IOTW: Despite Patch, Zerologon Attack Still A Big Deal

One for your deception campaign…:

Security vulnerability CVE-2020-1472, which was discovered and patched earlier this year, is still running rampant. Dubbed Zerologon, it is unique in its simplicity. It works by exploiting a Netlogon weakness. Netlogon is the always-on Windows service that enables end users to log into a network. The scripted hack runs incredibly quickly, searching for unpatched Active Directory systems and exploiting a weakness by adding the number zero in certain Netlogon authentication fields.

On October 16, a month after Microsoft released its first patch, independent researcher Kevin Beaumont drew the hack out by utilizing a honeypot he maintains to detect threats. Honeypots work by intentionally setting up vulnerabilities in order to bait and identify cyber security threats. Using an unpatched lure server, Beaumont discovered that hackers were able to backdoor the server by changing an admin password. From there, hackers have access to domain controllers that administrators use to create and manage accounts across an organization. The hacker can then impersonate any computer connected to the affected network, disable Netlogon security features, and change a network computer’s password.

[…]

Original article here