In recent months, the Tesorion CERT (T-CERT) identified an attacker that was able to execute commands, using an account with Domain Administator privileges, only three minutes after initial access. Further analysis identified exploitation of the ZeroLogon vulnerability (CVE-2020-1472).
We investigated three possible attack scenarios which an attacker could use after exploiting the ZeroLogon vulnerability. The T-CERT simulated each scenario to identify Indicators of Compromise which are related to these attack scenarios when carried out using the Mimikatz tool.
[spotler_form_div mpformid=”2003″ feid=”MeBY678A9azPUVbfs8JV” collapsable=”no” id_privacydisplay_part1=”CNT2876″ id_privacydisplay_part2=”CNT2877″]