Attention: We have transitioned to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access. While the app may appear unverified, you can confirm its legitimacy by verifying the App ID provided.
1 entries found.
Trojan:Win32/IISExchgSpawnCMD.A
This threat is being used to attack versions of Microsoft Exchange Server on-premises. In the attacks observed, the threat actor used this vulnerability to access Exchange servers on-premises which enabled access to email accounts, and allowed installation of additional malware to facilitate long-term access to target environments.
Microsoft Defender Antivirus automatically removes threats as they are detected.
See the following blogs for details:
Alert level:
severe