March 16, 2023, 2:48 p.m. | /u/MartinZugec

cybersecurity www.reddit.com

There is a new critical CVE in Microsoft Outlook:

[https://nvd.nist.gov/vuln/detail/CVE-2023-23397](https://nvd.nist.gov/vuln/detail/CVE-2023-23397)

* Exploited to steal NTLM hashes
* Used to target European organizations
* Leveraged for almost a year by APT28 (Russia)
* Reported by CERT-UA (Ukraine)

This is actively exploited, patch immediately. Microsoft also provided a script that checks Exchange items for malicious messaging items: [https://github.com/microsoft/CSS-Exchange/blob/a4c096e8b6e6eddeba2f42910f165681ed64adf7/docs/Security/CVE-2023-23397.md](https://github.com/microsoft/CSS-Exchange/blob/a4c096e8b6e6eddeba2f42910f165681ed64adf7/docs/Security/CVE-2023-23397.md)

apt28 cert cert-ua critical cve cve-2023-23397 cybersecurity exploited hashes microsoft microsoft outlook ntlm ntlm hashes organizations outlook privilege russia severity steal target ukraine zero-day

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Program Associate, Cyber Risk

@ Kroll | Toronto, ONT, Canada

Cybersecurity Operations Engineer 2

@ Humana | Remote US

Vice President - Lead Security Engineer (SECS04)

@ JPMorgan Chase & Co. | Columbus, OH, United States

Security Specialist

@ BGIS | Markham, ON, Canada