Zerologon

Vulnerability updated a month ago (2024-10-24T14:24:30.354Z)
Download STIX
Preview STIX
Zerologon, officially known as CVE-2020-1472, is a critical vulnerability within Microsoft's Netlogon Remote Protocol. This flaw allows attackers to bypass authentication mechanisms and alter computer passwords within a domain controller's Active Directory, enabling them to escalate privileges to domain administrator levels rapidly. The vulnerability was notably exploited by ransomware operators in Q4 of 2020, significantly increasing the speed and efficiency of their attacks. Rhysida actors and Cuba ransomware actors were among those who exploited Zerologon to gain administrative privileges. RansomHub ransomware's attack chain notably included exploiting the Zerologon vulnerability for initial access to a victim's environment. The payload leveraged command-line tools to stop all Internet Information Services (IIS) services, further escalating the impact of the breach. In addition to RansomHub, other groups exploited known vulnerabilities like Zerologon, NoPac, and PrintNightmare to escalate privileges within networks. A Russia-based Advanced Persistent Threat (APT) also abused this tool in the infamous Zerologon campaign. Despite attempts to exploit the Zerologon vulnerability, some were unsuccessful. However, telemetry data from Vision One identified another potential access vector: the Zerologon vulnerability itself. This was observed in an unrelated incident, indicating the widespread risk posed by this flaw. With its ability to provide privileged access to Active Directory and be used in conjunction with other tools like CobaltStrike as the C2 framework, Zerologon poses a significant threat to cybersecurity.
Description last updated: 2024-10-24T13:03:40.846Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
CVE-2020-1472 is a possible alias for Zerologon. CVE-2020-1472, also known as the "ZeroLogon" vulnerability, is a critical-severity flaw in Microsoft's Netlogon Remote Protocol. This vulnerability, which was patched on August 11, 2020, allows attackers to escalate privileges and gain administrative access to a Windows domain controller without any
9
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Vulnerability
Exploit
Windows
Ransomware
Phishing
Exploits
T1068
Cuba
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Cuba Ransomware Malware is associated with Zerologon. The Cuba ransomware is a malicious software that first appeared on cybersecurity radars in late 2020 under the name "Tropical Scorpius." It is designed to exploit and damage computer systems, often infiltrating through suspicious downloads, emails, or websites without the user's knowledge. Once insiUnspecified
2
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Ransomhub Threat Actor is associated with Zerologon. RansomHub, a threat actor in the realm of cybersecurity, has emerged as a significant player within the ransomware landscape. The group is known for its malicious activities, including data breaches and extortion attempts. It has been observed that RansomHub affiliates actively participate in campaiUnspecified
2
The Rhysida Threat Actor is associated with Zerologon. Rhysida is a globally active threat actor known for its ransomware operations, which have impacted a wide range of sectors, particularly the government and public sector. Their use of CleanUpLoader makes their operations highly effective and difficult to detect, as it not only facilitates persistencUnspecified
2
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
Alias DescriptionAssociation TypeVotes
The Proxylogon Vulnerability is associated with Zerologon. ProxyLogon is a significant software vulnerability that was discovered in Microsoft Exchange Server. It is part of an exploit chain, including CVE-2021-26855, which is a server-side request forgery (SSRF) vulnerability. This flaw allows attackers to bypass authentication mechanisms and impersonate uUnspecified
2
The Proxyshell Vulnerability is associated with Zerologon. ProxyShell is a vulnerability that affects Microsoft Exchange email servers, posing a significant risk to organizations worldwide. This flaw in software design or implementation allows attackers to exploit the system and gain unauthorized access. Since early 2021, Iranian government-sponsored APT acUnspecified
2
The Printnightmare Vulnerability is associated with Zerologon. PrintNightmare is a severe vulnerability (CVE-2021-34527) affecting the Windows Print Spooler service, allowing an attacker to escalate privileges either locally or remotely by loading a malicious DLL which will be executed as SYSTEM. This flaw in software design or implementation enables any authenUnspecified
2
Source Document References
Information about the Zerologon Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Trend Micro
a month ago
Trend Micro
2 months ago
ESET
2 months ago
CISA
3 months ago
InfoSecurity-magazine
4 months ago
DARKReading
6 months ago
Flashpoint
6 months ago
DARKReading
6 months ago
CISA
6 months ago
CERT-EU
9 months ago
Securityaffairs
a year ago
CERT-EU
a year ago
Securityaffairs
a year ago
CERT-EU
a year ago
Securityaffairs
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
Securityaffairs
a year ago
CERT-EU
a year ago