Back in August, Microsoft patched one of the most dangerous bugs it had ever seen. The vulnerability allowed hackers to take over Windows Servers running as domain controllers in enterprise networks.
According to ZDnet.com, the this bug ‘allows an attacker to manipulate Netlogon authentication procedures and:
- impersonate the identity of any computer on a network when trying to authenticate against the domain controller
- disable security features in the Netlogon authentication process
- change a computer’s password on the domain controller’s Active Directory (a database of all computers joined to a domain, and their passwords)’
The attack is very fast, taking as little as 3 seconds to take control of an entire corporate network.
What’s the solution?
The patching process is taking place in two parts – Microsoft released a temporary patch in August 2020 and a more comprehensive one is due to be released in February 2021.
How do I make sure my server is safe?
If you’re a projectfive customer and you’re on Patch Management, then we’ve already applied the patch and got you covered. If you’re not sure, you can call the team on 01276 455455.
If you’re not a projectfive customer and you have any concerns, make sure you speak to your IT team for advise.