Jump to content

Ooooh... More Windows FUN!


V.T. Eric Layton

Recommended Posts

So all that has to happen is a spam email with its malicious attachment must make it past all security and the spam filters coming into the network.

 

The user, seeing this unsolicited email must open it, then click on the unsolicited Word document attachment that then releases malware that sneaks past without being detected all anti-malware solutions running on the computer to compromise that user's computer.

 

That malicious code then must make its way through the company network to the domain controller, sneaking past that server's own security.

 

Then the malicious TrickBot code, running on that server while remaining undetected, must somehow gain administrative access, grab the Active Directory credentials from the AD database, and then it can execute its payload to grab user credentials. 

 

Got it. :rolleyes:

 

I'm not trying to minimize the threat, but TrickBot has been around since 2016. And certainly I am not trying to take anything away from Larry Abrams or his article. But the facts are, any network security administrator should already be on top of this. 

 

Quote

If TrickBot is able to gain administrative access to a domain controller, it will abuse this command to create a copy of the domain's Active Directory database and steal it.

 

That's a pretty big IF! 

 

Really, what this article serves is another, but very important reminder and training opportunity to all administrators and users, to avoid being "click-happy" on unsolicited emails, attachments, popups, downloads and links. And for all computer admins (business and home/personal) to keep our operating systems and security software current. And above all, avoid being "click-happy". 

Link to comment
Share on other sites

V.T. Eric Layton
2 minutes ago, Digerati said:

That's a pretty big IF! 

 

And, unfortunately, this "big IF" does happen occasionally. And it only takes one time to ruin someone's day.

  • +1 1
Link to comment
Share on other sites

V.T. Eric Layton
3 minutes ago, Digerati said:

Really, what this article serves is another, but very important reminder and training opportunity to all administrators and users, to avoid being "click-happy" on unsolicited emails, attachments, popups, downloads and links. And for all computer admins (business and home/personal) to keep our operating systems and security software current. And above all, avoid being "click-happy". 

 

Also, VERY true!

  • Like 2
  • Agree 1
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...