Chủ Nhật, Tháng Hai 5, 2023
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
No Result
View All Result
Home Tech

Iranian Hackers Intruded US Federal Agency Network Using Log4Shell Exploit

18 Tháng Mười Một, 2022
in Tech
0
Iranian Hackers Intruded US Federal Agency Network Using Log4Shell Exploit
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Các bài viết liên quan:

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022

Federal agency attacked

Iranian government-sponsored threat actors have been blamed for compromising a US federal agency by taking advantage of a Log4Shell vulnerability in an unpatched VMware Horizon server.

Insights shared by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in response to incident response efforts conducted by the agency between mid-June and mid-July 2022 .

CISA notes: “Cyber ​​threat actors exploited an unpatched Log4Shell vulnerability in an unpatched VMware Horizon server, installed Cryptocurrency Mining XMRig, switched to a domain controller (DC), compromised the credentials, and then implanted a Ngrok reverse proxy on several servers for persistence.” .

LogShell, aka CVE-2021-44228, is a critical remote code execution vulnerability in the widely used Apache Log4j Java-based logging library. The maintainers of the open source project have resolved this issue in December 2021.

The latest development marks Iran’s state-sponsored groups continuing to abuse Log4j vulnerabilities in VMware Horizon servers since the beginning of the year. CISA did not attribute this event to a specific hacking group.

However, a joint recommendation issued by Australia, Canada, the UK and the US in September 2022 criticized Iran’s Islamic Revolutionary Guard Corps (IRGC) for taking advantage of the shortcoming to carry out operations. post-mining.

The affected organization, according to CISA, is believed to have been compromised in early February 2022 by weaponizing the vulnerability to add a new exclusion rule to Windows Defender that lists the entire C:\ drive. allow.

Doing so makes it possible for an adversary to download the PowerShell script without triggering any anti-virus scanning, thus retrieving the exploit electronic money XMRig is stored on the remote server as a ZIP archive.

Initial access continues to allow agents to fetch additional payloads such as PsExec, Mimikatz, and Ngrok, in addition to using RDP for horizontal motion and disabling Windows Defender on endpoints.

“Threat actors have also changed passwords for local admin accounts on some servers for backups if rogue domain admin accounts are detected and terminated,” CISA noted.

Also detected was an unsuccessful attempt to dump the Local Security Authority Subsystem Service (LSASS) process using Windows Task Manager, which was blocked by the anti-virus solution. viruses deployed in an IT environment.

Microsoft, in a report last month, revealed that Cybercrime is targeting logins in the LSASS process due to the fact that it “can store not only the current user’s operating system credentials, but also domain admin credentials.”

“Destroying LSASS credentials is important to attackers because if they successfully dump domain passwords, for example, they can use legitimate tools like,” the tech giant said. PsExec or Windows Management Instrumentation (WMI) to move across the network”.

Related Posts

Previous Post

How to start investing in cryptocurrencies

Next Post

What is Bing Chilling? Origin of the word Bing Chilling

Megusta

Megusta

Related Posts

5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
Instruction how to use OBS streaming software

Features, settings and how to use OBS streaming software through 9 simple steps

25 Tháng Mười Hai, 2022
What is Trans woman?  What is Transgender Women?

What is Trans woman? What is Transgender Women?

23 Tháng Mười Hai, 2022
Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

22 Tháng Mười Hai, 2022
How to get 50 free coins of SkyJoy App to redeem

How to get 50 free coins of SkyJoy App to redeem

21 Tháng Mười Hai, 2022
Load More
Next Post
What is Bing Chilling?  Origin of the word Bing Chilling

What is Bing Chilling? Origin of the word Bing Chilling

Trả lời Hủy

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

Bài viết mới

How to get travel insurance
Đời sống

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly
Phần mềm

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games
Software

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power
Software

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 
Tech

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software
Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022
W3Schools

Ads

Contact: [email protected]

DMCA.com Protection Status

Categories

  • Android
  • Cạm bẫy tâm lí
  • Chưa được phân loại
  • Đồ họa
  • Đời sống
  • Gen Z
  • Health
  • iOS
  • Kĩ năng mềm
  • News
  • Nhà mạng
  • Phần mềm
  • Phần mềm đồ họa
  • Review sách
  • Software
  • Tech
  • Thiết kế ảnh
  • Thiết kế video
  • Thủ thuật
  • Travel
  • Văn hóa Nam Bộ
  • Văn học
  • Window

Browse by Tag

ai là triệu phú android Apple browser Bullet Journal bản thân chai pin Chỉnh ảnh data domain download fshare game game show giả lập màu hosting IKEA ios khuyến mãi kinh doanh kiến thức kiểm tra pin messenger miễn phí mua sắm Máy ảnh mạng network nghệ thuật ngôn ngữ nhà Trần pin laptop quảng cáo tiếng anh trạng thái Trần Thủ Độ tên miền tắt hoạt động từ vựng video viettel window 10 word zalo Đơn giản

Recent News

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023

Trang tin nóng hổi - vừa thổi vừa xem

No Result
View All Result
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z

Trang tin nóng hổi - vừa thổi vừa xem