IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Microsoft: Iranian hackers are exploiting ZeroLogon flaw

The vulnerability can give the hackers full control over a target’s domain controller, resulting in a complete takeover

The MuddyWater cyber-espionage group, which has suspected ties to the Iranian government, is taking advantage of a critical Windows server flaw: the ZeroLogon vulnerability

Microsoft was the first to detect the breach, and its Threat Intelligence Center (MSTIC) says the attacks have been ongoing for at least two weeks.

"MSTIC has observed activity by the nation-state actor MERCURY using the CVE-2020-1472 exploit (ZeroLogon) in active campaigns over the last 2 weeks," Microsoft warned in a tweet. "We strongly recommend patching."

Common Vulnerability Scoring System rated the ZeroLogon bug, indexed as CVE-2020-1472, a 10 out of 10 severity score this year. The vulnerability affects the Netlogon Remote authentication protocol that Windows uses to verify a Windows Server running as a domain controller.

By exploiting this bug, a hacker can take over a target’s Windows domain to change passwords and execute potentially harmful commands. So far, the vulnerability has shown its impact on all systems running Windows Server 2008 R2 and later. 

The ZeroLogon vulnerability patch will occur in a two-phase rollout, according to Microsoft. The first phase involves installing Microsoft’s August 2020 security update, which blocks Windows Active Directory Domain controllers from using unsecured remote procedure call (RPC) communication and logs authentication requests from non-Windows devices. The temporary patch will allow affected devices’ admins to fix or replace their devices.

Windows plans to run the second phase during the first quarter 2021 release. “The DCs will be placed in enforcement mode, which requires all Windows and non-Windows devices to use secure remote procedure call (RPC) with Netlogon secure channel or to explicitly allow the account by adding an exception for any non-compliant device," Microsoft said in its advisory. 

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022
Best free malware removal tools 2022
Security

Best free malware removal tools 2022

22 Jun 2022
A guide to cyber security certification and training
Careers & training

A guide to cyber security certification and training

16 Jun 2022
What is shoulder surfing?
social engineering

What is shoulder surfing?

10 Jun 2022

Most Popular

Salaries for the least popular programming languages surge as much as 44%
Development

Salaries for the least popular programming languages surge as much as 44%

23 Jun 2022
Attracting and retaining talent through training
Sponsored

Attracting and retaining talent through training

13 Jun 2022
The top programming languages you need to learn for 2022
Careers & training

The top programming languages you need to learn for 2022

23 Jun 2022