CyberHoot’s Chief Information Security Officer constantly monitors the cybersecurity threats MSPs and SMBs face.
Recently, a critical vulnerability was patched by Microsoft in August 2020. This vulnerability was so severe, it got an extremely rare 10/10 severity rating from Microsoft. If this flaw were weaponized, it could compromise an Enterprise network in under three seconds. Dubbed the “Zerologon” bug, it affects all domain controllers serving the netlogon protocol (when you boot your computer and authenticate to your domain account this protocol is used).
This bug allows an attacker to manipulate netlogon authentication procedures to:
Microsoft quietly released a patch in August to fix this issue. However, its significance didn’t come to light until last week when security researchers at Secura B.V., a Dutch security firm, published technical details in a whitepaper on their Blog.
CyberHoot strongly recommends that you patch your domain controllers for this vulnerability now, today, before you do anything else. It’s that serious!
Additional Reading:
ZDNet Article: Zerologon attack lets hackers take over enterprise networks: Patch now
Sophos Video: Sophos Naked Security: NetLogon: Are you at Risk
Microsoft KB: Microsoft CVS-2020-1472
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
DocuSign has become one of the most trusted tools in modern business. Contracts, HR paperwork, NDAs, vendor...
Read more
And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....
Read more
Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
