Article 58Z8F FBI/DHS: Government election systems face threat from active Zerologon exploits

FBI/DHS: Government election systems face threat from active Zerologon exploits

by
Dan Goodin
from Ars Technica - All content on (#58Z8F)
digital-padlock-800x533.jpg

Enlarge (credit: Getty Images)

The FBI and the cybersecurity arm of the Department of Homeland Security said they have detected hackers exploiting a critical Windows vulnerability against state and local governments and that, in some cases, the attacks are being used to breach networks used to support elections.

Members of unspecific APTs-the abbreviation for advanced persistent threats-are exploiting a Windows vulnerability dubbed Zerologon. It gives attackers who already have a toehold on a vulnerable network access to the all-powerful domain controllers that administrators use to allocate new accounts and manage existing ones.

To gain initial access, the attackers are exploiting separate vulnerabilities in firewalls, VPNs, and other products from companies including Juniper, Pulse Secure, Citrix (formerly NetScaler), and Palo Alto Networks. All of the vulnerabilities-Zerologon included-have received patches, but as evidenced by Friday's warning from the DHS and FBI, not everyone has installed them. The inaction is putting governments and elections systems at all levels at risk.

Read 3 remaining paragraphs | Comments

index?i=NwLiumpU8Mk:kqHgOYk4jks:V_sGLiPB index?i=NwLiumpU8Mk:kqHgOYk4jks:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments