Ad End 1 February 2024
Ad Ends 13 January 2025
Ad End 26 February 2025
ad End 25 April 2025
Ad Ends 20 January 2025
Ad expire at 5 August 2024
banner Expire 25 April 2025
What's new
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
casino
swipe store
adv exp at 23 August 2024
Carding.pw carding forum
BidenCash Shop
Kfc CLub

File_closed07

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 13, 2020
Messages
7,544
Reaction score
916
Points
212
Awards
2
  • trusted user
  • Rich User
TA505, aka Evil Corp, uses fake software updates in its attacks.




Microsoft has warned users that the Russian cybercriminal group TA505 is exploiting the Zerologon vulnerability in its attacks.

The attacks recorded by experts use fake software updates that connect to the C&C infrastructure, which information security experts associate with the TA505 grouping (CHIMBORAZO in the Microsoft classification). Fake updates are capable of bypassing User Account Control (UAC) and executing malicious scripts using the legitimate Windows Script Host tool (wscript.exe). During exploitation of the vulnerability, attackers use MSBuild.exe to add Zerologon functionality to Mimikatz.

The TA505 group, also known as Evil Corp, has been active for almost a decade and is known primarily for its attacks using banking Trojans and ransomware. Recently cybersecurity experts presentedevidence of TA505 collaboration with North Korean cybercriminal group Lazarus.

Zerologon ( CVE-2020-1472 ) is a privilege escalation vulnerability in Windows Server. The problem is related to the use of an unreliable encryption algorithm in the Netlogon authentication mechanism. Zerologon allows you to simulate any computer on the network while authenticating to a domain controller, disable Netlogon security features, and change the password in the domain controller's Active Directory database.

Microsoft recently urged users to install its August security updates that partially fix the vulnerability, as Zerologon is already actively exploited by hackers, including Iranian... The August patch is only the first stage of the vulnerability fix - the second should be expected in February 2021.

__________________
 
Ad End 1 February 2024
Top