Microsoft now actively publishes backdoors found for the Exchange server breach, see the security blog here You can download a csv file with the known filepaths, which are very easy first step to verify here Below is a very quick first response program to use that file, and scan if a known backdoor is present […]