ThreatCluster
  • Feed
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Joint CyberSecurity Advisory Alert on PrintNightmare Vulnerability and Default MFA Protocols Exploited by Russian State-Sponsored Cyber Actors (AA22-074A)

Threat Score:
56
FortiGuard Threat Signal
23 hours ago

Overview

Threat Signal Report Joint CyberSecurity Advisory Alert on PrintNightmare Vulnerability and Default MFA Protocols Exploited by Russian State- Cyber Actors (AA22-074A) Description FortiGuard Labs is aware of a recent report issued by the U.S. Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) that Russian state- cyber actors have gained network access to a non-governmental organization (NGO) through exploitation of default Multi-Factor Authentication...

Continue Reading on Original Site

Related Articles

5 articles
1

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

The Hacker News • 13 hours ago

Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners. The threat activity clusters have been codenamedSoco404andKoskeby cloud security firms Wiz and Aqua, respectively. Soco404 "targets both Linux and Windows systems, deploying platform-specific malware," Wiz researchers Maor Dokhanian, Shahar Dorfman, and Avigayil Mechtingersaid. "They use process masquerading to disguise

Score
69
Read more
2

Malicious Android Apps Mimic as Popular Indian Banking Apps Steal Login Credentials

Cybersecurity News • 14 hours ago

Attackers are weaponizing India’s appetite for mobile banking by circulating counterfeit Android apps that mimic the interfaces and icons of public-sector and private banks. Surfacing in telemetry logs on 3 April 2025, the impostors travel through smishing texts, QR codes and -engine poisoning, tricking users into sideloading the packages. During the initial execution window, a […]

Score
69
Read more
3

From Friction to Function: Optimising Onboarding in an Age of AML, AI and Rising Risk

Finextra Security • 8 hours ago

From Friction to Function: Optimising Onboarding in an Age of AML, AI and Rising Risk Join this webinar, hosted in association with nCino, to the challenges of commercial onboarding, particularly in the context of increasing regulations like the EU AML Directive and an emphasis on the importance of data strategy, AI, and streamlining Client Lifecycle Management (CLM). How can banks scale AML compliance in an increasingly complex and high-risk environment without compromising the commercial clien

Score
68
Read more
4

Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers

SecurityWeek • 4 days ago

Microsoft has started releasing updates to fix the exploited SharePoint zero-days tracked as CVE-2025-53770 and CVE-2025-53771.

Score
68
Read more
5

Mitel Patches Critical Flaw in Enterprise Communication Platform

SecurityWeek • 11 hours ago

An authentication bypass vulnerability in Mitel MiVoice MX-ONE could allow attackers to access user or admin accounts on the system.

Score
67
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2021-34527
DOMAINS
MS.Windows
FILE PATH
c:\windows\system32\drivers\etc\ hosts, redirecting Duo MFA calls to localhost instead of the Duo server. This change prevented the MFA service from contacting its server to validate MFA login-this effectively disabled MFA for active domain accounts because the default policy of Duo for Windows is to
AGENCIES
CISA
Cybersecurity and Infrastructure Security Agency
FBI
Federal Bureau of Investigation
COMPANIES
Fortinet
Microsoft
ATTACK TYPES
Data Exfiltration
Privilege Escalation
Remote Code Execution
VULNERABILITIES
Default Configuration
PrintNightmare
Privilege Escalation
Remote Code Execution
PLATFORMS
Active Directory
Windows
SECURITY VENDORS
Fortinet
RANSOMWARE
Desktop
Zlader
DOMAINS
MS.Windows
ARTICLE INFORMATION
Article #4664
Published 23 hours ago
FortiGuard Threat Signal