Ryuk Ransomware Gang Uses Zerologon Bug for Lightning-Fast Attack
#1
Information 
Quote:The Ryuk threat actors have struck again, moving from sending a phishing email to complete encryption across the victim’s network in just five hours.
 
That breakneck speed is partially the result of the gang using the Zerologon privilege-escalation bug (CVE-2020-1472), less than two hours after the initial phish, researchers said.
 
The Zerologon vulnerability allows an unauthenticated attacker with network access to a domain controller to completely compromise all Active Directory identity services, according to Microsoft. It was patched in August, but many organizations remain vulnerable.

In this particular attack, after the attackers elevated their privileges using Zerologon, they used a variety of commodity tools like Cobalt Strike, AdFind, WMI and PowerShell to accomplish their objective, according to the analysis from researchers at the DFIR Report, issued Sunday.

Read more: https://threatpost.com/ryuk-ransomware-g...ck/160286/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Ashampoo WinOptimizer 2026
Ashampoo WinOptimize...jasonX — 07:32
XYplorer
What's new in Rele...Kool — 06:46
QOwnNotes
26.4.21 26.4.20  ...Kool — 06:43
Random YouTube Vidoes
The Wait is Over! ...jasonX — 06:32
Ashampoo Snap Pro 26
Ashampoo Snap Pro 26...jasonX — 06:20

[-]
Birthdays
Today's Birthdays
avatar (51)steakelask
avatar (45)Termoplenka
Upcoming Birthdays
avatar (51)Toligo

[-]
Online Staff
There are no staff members currently online.

>