Ausnahme gefangen: SSL certificate problem: certificate is not yet valid 📌 Russian hackers exploit Outlook zero-day vulnerability to target European organizations

🏠 Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeiträge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden Überblick über die wichtigsten Aspekte der IT-Sicherheit in einer sich ständig verändernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch übersetzen, erst Englisch auswählen dann wieder Deutsch!

Google Android Playstore Download Button für Team IT Security



📚 Russian hackers exploit Outlook zero-day vulnerability to target European organizations


💡 Newskategorie: Hacking
🔗 Quelle: blackhatethicalhacking.com

Russian hackers exploit Outlook zero-day vulnerability to target European organizations

Premium Content

Patreon
Subscribe to Patreon to watch this episode.
Reading Time: 3 Minutes

Microsoft patches Outlook zero-day vulnerability used in attacks by Russian hackers

Microsoft has released a security patch to address a critical vulnerability (CVE-2023-23397) in Outlook that was exploited by a Russian hacking group to target government, military, energy, and transportation organizations in Europe. The group, which has been tracked as APT28, Sednit, and Fancy Bear, used malicious Outlook notes and tasks to steal NTLM hashes, which were then used to access victims’ networks and exfiltrate specific accounts.

The vulnerability can be exploited through low-complexity attacks by sending messages containing UNC paths to attacker-controlled SMB shares. Microsoft recommends immediate patching or temporary mitigation by adding users to the Protected Users group in Active Directory and blocking outbound SMB.

See Also: So you want to be a hacker?
Offensive Security, Bug Bounty Courses

Outlook versions affected

According to Microsoft, the vulnerability affects all supported versions of Outlook for Windows but not Outlook for Android, iOS, or macOS versions. Online services like Outlook on the web and Microsoft 365 do not support NTLM authentication, making them immune to attacks exploiting this NTLM relay vulnerability.
To help admins check if any users in their Exchange environment have been targeted using this Outlook vulnerability, Microsoft released a dedicated PowerShell script that checks Exchange messaging items for malicious UNC paths and allows modifying or deleting potentially malicious messages if they are found on the audited Exchange Server when run in Cleanup mode.

This critical elevation of privilege security flaw was first reported by the Computer Emergency Response Team for Ukraine (CERT-UA). Microsoft shared this information in a private threat analytics report available to customers with Microsoft 365 Defender, Microsoft Defender for Business, or Microsoft Defender for Endpoint Plan 2 subscriptions.

Mitigation

In addition to patching, Microsoft advises adding users to the Protected Users group in Active Directory and blocking outbound SMB to limit the impact of the attacks.

Microsoft urges its customers to take immediate action and patch their systems against CVE-2023-23397 or add users to the Protected Users group in Active Directory and block outbound SMB as a temporary mitigation to minimize the impact of the attacks.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: info@blackhatethicalhacking.com

Source: bleepingcomputer.com

Source Link

Merch

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.

The post Russian hackers exploit Outlook zero-day vulnerability to target European organizations first appeared on Black Hat Ethical Hacking. ...



📌 Camaro Dragon – Chinese State-Sponsored Hackers Target European Organizations via Infected TP-Link Routers


📈 35.32 Punkte

📌 Russian Hackers Target European Governments Ahead of Elections: FireEye


📈 33.95 Punkte

📌 Russian-Backed Hackers Target High-Value US, European Entities


📈 33.95 Punkte

📌 Russian hackers use old Outlook vulnerability to target Polish orgs (CVE-2023-23397)


📈 33.79 Punkte

📌 Mysterious 'AcidBox' Malware Used Turla Exploit to Target Russian Organizations


📈 31.9 Punkte

📌 Russian Hackers Target Russian Companies With Ransomware


📈 31.1 Punkte

📌 Russian APT28 Targets European NATO Nations Using Microsoft Outlook Vulnerability


📈 30.5 Punkte

📌 Hackers for hire group target organizations via 3ds Max exploit


📈 29.04 Punkte

📌 Russian hacking tool gets extra stealthy to target US, European computers


📈 28.49 Punkte

📌 Russian APT groups target European governments ahead of May Elections


📈 28.49 Punkte

📌 Russian Cyberspies Again Target Sporting, Anti-Doping Organizations


📈 27.02 Punkte

📌 New Woody RAT Malware Being Used to Target Russian Organizations


📈 27.02 Punkte

📌 New Woody RAT Malware Being Used to Target Russian Organizations


📈 27.02 Punkte

📌 Russian APT Used Zero-Click Outlook Exploit


📈 26.91 Punkte

📌 Russian APT Used Zero-Click Outlook Exploit


📈 26.91 Punkte

📌 European organizations are planning to adopt zero trust architecture to strengthen their security posture


📈 26.8 Punkte

📌 North Korean hackers target European orgs with updated malware


📈 25.63 Punkte

📌 Chinese Hackers Using Russo-Ukrainian War Decoys to Target APAC and European Entities


📈 25.63 Punkte

📌 Microsoft says Russian hackers targeted European researchers


📈 24.95 Punkte

📌 Warning: Russian hackers break into European embassy in Washington


📈 24.95 Punkte

📌 Russian Hackers Exploited Windows Flaws in Attacks on European Firms


📈 24.95 Punkte

📌 Russian Turla hackers breach European government organization


📈 24.95 Punkte

📌 Microsoft Warns of Stealthy Outlook Vulnerability Exploited by Russian Hackers


📈 24.79 Punkte

📌 Microsoft Uncovers Evidence of Russian Hackers Exploiting Outlook Vulnerability


📈 24.79 Punkte

📌 Russian Cyberspies Exploit Roundcube Flaws Against European Governments


📈 24.37 Punkte

📌 Iranian Hackers Exploiting Unpatched Log4j 2 Bugs to Target Israeli Organizations


📈 24.15 Punkte

📌 SWEED Hackers Target Manufacturing, Logistics Organizations


📈 24.15 Punkte

📌 Microsoft Says Russia-Linked Hackers Target Sports Organizations


📈 24.15 Punkte

📌 Hackers Could Target Organizations via Flaws in Mitsubishi Factory Automation Products


📈 24.15 Punkte

📌 Chinese Hackers Target Japanese Organizations in Large-Scale Campaign


📈 24.15 Punkte

📌 Microsoft: Russian hackers are targeting sporting organizations ahead of Tokyo Olympics


📈 23.47 Punkte

📌 Russian-Linked Hackers Breach 80+ Organizations via Roundcube Flaws


📈 23.47 Punkte

📌 Russian Military Hackers Targeted Credentials at Hundreds of Organizations in US, UK


📈 23.47 Punkte

📌 Seven Russian Hackers Charged With Hacking Anti-Doping Organizations


📈 23.47 Punkte

📌 Russia-Linked Hackers Targeting Russian Industrial Organizations


📈 23.47 Punkte











matomo