10/9/2020
02:15 PM
50%
50%

Critical Zerologon Flaw Exploited in TA505 Attacks

Microsoft reports a new campaign leveraging the critical Zerologon vulnerability just days after nation-state group Mercury was seen using the flaw.

Microsoft has observed new threat activity exploiting the critical Zerologon vulnerability (CVE-2020-1472. The campaign poses as software updates that connect with known TA505 command-and-control infrastructure, the company reports.

Related Content:

6 Things to Know About the Microsoft 'Zerologon' Flaw

2020 State of Cybersecurity Operations and Incident Response

New on The Edge: Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

TA505 is a Russian-speaking threat group known for spreading the Dridex banking Trojan and Locky ransomware. While its victim organizations span sizes and industries, it's known to target financial organizations and use a range of attack techniques to achieve its nefarious goals.

This time it's weaponizing Zerologon, a vulnerability that has become a patching priority since Microsoft released one of two planned fixes in August. The flaw exists when an attacker creates a vulnerable Netlogon secure channel connection to a domain controller using MS-NRPC. With this, they don't need to authenticate in order to elevate privileges and become an admin. 

TA505, which Microsoft calls Chimborazo, is distributing fake updates that lead to UAC bypass and using wscript[.]exe to run malicious code. To exploit this vulnerability, the attackers abuse MSBuild[.]exe to compile Mimikatz updated with built-in Microsoft functionality, the company's security intelligence team explains in a series of tweets on their discovery.

"Attacks showing up in commodity malware like those used by the threat actor Chimborazo indicate broader exploitation in the near term," says Microsoft, encouraging readers to update.

This is the second time this week attackers were seen using Zerologon in the wild. Mercury, an Iranian APT group also known as MuddyWater, Static Kitten, and Seedworm, has been using the vulnerability in active campaigns over the past two weeks, Microsoft Security Intelligence found. Mercury has historically targeted government organizations, especially those in the Middle East.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Copyright © 2020 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service