NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
June 24, 2019

Exim server vulnerabilities

Justin Fimlaid Justin Fimlaid

What is an Exim server?

An Exim server is a mail transfer agent used on Linux like operating systems. Exim is a free software and used by as much as 57% of the Internet email servers. Over the past couple weeks it has been noted that a heavy amount of Exim servers are under attack from two separate hacker groups.

What's the Vulnerability?

In typical fashion anytime a new vulnerability is released there is always a person or group that tries to exploit that vulnerability in the wild. The vulnerability and exploit CVE –2019– 10149 was a security flaw publicly disclosed on June 5. The exploit is a remote command execution exploit that allows the improper validation of recipient address in the deliver_message() function.

What's the Attack?

It is estimated that there are between 500,000 in 5.4 million Exim servers currently installed across the Internet. The attacks seen to date take over unpatched systems via a worm.  The compromised host will then scan the Internet for other servers and attempts to infect them as well. Infected servers will then be configured as cryptocurrency miners.

Some organizations have also report that these attacks create a back door into Exim servers by downloading a shell script to adds and SSH key to the root account.

How do I identify the signature?

According to many organizations via Twitter the first wave of attacks began on June 9. According to those reporting me exploit their are two command and control servers one of which is known, the address is http://173[.]212.214.137/s

The second type of attack is a little harder to identify. But basically goes something like this:

  1. The attackers send an email with "localpart" crafted to exploit the Exim vulnerability using the RCPT_to field.
  2. Exim servers execute the "localpart" in their own user context when received. The part of the Envelope-From will download the nefarious shell script and execute it.
  3. Since most Exim servers run as root, any nefarious script is also run as root then it’s Thanks for shopping for fresh pwnage.

Security recommendations

  • Patch every EXIM installation you have in your organization, at this time the current version is 4.92.
  • Look for any unfamiliar cronjobs in your crontab and remove them. Restore legitimate cron jobs from existing backups.
  • Delete the authorized key used for SSH backdoor access.
  • Kill any cryptominer process and delete the application.
  • Check your firewall and access logs for the following hostnames:
  1. https://an7kmd2wp4xo7hpr.tor2web.su
  2. https://an7kmd2wp4xo7hpr.tor2web.io
  3. https://an7kmd2wp4xo7hpr.onion.sh
  • Re-image any compromised servers.
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

3 min read
The Top Five Critical Vulnerabilities We Uncover in Pen Tests (And What They Mean for Your Security)
Read More
4 min read
Application Security Testing Tutorial via Rooting Hackademics RTB1 Read More
3 min read
Web app vulnerability basics: Cross-site request forgery Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.