• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » News » Iranian Hackers Exploiting Microsoft Security Bug

Iranian Hackers Exploiting Microsoft Security Bug

2020-10-08 by Michelle Dvorak

Microsoft ZeroLogon Vulnerability

ZeroLogon Vulnerability – Microsoft Says Some Hackers are Pushing Fake Updates

Microsoft says that a state-sponsored hacking group has been found exploiting a critical vulnerability (CVE-2020-1472) over the last two weeks. The attackers are connected to Iran and known as Mercury. The ZeroLogon vulnerability allows attackers to breach unpatched Microsoft Active Directory domain controllers and obtain domain administrator access.

Exploiting this flaw leads to escalated admin privileges on compromised devices. Nation-state hackers Mercury have been attempting to exploit ZeroLogon recently. In addition, other threat actors are using fake software updates to leverage the security flaw Microsoft Security Intelligence said from their Twitter account.

The exploit is tracked in the  Common Vulnerabilities and Exposures as CVE-2020-1472 and known as ZeroLogon.  



“An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network,” said Microsoft when they wrote about ZeroLogon back in August and September.

Patches Not Fully Rolled Out Yet

Microsoft is addressing this security flaw with the two-phase rollout of an update. The first Windows update was released on 11 August 2020. The second phase will not be released until the first quarter of 2021.

Unpatched Software Leads to Cyberattacks

In 2017, a massive WannaCry malware attack struck computers in 74 countries. The ransomware attack compromised systems at major organizations such as Britain’s National Health System (NHS), FedEx, Portugal Telecom, and Megafon. The attackers demanded £230 per computer payable in Bitcoin to unencrypt affected systems.


Always Be Ready with 5.11 Tactical. Gear You Can Rely On! Shop Essentials Now!

(ad)


Microsoft had released a Windows security update months earlier which would have prevented the ransomware attacks on over 300,000 computers. The cyber attack was later blamed on North Korea.

CISA Releases Validation Script

In September the Department of Homeland security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory about the ZerrLogon security flaw. CISA recommended that applying patches can prevent exploitation of CVE-2020-1472.

CISA also released a patch validation script so system administrators can make check that their Microsoft domain controllers are updated and protected against this security flaw.

“ZeroLogon is a powerful vulnerability for attackers to leverage, but in a normal attack scenario it will require an initial entry vector inside an organization to facilitate exploitation against domain controllers,” says Microsoft.

Filed Under: News Tagged With: Microsoft

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version