{"id":37309,"date":"2020-09-24T22:34:39","date_gmt":"2020-09-24T22:34:39","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/"},"modified":"2020-09-24T22:34:39","modified_gmt":"2020-09-24T22:34:39","slug":"you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/","title":{"rendered":"You know that Microsoft ZeroLogon bug you&#8217;ve been dragging your feet on? It&#8217;s getting pwned in the wild now"},"content":{"rendered":"<p>The rather concerning design flaw in Microsoft&#8217;s netlogon protocol is being exploited in the wild by miscreants, the Windows giant&#8217;s security team has warned.<\/p>\n<p>The mega-biz today confirmed it is seeing active attacks abusing the <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1472\">CVE-2020-1472<\/a> vulnerability, aka ZeroLogon, which can be exploited to bypass authentication and gain domain-level administrator access in corporate networks.<\/p>\n<blockquote class=\"twitter-tweet\" readability=\"7.5215946843854\">\n<p lang=\"en\" dir=\"ltr\">Microsoft is actively tracking threat actor activity using exploits for the CVE-2020-1472 Netlogon EoP vulnerability, dubbed Zerologon. We have observed attacks where public exploits have been incorporated into attacker playbooks.<\/p>\n<p>\u2014 Microsoft Security Intelligence (@MsftSecIntel) <a href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1308941504707063808?ref_src=twsrc%5Etfw\">September 24, 2020<\/a><\/p><\/blockquote>\n<p>The protocol-level hole affects Windows Server and other software that implements <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/docs.microsoft.com\/en-us\/openspecs\/windows_protocols\/ms-nrpc\/ff8f970f-3e37-40f7-bd4b-af7336e4792f\">MS-NRPC<\/a> to provide domain controllers, such as <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/09\/22\/samba_zerologon_patch\/\" rel=\"noopener noreferrer\">Samba<\/a>. The vulnerability has been given a sweat-inducing CVSS score of 10 out of 10 in severity.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/03\/16\/shutterstock_fail.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"flaw\"><\/p>\n<h2 title=\"Domain controllers at risk of hijacking, depending on version and configuration\">As you&#8217;re scrambling to patch the scary ZeroLogon hole in Windows Server, don&#8217;t forget Samba \u2013 it&#8217;s also affected<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2020\/09\/22\/samba_zerologon_patch\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Sysadmins can&#8217;t say they weren&#8217;t warned about this flaw and the urgent need to patch it. Microsoft emitted its fix for CVE-2020-1472 in the <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/08\/11\/patch_tuesday_august\/\" rel=\"noopener noreferrer\">August Patch Tuesday<\/a> bundle, and even back then experts were warning the flaw was a critical security risk and addressing it should be a high priority.<\/p>\n<p>&#8220;It\u2019s rare to see a critical-rated elevation-of-privilege bug,&#8221; Trend Micro-ZDI&#8217;s Dustin Childs said <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.thezdi.com\/blog\/2020\/8\/11\/the-august-2020-security-update-review\">at the time<\/a>, &#8220;but this one deserves it.&#8221;<\/p>\n<p>Things got real serious when binary-pokers began to post their proof-of-concept code to exploit the flaw. This prompted the US government&#8217;s computer security agency CISA to take the rare step of issuing an <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/09\/21\/cisa_zerologon_emergency_windows_patch\/\" rel=\"noopener noreferrer\">emergency patch directive<\/a>, urging everyone to install fixes for ZeroLogon when possible.<\/p>\n<p>&#8220;This attack has huge impact,&#8221; said CISA. &#8220;It basically allows any attacker on the local network (such as a malicious insider or someone who simply plugged a device to an on-premise network port) to completely compromise the Windows domain.&#8221;<\/p>\n<p>As noted above, installing the August Patch Tuesday bundle will clear up this vulnerability on Windows boxes at least, and protect servers from attack. Admins would be wise to scan their boxes for suspicious activity or any <a target=\"_blank\" href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1308941508809236480\" rel=\"noopener noreferrer\">indicators of compromise<\/a>, as at this point there is a chance machines, particularly those reachable from the internet, have already been exploited.<\/p>\n<p>Microsoft, meanwhile, said it has additional recommendations for those using the Microsoft 365 suite. &#8220;Microsoft 365 customers can refer to the threat analytics report we published in Microsoft Defender Security Center,&#8221; said the MICROS~1 team. &#8220;The threat analytics report contains technical details, mitigations, and detection details designed to empower SecOps to detect and mitigate this threat.&#8221; \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/09\/24\/microsoft_zerologon_in_wild\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Scan servers for signs of compromise and patch if you haven&#8217;t already The rather concerning design flaw in Microsoft&#8217;s netlogon protocol is being exploited in the wild by miscreants, the Windows giant&#8217;s security team has warned.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37310,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-37309","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>You know that Microsoft ZeroLogon bug you&#039;ve been dragging your feet on? It&#039;s getting pwned in the wild now 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You know that Microsoft ZeroLogon bug you&#039;ve been dragging your feet on? It&#039;s getting pwned in the wild now 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-24T22:34:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"You know that Microsoft ZeroLogon bug you&#8217;ve been dragging your feet on? It&#8217;s getting pwned in the wild now\",\"datePublished\":\"2020-09-24T22:34:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\\\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\\\/\",\"name\":\"You know that Microsoft ZeroLogon bug you've been dragging your feet on? It's getting pwned in the wild now 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now.jpg\",\"datePublished\":\"2020-09-24T22:34:39+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"You know that Microsoft ZeroLogon bug you&#8217;ve been dragging your feet on? It&#8217;s getting pwned in the wild now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"You know that Microsoft ZeroLogon bug you've been dragging your feet on? It's getting pwned in the wild now 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/","og_locale":"en_US","og_type":"article","og_title":"You know that Microsoft ZeroLogon bug you've been dragging your feet on? It's getting pwned in the wild now 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-09-24T22:34:39+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"You know that Microsoft ZeroLogon bug you&#8217;ve been dragging your feet on? It&#8217;s getting pwned in the wild now","datePublished":"2020-09-24T22:34:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/"},"wordCount":447,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/","url":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/","name":"You know that Microsoft ZeroLogon bug you've been dragging your feet on? It's getting pwned in the wild now 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now.jpg","datePublished":"2020-09-24T22:34:39+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/you-know-that-microsoft-zerologon-bug-youve-been-dragging-your-feet-on-its-getting-pwned-in-the-wild-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"You know that Microsoft ZeroLogon bug you&#8217;ve been dragging your feet on? It&#8217;s getting pwned in the wild now"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37309"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37309\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37310"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}