Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

Threat Update 32 - Lemon Duck Floats on Exchange ProxyLogon Vulnerability

Hear how the Lemon Duck cryptomining botnet targets Exchange servers vulnerable to ProxyLogon.
Kilian Englert
1 min read
Last updated October 21, 2021

What’s better than cryptocurrency? FREE cryptocurrency, right? Not if you’re one of the many victims of the Lemon Duck cryptomining botnet who is footing the bill for the “free” (to them) mining operations.

Not content to rest on their laurels, this ever-evolving cryptocurrency botnet started targeting Exchange servers vulnerable to ProxyLogon.

Join Kilian and Kyle Roth from the Varonis Incident Response Team as they discuss this new botnet functionality, and how Varonis helped detect, investigate, and respond to this attack in the field.

Articles referenced in this video:
Bleeping Computer: Microsoft Exchange exploits now used by cryptomining malware
Microsoft blog: Analyzing attacks taking advantage of the Exchange Server vulnerabilities

Not sure how to check if you are vulnerable to ProxyLogon? This video walks you through the use of some of the free vulnerability checker tools: https://youtu.be/WK_38f_rFpw​

👋To learn how else we can help, please visit us at: https://www.varonis.com/help/​

Varonis customers also get access to great educational content to help support them on their journey: https://www.varonis.com/how-to-videos/

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

women-in-tech:-the-anatomy-of-a-female-cybersecurity-leader
Women in Tech: The Anatomy of a Female Cybersecurity Leader
Learn more about the powerful women in tech as we look at a breakdown of today's female cybersecurity leaders! 
lessons-from-the-twitch-data-leak
Lessons from the Twitch Data Leak
What happened? Increasingly covered by the mainstream press throughout Wednesday, October 6, 2021, the impact of the recent Twitch leak will undoubtedly grow as bad actors take advantage of the...
automate-data-security-with-varonis-data-centric-insights-and-cortex-xsoar
Automate Data Security With Varonis Data-centric Insights and Cortex XSOAR
Discover how to leverage Varonis data risk insights with Cortex XSOAR to accelerate investigations.
threat-update-30-–-no-trust?-no-problem!-an-overview-of-zero-trust
Threat Update 30 – No trust? No problem! An Overview of Zero Trust
With the constant barrage of cyberattacks in the news, it would be natural to wonder if there’s a security model to help. Enter Zero Trust! This popular security model has...