Sunday, April 27, 2025
HomeCVE/vulnerabilityFBI Warns that Hackers Gain Network Access by Exploiting MFA and “PrintNightmare”...

FBI Warns that Hackers Gain Network Access by Exploiting MFA and “PrintNightmare” Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

The CSA and FBI have collaboratively conducted various types of analysis over hacking activity. There have been speculations on Russian State-Sponsored threat actors and their targets over Ukraine and other parts of the world.

Recently, they have exploited an NGO that was using Cisco’s Duo MFA which had enabled access to cloud and email accounts for stealing documents.

The FBI has also listed the steps to mitigate, Techniques, tactics and Procedures, Indicators of Compromise that can be used to protect against Russian State-Sponsored Hackers.

- Advertisement - Google News

How did they exploit it?

In early May 2021, the FBI noted that the Russian State-Sponsored hackers were targeting an NGO and exploited a flaw in that system relating to MFA and to move inside the network.

The Hackers initially gained access to the network via compromised credentials. Later, they enrolled in a new device for the compromised account. Hackers were using Brute force techniques to extract credentials of an account. Accounts with very simple and predictable passwords were compromised. 

Due to long inactivity on the compromised account, MFA is disabled and especially the accounts were not removed from the active directory. Hackers leveraged these accounts and took over them. 

For privilege escalation, they used a known vulnerability called “PrintNightmare” and gained access to the system.

After escalating privileges, they managed to change the C:\windows\system32\drivers\etc\hosts file to modify MFA. They redirected the hosts’ file and changed the Duo Server IP to localhost.

This prevented the validation of devices associated with the accounts. Another interesting thing is, Duo has a default value as “Fail Open”. This has disabled MFA authentication for the device while connecting to VPN. 

Once they got access to the Virtual Private Network, they used Remote Desktop Protocol to connect to Windows Domain Controller. They used these accounts to move laterally around the organisation. 

Indicators of Compromise

The following processes might indicate that the systems can be compromised.

  • ping[.]exe
  • regedit[.]exe
  • rar[.]exe
  • ntdsutil[.]exe

Hosts file modifications include 

127.0.0.1 api-<redacted>.duosecurity[.]com 

The following IP addresses were identified that were used by the threat actors.

  • 45.32.137[.]94
  • 191.96.121[.]162
  • 173.239.198[.]46
  • 157.230.81[.]39 

Mitigations

The FBI has posted the complete steps to mitigate and check for compromised accounts. Some of them are 

  • Enabling MFA to all the users as soon as possible
  • Configure new policies for “fail open”
  • Ensure to remove all the accounts that are presumed deactivated.
  • Update all the software and patches
  • Monitor for suspicious log 
  • Not letting employees use the same login credentials to many accounts.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...