Download PDF
Exiger > Case Studies > Mitigating Vendor Cyber Risk: A Case Study on Microsoft Exchange Server Zero Day Vulnerability
Exiger Logo

Mitigating Vendor Cyber Risk: A Case Study on Microsoft Exchange Server Zero Day Vulnerability

Technology Category
  • Analytics & Modeling - Real Time Analytics
  • Infrastructure as a Service (IaaS) - Cloud Computing
Applicable Functions
  • Logistics & Transportation
Use Cases
  • Cybersecurity
  • Real-Time Location System (RTLS)
Services
  • Cybersecurity Services
The Challenge
In late September 2022, the IT Security community and Microsoft confirmed the investigation of a significant set of vulnerabilities, including two zero days, affecting Microsoft Exchange Server (2013, 2016, and 2019). These zero-day exploits are serious as they are computer-software vulnerabilities previously unknown to those who should be interested in its mitigation, like the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit remotely nearly any programs, data, additional computers, or a network operating on the impacted system(s). The cybersecurity of supply chains has become a key risk area, with vulnerabilities like those seen with Microsoft Exchange Server and recent breaches such as SolarWinds and Accellion demonstrating how software can become a Trojan horse, turning protective products into ecosystem-wide threats. Over the last three years, Exiger’s clients have seen over 30 severe vulnerabilities targeted by hackers, often linked with powerful nation-state actors.
About The Customer
The customers in this case study are clients of Exiger, a global authority on regulatory compliance. These clients span various industries and rely on Exiger’s expertise and tools to manage and mitigate cybersecurity risks within their ecosystems. They are particularly concerned with vulnerabilities that could be exploited by hackers, including those linked to powerful nation-state actors. In 2021, these clients faced threats from two cyber espionage groups believed to be affiliated with the Chinese government, which created over 16 different malware families to target Pulse Secure VPN.
The Solution
In response to one of the worst cyber breaches in the last decade, Exiger’s clients leveraged the company's live, real-time cyber exploration tools to identify vendors in their ecosystems that were potentially responsive to the recently identified Microsoft Exchange Server zero day. Utilizing the Supply Chain Explorer Cyber module, Exiger clients were able to instantaneously identify and assess the criticality of the threat in their environment. The DDIQ Cyber Analysis tool created a real-time view of the threat and the vulnerabilities to clients, allowing for risk-based mitigation and stopping the threat where it mattered most.
Operational Impact
  • The use of Exiger’s live, real-time cyber exploration tools and the Supply Chain Explorer Cyber module enabled clients to effectively respond to the Microsoft Exchange Server zero day vulnerability. By providing a real-time view of the threat and the vulnerabilities, clients were able to implement risk-based mitigation strategies and stop the threat where it mattered most. This proactive approach to cybersecurity risk management helped protect clients' ecosystems from potential breaches and ensured the continuity of their operations.
Quantitative Benefit
  • Exiger’s tools allowed clients to instantaneously identify and assess the criticality of the threat in their environment.
  • The DDIQ Cyber Analysis tool provided a real-time view of the threat and the vulnerabilities to clients.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.