- Disable User
- Posts
- Using Outlook? Update straight away! And some business tips for mature passwords.
Using Outlook? Update straight away! And some business tips for mature passwords.
Security weekly

Hi and welcome to another Security weekly. Where we laugh, we cry and share the latest and greatest in security and tech news.
In this week's edition:
đ§ Using Outlook? Update straight away!
đ Follow-up: passwords
â Disable User Explains: Zero-Day vulnerability
đ„ the quick and dirty
Reading time: 03:13

Using Outlook? Update straight away!
Ok, stop. Freeze.

Before you start panicking, hear me out.
Microsoft latest âPatch Tuesdayâ released 80 updates, including two zero-day vulnerabilities.
One of them is an exploit for everyoneâs favorite mail-app: Outlook.
While the exploit is significant and the impact very - and I mean very - scary, you the scope is a bit.. unclear.
So, whatâs so scary about this exploit then?
By altering an e-mail message, an unwanted intruder is able to steal your hashed credentials.
Okay, English?
Well. A hacker - in this case itâs our friends of Russian APT Fancy Bear - can alter an e-mail message into tricking your mail server to release your hashed credentials.
Mail servers often use NTLM - an authentication protocol.
Which is not unsafe by itself, but because it is old it has a lot of flaws, making it a target for hackers.
Ok, but itâs hashed, thatâs safe, right?
Technically, sure. But youâd be surprised how easy it is to crack a password - Iâll explain further below.
Itâs easy to find a database of hashes for common used passwords. Even on the ânormalâ internet.

Literally the first hit in Bing.
So get some hashes, plug-in some computer-calculating-power and voila.
Cracked.
What confused me at first was the Scope of Microsoftâs CVE.
It says âAll versions of Outlookâ. So youâd expect .. all versions of Outlook, right?
They forgot to mention itâs all versions of Outlooks.. connected to Exchange Server.
So not Outlook on web, Exchange Online, âŠ
Even after reading some articles I still couldnât make up whether online was really âsafeâ.

Thanks for being so clear, Microsoft.
Still, with this severity and impact, Iâd take no chances and update immediately.
There are some scenarioâs in which Hybrid and Cloud environments are still affected, so Iâd take no risk fix it straight away.
So without further ado, hereâs what to do; (look at me ma, Iâm rhyming)
Update Office to the latest build, check your build here - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397
Well. That was easy. THANK GOD. We can all sit down, and down a brewski.

Why the Mortal Kombat youâre wondering? I have no clue.
If youâre an IT admin and want to see if your on-premise environment was breached, Microsoft provided a script via GitHub.

What does a good password (policy) make?
My claim earlier about âhow easy it is to crack a passwordâ might be a bit misleading.
It isnât easy to crack a password.
At least not if you use a good, strong password. And not Summer2023.
Last weekâs âWeak Password Reportâ from SECOPS revealed âPasswordâ is still the number one used password.

Real original, yâall.
So even with me ranting every week about week passwords, and every other (less important) cyber security media on the freaking planet screaming âPLEASE USE DIFFERENT AND LONG PASSWORDSâ.
Even then, nothing changes.

So, here I am, once again, asking for your attention on this important subject.
But, youâre coming here to learn, right?
I made a promise Iâd make things understandable, and practical.
So here are Ya boyâs 5 tips for better password management (personal and business):
Use a password manager - anything but LastPass
At least 12 characters, upper/lower case, numbers and symbols - speaks for itself
Change âem once a year - no more, no less. Unless you suspect faul play. Then change immediately
Donât use words or phrases - dictionary attacks are often used, and make it way easier to crack your password
Donât re-use passwords - Never.


Zero-day vulnerability
A flaw in a piece of software that is unknown to the vendor responsible for the application.
Unaware of this exploit in their software, this is either reported by bug hunters (lucky) or used by hackers (unlucky).
Once the flaw is known, the vendor releases a security update to patch it accompanied by a CVE.
Forgotten what a CVE is? In a dark past I wrote an article about it:


The quick and dirty
Microsoft SmartScreen Zero-Day Exploited to Deliver Magniber Ransomware - the other Zero-Day delivered this week.
AI-Created YouTube Videos Spread Around Malware - well if it ainât those pesky AI robots again
Reddit is down in major outage blocking access to web, mobile apps - during this outage it was measured the internet contained 99% less nonsense.
meme of the week

Really curious if this worked.

