Microsoft: Iranian hackers are exploiting ZeroLogon flaw
The vulnerability can give the hackers full control over a target’s domain controller, resulting in a complete takeover
Microsoft was the first to detect the breach, and its Threat Intelligence Center (MSTIC) says the attacks have been ongoing for at least two weeks.
"MSTIC has observed activity by the nation-state actor MERCURY using the CVE-2020-1472 exploit (ZeroLogon) in active campaigns over the last 2 weeks," Microsoft warned in a tweet. "We strongly recommend patching."
Common Vulnerability Scoring System rated the ZeroLogon bug, indexed as CVE-2020-1472, a 10 out of 10 severity score this year. The vulnerability affects the Netlogon Remote authentication protocol that Windows uses to verify a Windows Server running as a domain controller.
By exploiting this bug, a hacker can take over a target’s Windows domain to change passwords and execute potentially harmful commands. So far, the vulnerability has shown its impact on all systems running Windows Server 2008 R2 and later.
The ZeroLogon vulnerability patch will occur in a two-phase rollout, according to Microsoft. The first phase involves installing Microsoft’s August 2020 security update, which blocks Windows Active Directory Domain controllers from using unsecured remote procedure call (RPC) communication and logs authentication requests from non-Windows devices. The temporary patch will allow affected devices’ admins to fix or replace their devices.
Windows plans to run the second phase during the first quarter 2021 release. “The DCs will be placed in enforcement mode, which requires all Windows and non-Windows devices to use secure remote procedure call (RPC) with Netlogon secure channel or to explicitly allow the account by adding an exception for any non-compliant device," Microsoft said in its advisory.
Consumer choice and the payment experience
A software provider's guide to getting, growing, and keeping customersDownload now
Prevent fraud and phishing attacks with DMARC
How to use domain-based message authentication, reporting, and conformance for email securityDownload now
Business in the new economy landscape
How we coped with 2020 and looking ahead to a brighter 2021Download now
How to increase cyber resilience within your organisation
Cyber resilience for dummiesDownload now