safirsoft.com Logo
Best Free Download Softwares, Graphics, Fonts & Technology News
https://safirsoft.com Hackers are using a severe Windows bug to backdoor unpatched servers

Attackers are spraying the Internet to backdoor unpatched Active Directory systems.

One of the most critical Windows vulnerabilities disclosed this year is under active attack by hackers who are trying to backdoor servers that store credentials for every user and administrative account on a network, a researcher said on Friday.

Further ReadingNew Windows exploit lets you instantly become admin. Have you patched?Zerologon, as the vulnerability has been dubbed, gained widespread attention last month when the firm that discovered it said it could give attackers instant access to active directories, which admins use to create, delete, and manage network accounts. Active directories and the domain controllers they run on are among the most coveted prizes in hacking because once hijacked, they allow attackers to execute code in unison on all connected machines. Microsoft patched CVE-2020-1472, as the security flaw is indexed, in August.

On Friday, Kevin Beaumont, working in his capacity as an independent researcher, said in a blog post that he had detected attacks on the honeypot he uses to keep abreast of attacks hackers are using in the wild. When his lure server was unpatched, the attackers were able to use a powershell script to successfully change an admin password and backdoor the server.

Something more problematic than sophisticated

In an interview, Beaumont said that the attack appeared to be entirely scripted, with all commands being completed within seconds. With that, the attackers installed a backdoor allowing remote administrative access to devices inside his mock network. The attackers—who set up an account with the username sdb and the password jinglebell110@—also enabled Remote Desktop. As a result, the attackers would continue to have remote access if CVE-2020-1472 is later patched.

Hackers are using a severe Windows bug to backdoor unpatched servers
hackers-are-using-a-severe-windows-bug-to-backdoor.html

https://safirsoft.com WarGames for real: How one 1983 exercise nearly triggered WWIII

WarGames for real: How one 1983 exercise nearly triggered WWIII

From the archives: Say hello to the KGB software model that forecasted mushroom clouds.

"Let's play Global Thermonuclear War."

...
https://safirsoft.com AI can run your work meetings now

AI can run your work meetings now

"Optimizing" meetings, from automated scheduling to facial recognition to measure attention.

Julian Green was explaining the big problem with me...

https://safirsoft.com Comcast raising TV and Internet prices, including a big hike to hidden fees

Comcast raising TV and Internet prices, including a big hike to hidden fees

Internet prices to rise $3 a month; "Broadcast TV" hidden fee going up $4.50.

Comcast is raising prices for cable TV and Internet service on Jan...

https://safirsoft.com SpaceX Starlink questions answered: “Wider beta” soon, no plan for data caps

SpaceX Starlink questions answered: “Wider beta” soon, no plan for data caps

Starlink technology and the service's future covered in Q&A on Reddit.

SpaceX Starlink engineers answered questions in a Reddit AMA (Ask Me Anyt...

https://safirsoft.com OneWeb emerges from bankruptcy, plans global satellite broadband by 2022

OneWeb emerges from bankruptcy, plans global satellite broadband by 2022

OneWeb plans satellite launches in December and throughout 2021 and 2022.

OneWeb has emerged from Chapter 11 bankruptcy under new ownership and ...

https://safirsoft.com Comcast’s data cap finally goes nationwide in expansion to 12 more states

Comcast’s data cap finally goes nationwide in expansion to 12 more states

Comcast data cap comes to Northeast US over four years after everyone else got it.

Comcast's 1.2TB monthly data cap is coming to 12 more states ...

copyright 2020 safirsoft.com
All rights reserved for the safirsoft website.
It is possible to use the content only by mentioning the name and link to the source page.