
see also: https://en.wikipedia.org/wiki/Shodan_(website)

-- 
380° (Giovanni Biscuolo public alter ego)

«Noi, incompetenti come siamo,
 non abbiamo alcun titolo per suggerire alcunché»

Disinformation flourishes because many people care deeply about injustice
but very few check the facts.  Ask me about <https://stallmansupport.org>.

Attachment: signature.asc
Description: PGP signature

_______________________________________________
nexa mailing list
nexa@server-nexa.polito.it
https://server-nexa.polito.it/cgi-bin/mailman/listinfo/nexa

Reply via email to