Microsoft: Iranian hackers are exploiting ZeroLogon flaw
The vulnerability can give the hackers full control over a target’s domain controller, resulting in a complete takeover
Microsoft was the first to detect the breach, and its Threat Intelligence Center (MSTIC) says the attacks have been ongoing for at least two weeks.
"MSTIC has observed activity by the nation-state actor MERCURY using the CVE-2020-1472 exploit (ZeroLogon) in active campaigns over the last 2 weeks," Microsoft warned in a tweet. "We strongly recommend patching."
Common Vulnerability Scoring System rated the ZeroLogon bug, indexed as CVE-2020-1472, a 10 out of 10 severity score this year. The vulnerability affects the Netlogon Remote authentication protocol that Windows uses to verify a Windows Server running as a domain controller.
By exploiting this bug, a hacker can take over a target’s Windows domain to change passwords and execute potentially harmful commands. So far, the vulnerability has shown its impact on all systems running Windows Server 2008 R2 and later.
The ZeroLogon vulnerability patch will occur in a two-phase rollout, according to Microsoft. The first phase involves installing Microsoft’s August 2020 security update, which blocks Windows Active Directory Domain controllers from using unsecured remote procedure call (RPC) communication and logs authentication requests from non-Windows devices. The temporary patch will allow affected devices’ admins to fix or replace their devices.
Windows plans to run the second phase during the first quarter 2021 release. “The DCs will be placed in enforcement mode, which requires all Windows and non-Windows devices to use secure remote procedure call (RPC) with Netlogon secure channel or to explicitly allow the account by adding an exception for any non-compliant device," Microsoft said in its advisory.
B2B under quarantine
Key B2C e-commerce features B2B need to adopt to surviveDownload now
The top three IT pains of the new reality and how to solve them
Driving more resiliency with unified operations and service managementDownload now
The five essentials from your endpoint security partner
Empower your MSP business to operate efficientlyDownload now
How fashion retailers are redesigning their digital future
Fashion retail guideDownload now