Ad End 1 August 2025
Ad Ends 13 July 2025
ad End 25 October 2025
Ad Ends 20 April 2025
Ad expire at 5 August 2024
banner Expire 9 June 2025
banner Expire 25 October 2025
banner Expire 10 May 2025
What's new
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

File_closed07

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 13, 2020
Messages
7,905
Reaction score
942
Points
212
Awards
2
  • trusted user
  • Rich User
TA505, aka Evil Corp, uses fake software updates in its attacks.




Microsoft has warned users that the Russian cybercriminal group TA505 is exploiting the Zerologon vulnerability in its attacks.

The attacks recorded by experts use fake software updates that connect to the C&C infrastructure, which information security experts associate with the TA505 grouping (CHIMBORAZO in the Microsoft classification). Fake updates are capable of bypassing User Account Control (UAC) and executing malicious scripts using the legitimate Windows Script Host tool (wscript.exe). During exploitation of the vulnerability, attackers use MSBuild.exe to add Zerologon functionality to Mimikatz.

The TA505 group, also known as Evil Corp, has been active for almost a decade and is known primarily for its attacks using banking Trojans and ransomware. Recently cybersecurity experts presentedevidence of TA505 collaboration with North Korean cybercriminal group Lazarus.

Zerologon ( CVE-2020-1472 ) is a privilege escalation vulnerability in Windows Server. The problem is related to the use of an unreliable encryption algorithm in the Netlogon authentication mechanism. Zerologon allows you to simulate any computer on the network while authenticating to a domain controller, disable Netlogon security features, and change the password in the domain controller's Active Directory database.

Microsoft recently urged users to install its August security updates that partially fix the vulnerability, as Zerologon is already actively exploited by hackers, including Iranian... The August patch is only the first stage of the vulnerability fix - the second should be expected in February 2021.

__________________
 
Ad End 1 February 2024
Top