What Is 2020 Microsoft Exchange Server hacks
Content on WhatAnswers is provided "as is" for informational purposes. While we strive for accuracy, we make no guarantees. Content is AI-assisted and should not be used as professional advice.
Last updated: April 15, 2026
Key Facts
- Over 250,000 Exchange Servers were compromised by March 2021
- The attacks were first discovered in early March 2021
- Hafnium, a China-linked hacking group, was identified as the primary actor
- Four zero-day vulnerabilities were exploited, including CVE-2021-26855
- Microsoft released emergency patches in March 2021 to address the flaws
Overview
The 2020 Microsoft Exchange Server hacks refer to a widespread cyberattack campaign discovered in March 2021, though exploitation began as early as January 2020. These attacks targeted on-premises Microsoft Exchange Server software used by businesses and government organizations globally.
Attributed to the China-based hacking group Hafnium, the campaign exploited multiple zero-day vulnerabilities to gain unauthorized access, install web shells, and steal sensitive data. The scale and sophistication of the breach prompted urgent responses from Microsoft, government agencies, and cybersecurity firms.
- Over 250,000 servers: By March 2021, more than 250,000 on-premises Exchange Servers worldwide were compromised, including systems belonging to local governments, schools, and small businesses.
- Zero-day exploits: Attackers used four zero-day vulnerabilities, including CVE-2021-26855, a server-side request forgery flaw allowing unauthorized access without credentials.
- Hafnium attribution: Microsoft and U.S. intelligence agencies linked the attacks to Hafnium, a state-sponsored group operating from China with a history of cyber espionage.
- Web shell deployment: Hackers installed malicious web shells like DreamBot and China Chopper to maintain persistent access and exfiltrate emails and user data.
- Delayed discovery: Despite exploitation starting in January 2020, the attacks were not publicly disclosed until March 2021, allowing months of undetected infiltration.
How It Works
The attack chain leveraged a sequence of vulnerabilities in Microsoft Exchange Server’s components, particularly the Unified Messaging service and Exchange Control Panel.
- CVE-2021-26855: A server-side request forgery (SSRF) vulnerability allowed attackers to impersonate Exchange servers and bypass authentication checks.
- CVE-2021-27065: This flaw enabled arbitrary file write operations, letting hackers place malicious code in critical server directories.
- Post-authentication exploitation: Once inside, attackers exploited CVE-2021-27076 to execute commands remotely and escalate privileges.
- Web shell installation: Malicious scripts were uploaded to the server, creating backdoors for long-term access and data theft.
- Chain of execution: The exploits were used in sequence, starting with SSRF, then file write, and finally remote code execution for full control.
- Automated scanning: Hackers used bots to scan the internet for vulnerable Exchange Servers, rapidly expanding the attack surface.
Comparison at a Glance
The following table compares the key vulnerabilities exploited in the 2020 Exchange hacks:
| Vulnerability | Type | CVSS Score | Exploited Since |
|---|---|---|---|
| CVE-2021-26855 | SSRF (Server-Side Request Forgery) | 9.8 (Critical) | January 2020 |
| CVE-2021-27065 | Arbitrary File Write | 8.8 (High) | February 2021 |
| CVE-2021-26857 | Privilege Escalation | 7.2 (High) | March 2021 |
| CVE-2021-26858 | Remote Code Execution | 8.8 (High) | March 2021 |
| CVE-2021-27076 | Post-authentication RCE | 8.8 (High) | March 2021 |
The vulnerabilities were part of a coordinated attack chain. While CVE-2021-26855 was the initial entry point, the others enabled persistence and lateral movement. Microsoft classified all five as zero-day exploits at the time of disclosure, emphasizing their severity.
Why It Matters
The 2020 Exchange hacks represent one of the most significant cybersecurity incidents affecting enterprise infrastructure, highlighting risks in widely used software.
- Global impact: Organizations in over 120 countries were affected, including U.S. city governments, healthcare providers, and defense contractors.
- Supply chain risks: The breach demonstrated how a single software flaw in a trusted product can cascade across thousands of networks.
- State-sponsored threat: The involvement of Hafnium underscored the growing role of nation-state actors in cyber espionage.
- Emergency patching: Microsoft issued out-of-band updates in March 2021, urging immediate deployment to prevent further compromise.
- Long-term remediation: Many organizations required weeks to clean infected servers and restore secure operations.
- Policy changes: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerabilities to its known exploited catalog, urging federal agencies to comply with mitigation steps.
This incident prompted a reevaluation of on-premises email server security and accelerated migration to cloud-based solutions like Microsoft 365, which offer more robust patching and monitoring.
More What Is in Daily Life
Also in Daily Life
More "What Is" Questions
Trending on WhatAnswers
Browse by Topic
Browse by Question Type
Sources
- WikipediaCC-BY-SA-4.0
Missing an answer?
Suggest a question and we'll generate an answer for it.