Numerous media sources are reporting newly discovered Exchange malware, called LightNeuron, believed to have been created by a Russian hacking organization known as Turla.
LightNeuron is a “backdoor” that allows attackers to read and modify any email passing through compromised Microsoft Exchange servers. The malware also allows attackers to create and send new emails, as well as to block emails so that intended recipients do not receive them. Researchers who discovered LightNeuron believe that this malware has been in use since 2014!
Cord3’s UNITY Email solution protects emails with encryption before they reach the Exchange server, so even a LightNeuron-compromised server cannot read emails protected by Cord3.
While LightNeuron is one specific attack vector, Cord3’s general approach prevents all sorts of attacks on email servers from accessing sensitive emails, including attacks using privileged administrator credentials.
Cord3’s solutions separate data security away from users, applications, and servers. It is this approach that mitigates traditional attack vectors, newly discovered attacks like LightNeuron, and even new attacks to come in the future. If Turla has determined techniques to install malware on Exchange servers, it is reasonable to believe others will follow in their footsteps and generate similar attacks.
Email is an entrenched business tool. Organizations cannot just turn off email. The best solution against LightNeuron and other backdoor attacks is to protect sensitive emails before they reach the Exchange server with software that is easy to deploy and easy to use – Cord3’s UNITY Email solution is exactly that solution!