Sophos: Conti Ransomware Hacks Microsoft Exchange Servers

September 7, 2021

Conti Ransomware gang is in the midst of hacking into Microsoft Exchange servers and breaching corporate networks.

Sophos, a British security and hardware company, discovered the hacks after analyzing an attack in which the Conti Ransomware gang has encrypted a customer.

According to Sophos, threat actors compromise the system by exploiting the recently revealed Microsoft Exchange ProxyShell vulnerabilities, which were achieved after the threat actors initially dropped web shells used to execute commands, download software, and further compromise the server.

Once complete control of the server is achieved, Sophos noted what comes next: “Within 48 hours of gaining this initial access, the attackers had exfiltrated about 1 terabyte of data.”

During the intrusion, the Conti affiliates installed no less than seven backdoors in the network: two web shells, Cobalt Strike, and four commercial remote access tools.

The web shells were mainly used for initial access, with Cobalt Strike and Any Desk used as the primary tools for the rest of the attack.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn