Microsoft: Iranian hackers are exploiting ZeroLogon flaw
The vulnerability can give the hackers full control over a target’s domain controller, resulting in a complete takeover
Microsoft was the first to detect the breach, and its Threat Intelligence Center (MSTIC) says the attacks have been ongoing for at least two weeks.
"MSTIC has observed activity by the nation-state actor MERCURY using the CVE-2020-1472 exploit (ZeroLogon) in active campaigns over the last 2 weeks," Microsoft warned in a tweet. "We strongly recommend patching."
Common Vulnerability Scoring System rated the ZeroLogon bug, indexed as CVE-2020-1472, a 10 out of 10 severity score this year. The vulnerability affects the Netlogon Remote authentication protocol that Windows uses to verify a Windows Server running as a domain controller.
By exploiting this bug, a hacker can take over a target’s Windows domain to change passwords and execute potentially harmful commands. So far, the vulnerability has shown its impact on all systems running Windows Server 2008 R2 and later.
The ZeroLogon vulnerability patch will occur in a two-phase rollout, according to Microsoft. The first phase involves installing Microsoft’s August 2020 security update, which blocks Windows Active Directory Domain controllers from using unsecured remote procedure call (RPC) communication and logs authentication requests from non-Windows devices. The temporary patch will allow affected devices’ admins to fix or replace their devices.
Windows plans to run the second phase during the first quarter 2021 release. “The DCs will be placed in enforcement mode, which requires all Windows and non-Windows devices to use secure remote procedure call (RPC) with Netlogon secure channel or to explicitly allow the account by adding an exception for any non-compliant device," Microsoft said in its advisory.
Four cyber security essentials that your board of directors wants to know
The insights to help you deliver what they needDownload now
Data: A resource much too valuable to leave unprotected
Protect your data to protect your companyDownload now
Improving cyber security for remote working
13 recommendations for security from any locationDownload now
Why CEOS should care about the move to SAP S/4HANA
And how they can accelerate business valueDownload now