Aug 27, 2021
Oct 31, 2025
Black Kite
Microsoft Exchange Server’s large market share makes it a popular target for constantly evolving threat actors and ransomware gangs. LockFile is one of the most recent threat actors, or ransomware families, to take advantage of new Microsoft Exchange Server vulnerabilities.
August 25th Advisory
Microsoft issued an advisory on the aforementioned Exchange Server vulnerabilities stating that if customers installed the May 2021 security updates or the July 2021 security updates on the servers, they are protected from these vulnerabilities. According to the Microsoft Exchange team, customers with any of the below security issues are vulnerable:
The advisory states it is always critical to keep the Exchange servers updated with the latest available Cumulative Update (CU) and Security Update (SU to be protected against the recent threats.
LockFile ransomware attacks are focusing on organizations in financial services, manufacturing, legal, business services, engineering, travel, and tourism. Recent activities show that LockFile is taking advantage of its victims by leveraging the new Microsoft Exchange Server vulnerabilities ProxyShell and PetitPotam.
ProxyShell consists of three vulnerabilities chained together that result in unauthenticated remote code execution (RCE) on Microsoft Exchange servers. These vulnerabilities are being tracked as:
Microsoft fully patched these vulnerabilities in May 2021. However, once the details of the ProxyShell attack were disclosed at Black Hat this past August, honeypots observed hackers scanning the internet for these vulnerabilities.
The recent advisory issued by Cybersecurity Infrastructure & Security Agency (CISA) was flagged as “urgent” and for good reason. According to Shodan.io, there are over 88,000 devices worldwide open to the public with this vulnerability, with about 20,000 of them based in the U.S.

Once Microsoft Exchange Server is successfully breached via ProxyShell, threat actors like LockFile drop in web shells to upload and run other applications, like the PetitPotam payload. A relatively new vulnerability released by the French researcher Gilles Lionel a.k.a topotam, PetitPotam is a type of NTLM relay attack and is hitting organizations across manufacturing, financial services, engineering, legal, business services, and travel and tourism. PetitPotam, being tracked as CVE-2021-36942, appears to be copied from https://github.com/zcgonvh/EfsPotato.
Upon the initial analysis in the Black Kite platform, 12% of the companies scanned were exposed to the PetitPotam vulnerability, a surprisingly high amount. This result is likely due to the immediacy of the findings, as the majority of the companies were not yet aware of the issue, much less had time to mitigate the problem.
Black Kite researchers discovered the technology and finance sectors were the most vulnerable sectors, as seen in the following chart. Both of these industries are known for large quantities of digital assets exposed to the internet, therefore requiring more vulnerabilities to be managed. Nevertheless, cyber trends indicate hackers do not discriminate among sectors, rather they behave opportunistically.

Using PetitPotam, attackers take over the domain control to obtain elevated access in the victim’s network, forcing authentication to a remote NTLM relay. Once the attackers gain access to the domain controller, they have absolute ownership of the Windows domain and can execute any command they want.

Microsoft published an advisory here to mitigate the effects of the attack, including making use of Extended Protection for Authentication (EPA) and features such as SMB signing. Black Kite researchers recommend disabling NTLM altogether.
Given the number of possible attack victims due to the wide deployment of Microsoft Exchange Server, it’s critical to take proactive and pre-emptive action now to prevent ransomware attacks including:

Understanding the vulnerability exposure of your organization and supply chain vendors will help you take proactive action for the most effective ransomware prevention.