IoC Extractor

This IoC extractor identifies Indicators of Compromise (IoCs) by matching patterns, without analyzing the context of the surrounding text. Manual Review and Validation of the extracted IoCs are essential before any action is used.

Guidance for investigating attacks using CVE-2023-23397 | Microsoft Security Blog

DATE : 2023-03-22T07:00:00
SOURCE : microsoft.com

CVE:
cve-2023-23397
cve-2021-40444
cve-2021-42292
cve-2021-42321
cve-2021-34473
cve-2020-17144
cve-2020-0688

Domain:
justice.gov
wojsko-polskie.pl
microsoft.github.io

Url:
https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russia
https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/
https://microsoft.github.io/CSS-Exchange/Security/CVE-2023-23397/
https://microsoft.github.io/CSS-Exchange/Diagnostics/ExchangeLogCollector/