article thumbnail

Microsoft: Attackers Exploiting ‘ZeroLogon’ Windows Flaw

Krebs on Security

DHS’s Cybersecurity and Infrastructure Agency (CISA) said in the directive that it expected imminent exploitation of the flaw — CVE-2020-1472 and dubbed “ZeroLogon” — because exploit code which can be used to take advantage of it was circulating online.

Antivirus 255
article thumbnail

Hackers are using Zerologon exploits in attacks in the wild

Security Affairs

Microsoft is actively tracking threat actor activity using exploits for the CVE-2020-1472 Netlogon EoP vulnerability, dubbed Zerologon. — Microsoft Security Intelligence (@MsftSecIntel) September 24, 2020. We strongly recommend customers to immediately apply security updates for CVE-2020-1472.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian Cybercrime group is exploiting Zerologon flaw, Microsoft warns

Security Affairs

We’re seeing more activity leveraging the CVE-2020-1472 exploit (ZeroLogon). — Microsoft Security Intelligence (@MsftSecIntel) October 6, 2020. — Microsoft Security Intelligence (@MsftSecIntel) October 6, 2020. states Microsoft. We strongly recommend patching.

article thumbnail

Iran-linked APT is exploiting the Zerologon flaw in attacks

Security Affairs

The Zerologon vulnerability, tracked as CVE-2020-1472 , is an elevation of privilege that resides in the Netlogon. The Netlogon service is an Authentication Mechanism used in the Windows Client Authentication Architecture which verifies logon requests, and it registers, authenticates, and locates Domain Controllers.

article thumbnail

Safe-T Has Partnered with Thales to Bring a New Remote Access Security Solution to the Table

Thales Cloud Protection & Licensing

Safe-T Has Partnered with Thales to Bring a New Remote Access Security Solution to the Table. The global pandemic of 2020 has changed the world around us in drastic and likely permanent ways. Implementing multi-factor authentication and high-quality security solutions can help companies mitigate these risks.

article thumbnail

Why access management needs to evolve beyond passwords

CyberSecurity Insiders

Indeed, Infosecurity Magazine shared an April 2020 survey that arrived at the following results: Nearly half (45%) of respondents said that they did not consider reusing their passwords to be a serious problem. Organizations can incorporate such news into their security awareness training programs to phase out passwords where they can.

Passwords 141
article thumbnail

European firm DSIRF behind the attacks with Subzero surveillance malware

Security Affairs

Researchers from threat intelligence firm RiskIQ, using passive DNS data related to Knotweed attacks, linked the C2 infrastructure used by the malware since February 2020 to DSIRF. Confirm that Microsoft Defender Antivirus is updated to security intelligence update 1.371.503.0 or later to detect the related indicators.