comparemela.com

Latest Breaking News On - Dirk jan mollema - Page 2 : comparemela.com

PrintNightmare: Kicking users from Pre-Windows 2000 legacy group may thwart domain controller exploitation

Copy Another potential mitigation has emerged for the PrintNightmare zero-day vuln, which lets low-privileged users execute code as SYSTEM on Windows domain controllers: remove those people from a backwards-compatibility group. The zero-day hole came to light earlier this week after an infosec research firm mistakenly published proof-of-concept exploit code for a remote-code execution (RCE) vuln it had nicknamed PrintNightmare. Sangfor Technologies published the exploit for the vulnerability after wrongly believing Microsoft had patched it this month, having read the June Patch Tuesday notes for a remote-code execution vuln in Windows Print Spooler tracked as CVE-2021-1675. While the patch for CVE-2021-1675 also protects against PrintNightmare on most Windows devices, it didn’t do so for domain controllers, which caused some puzzlement among security researchers. Until today, when Yunhai Zhang of Tianji Lab discovered a potential cause:

CVE-2020-1472: Microsoft Finalizes Patch for Zerologon to Enable Enforcement Mode by Default

Message : Required fields Zerologon has quickly become valuable to nation-state threat actors and ransomware gangs, making it imperative for organizations to apply these patches immediately if they have not yet done so. Background On February 9, as part of its February 2021 Patch Tuesday release, Microsoft released an additional patch for Zerologon to enable a security setting by default to protect vulnerable systems. CVE-2020-1472, also known as Zerologon, is a critical elevation of privilege vulnerability in Microsoft s Netlogon Remote Protocol. It was initially patched in Microsoft s August 2020 Patch Tuesday. The vulnerability received a CVSSv3 score of 10.0, the maximum possible score, and a Vulnerability Priority Rating (VPR) score of 10, underscoring its severity.

Malwarebytes Affirms Other APT Attack Methods Used Besides Solorigate -- Redmondmag com

01/19/2021 Security solutions company Malwarebytes affirmed on Monday that alternative methods besides tainted SolarWinds Orion software were used in the recent Solorigate advanced persistent threat (APT) attacks. Malwarebytes has inside knowledge to that effect because it, too, was a victim of this APT group, which is alleged to be a nation-state actor, with Russia having been named. Malwarebytes doesn t use the SolarWinds Orion management software, which got corrupted by a so-called supply-chain attack method of inserting code at the build stage, which is referred to as Sunburst or Solorigate. Instead, Malwarebytes was first notified it had a possible issue when it was contacted by the Microsoft Security Response Center about the suspicious activity of an application used with the Microsoft 365 service.

Malwarebytes Hit by SolarWinds Hackers, But Only Internal Emails Were Accessed

(Credit: Malwarebytes) The hackers behind the SolarWinds breach also infiltrated Malwarebytes, but they only managed to gain access to some internal emails, according to the antivirus provider’s investigation. The intrusion didn’t occur through SolarWind’s IT software, which Malwarebytes doesn t use. Instead, the attackers exploited the company s accounts with Office 365 and Microsoft Azure.  “We can confirm the existence of another intrusion vector that works by abusing applications with privileged access to Microsoft Office 365 and Azure environments,” Malwarebytes said in a blog post on Tuesday.  On Dec. 15 the day after the SolarWinds hack became public Microsoft told the antivirus provider it had noticed suspicious activity coming from a third-party application within Malwarebytes’ Office 365 system.

© 2025 Vimarsana

vimarsana © 2020. All Rights Reserved.