π‡πŽπ– π“πŽ πƒπˆπ’π€ππ‹π„ ππ‘πˆππ“ π’ππŽπŽπ‹π„π‘ 𝐎𝐍 πƒπŽπŒπ€πˆπ π‚πŽππ“π‘πŽπ‹π‹π„π‘π’

Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.

Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.

The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.

But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so it’s a good idea to disable Print Spooler on domain controllers.

πŸ“Ί Watch my YouTube video bellow on how to disable Print Spooler on Domain Controllers πŸ‘‡ πŸ‘‡
https://youtu.be/O80HHKdnbcQ

#cswlrd #printspooler #domaincontrollers #printnightmare #videotutorial

How to disable Print Spooler on Domain Controllers | Cybersecurity World

YouTube

Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.

Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.

The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.

But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so it’s a good idea to disable Print Spooler on domain controllers.

πŸ“Ί π–πšπ­πœπ‘ 𝐭𝐑𝐞 𝐫𝐞𝐜𝐨𝐫𝐝𝐒𝐧𝐠 𝐨𝐧 𝐏𝐚𝐭𝐫𝐞𝐨𝐧 (English)
https://www.patreon.com/posts/how-to-disable-106780220?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link

πŸ“Ί π–πšπ­πœπ‘ 𝐭𝐑𝐞 𝐫𝐞𝐜𝐨𝐫𝐝𝐒𝐧𝐠 𝐨𝐧 π…π¨π«πžπ§ππ¨π«π¬ (Czech)
https://www.forendors.cz/p/39ff110621ce2c644f22b4208dbd07d4

πŸ“Ί π–πšπ­πœπ‘ 𝐭𝐑𝐞 𝐫𝐞𝐜𝐨𝐫𝐝𝐒𝐧𝐠 𝐨𝐧 π‡πžπ«π¨π‘πžπ«π¨ (Czech)
https://herohero.co/cswrld/post/bceroxowdykkdetywahfshfeaca

πŸ‘Share, like, comment!

#video #tutorial #cswrld #printspooler #printnightmare

How to Disable Print Spooler on Domain Controller

Learn how to disable Print Spooler service on Domain Controller and why it's crucial to do this in this tutorial.

ALI TAJRAN

Do you have Print Spooler enabled on your Domain Controllers? Do you know that the PrintNightmare critical vulnerability was related to the Print Spooler service?

Print Spooler should be disabled on Domain Controllers completely. You can easily disable it via GPO. #cybersecurity #tip #ad #dc #printspooler #printnightmare https://www.cswrld.com/2023/12/how-to-disable-print-spooler-on-domain-controllers/

Sometimes to just have to.... πŸ΄β€β˜ οΈπŸ¦œπŸ΄β€β˜ οΈπŸ¦œ The Day. /Sarcasm /SargasamSea 🚒🚀

#PrintSpooler πŸ–¨οΈ β˜£οΈπŸ“‰πŸ˜³

VirusTotal

VirusTotal

Updated... Check out ¹⁡ 😯

Trapped & Traced #GammsGroup #FinFisher 03-13-2023 from new AT&T Motorola Phone under ~$100 πŸ”Žβ˜£οΈπŸ€³πŸ‘€πŸ‘€πŸ”

ΒΉ From Virus Total Scanner: https://www.virustotal.com/en/file/9b53e0eeb35c173fd0c56b85812c0e59501a8588037dc92b8bac38e916ffdf09/analysis/ #VisualVoicemail

GammaGroup.com Visual voicemail FinFisher Module 03-13-2023

New VT generated after Save:
https://www.virustotal.com/graph/embed/g806efa51f1af4a638b20262b6931f8b0caab56f276834ca58b01afcc4605057e

Β² From Virus Total Scanner: https://www.virustotal.com/en/file/5387c9d5a137908cdc7820af51fea018c7b96dcce08a32a1fc20e9b6e64c8738/analysis/ #CarrierHub

GammaGroup From FinFisher CarrierHub 03-13-2023

New VT generated after Save:
https://www.virustotal.com/graph/embed/g13901560905741e48e926e061e01252bfa4ff6e8255f4156b56ca739c4ecaff3

Β³ From Virus Total Scanner:
https://www.virustotal.com/en/file/433321001cb907c775e4a06c1a2e36861b0d0355a74b4b9d0d1c2e48cce55d4c/analysis/ #MCMClient

GammaGroup FinFisher Module MCMClient 03-13-2023

New VT generated after Save:
https://www.virustotal.com/graph/embed/gf312aa3fc4174d9b88355ad755e6f24522e795ee3a304d3db07bb0ec7daa702b

⁴ From Virus Total Scanner: https://www.virustotal.com/en/file/ae22b44ad5381463912046aea7ec541352e22b02f2f0887864807b22473c92ca/analysis/ #MTPHost πŸ“¬ Gmail backdoor Client

GammaGroup FinFisher Module MTPHost 03-13-2023

New VT generated after Save:
https://www.virustotal.com/graph/embed/g2579d64499654488a367fc14de7457bb6cd1b7489d0840cf8e0b61baa1d96bd6

⁡
From Virus Total Scanner: https://www.virustotal.com/en/file/727ed61fe7e6476a4a7e08fcc16447fb74f6df317ea16f483efcf3da709cd4ba/analysis/ #MobileInstaller

GammaGroup FinFisher Module MobileInstaller 03-13-2023

New VT generated after Save:
https://www.virustotal.com/graph/embed/g5af535a69bba4ad6a8db6866f9e46075d42e2e8e0b424cfb93ec7bd473ff2180

⁢ From Virus Total Scanner: https://www.virustotal.com/en/file/87b87fc66535c3415bffd4cd34c48d67054b9b4b90c4092fa535cb45ed5a0f41/analysis/ #InvisibleNet Motorola

GammaGroup FinFisher Module InvisibleNet 03-13-2023

New VT generated after Save:
https://www.virustotal.com/graph/embed/g01fa7fb9fb744f0d903e473bcd5fbad0a079d61992144621852170d09a81b6c9

⁷ https://www.virustotal.com/en/file/4530ed14a588eec9d7886e175266233f703dc5c9926fed3453b342f3cee6af48/analysis/ #ModemService

New VT generated after Save:
https://www.virustotal.com/graph/embed/gbc0a2d0323554e029d8b1285127ed47431904bfe3cb44ca88d0261d8111380e4

⁸ https://www.virustotal.com/en/file/5fbac1a6ae81827f92cbfb84354b9901a641723047e859695edef2e6b7f57692/analysis/ #ComMediaTekPresence Presence.apk

New VT generated after Save:
https://www.virustotal.com/graph/embed/g310e8819ae574d76b7b9683f5991aa8a7664ec5b219a4b9697b9bbaed851f06d

⁹ https://www.virustotal.com/en/file/c5b90ca64afa869f498937564c569c1b70074245f27157371b7c3123b9565056/analysis/ #GooglePermissionsControllerOverlay

New VT generated after Save:
https://www.virustotal.com/graph/embed/g52ab9b1e8c044e95bbe068993ba35ba89e98cd251dea4aca991ee56cb33e177f

¹⁰ https://www.virustotal.com/en/file/725af7257edc55088956844e4c8a2d048e7e6127750f5934b99f794582df7f50/analysis/ #PartnerBookmarksProvider

New VT generated after Save:
https://www.virustotal.com/graph/embed/gde904dfdd0a54557bca9f96743df9c3edee4440215e0407cb85f73314ba7c893

ΒΉΒΉ https://www.virustotal.com/en/file/ceb772b69ad2b76cddba66217cdbeabdf5054a149ff400d705e69cd096ba301e/analysis/ #ONS

New VT generated after Save:
https://www.virustotal.com/graph/embed/gf6667bc42b3d41a2aaf1cfe4f41fa7c067c29e3ac0404ad89f945798f29ae593

ΒΉΒ² https://www.virustotal.com/en/file/3492a270ccfa240579562b85e23fa4fbfd64513f2d4e82cbb8205b76251f7794/analysis/ #MotoCellBroadcastServiceOverlay

New VT generated after Save:
https://www.virustotal.com/graph/embed/g231c5719476c4c7e8c5822b6b79a891f865d4d08eafb4874aa5cb5eeb9292a3e

ΒΉΒ³ https://www.virustotal.com/en/file/586c6882dbfeee773fbb11baae14a125c849f9af43e87184ffc1245761614250/analysis/ #TetheringResOverlay

New VT generated after Save:
https://www.virustotal.com/graph/embed/g3ed40d5ce5054c3d817e9d97ef299f5ce2ea59501dfa4b8a965cf515a58079bb

¹⁴ https://www.virustotal.com/en/file/7f774d74ce93e1d1e22f994e4462a66fdebce344f6339f199ba52d0061a51441/analysis/ #TetheringGoogle

New VT generated after Save:
https://www.virustotal.com/graph/embed/gce38b19aa73543df9be5646f94c11750e07f192b156b42a4a0578b13a7b6e351

¹⁡ https://www.virustotal.com/en/file/e0c91ff65eed578501c23a364d4f14133fe4932cc06179ba1623ce565ebb61da/analysis/ #EchoLocate 😯

New VT generated after Save:
https://www.virustotal.com/graph/embed/geaf172b87c404be2a3aac1edd6d8d1a19806886d236c4146b4cdd403f8d0f5dd

¹⁢ https://www.virustotal.com/en/file/07584a29385d0259a1c0db88dbfed8deb8638c427734efaa7bceb84cf19d83c8/analysis/ #PrintSpooler

New VT generated after Save:

¹⁷ https://www.virustotal.com/en/file/965e49275f9f85486462c854b7ec12aa0f921e4db9d50a0094b3fe5394105dd3/analysis/ #MotoAppForecast

New VT generated after Save:

¹⁸ https://www.virustotal.com/en/file/4530ed14a588eec9d7886e175266233f703dc5c9926fed3453b342f3cee6af48/analysis/ #ModemStatsService

New VT generated after Save:

¹⁹ https://www.virustotal.com/en/file/9e1d120ab0830655c19acc919689a713fa2236f99e6283900a4a236e0ff8c8f4/analysis/ #Entitlement

New VT generated after Save:

²⁰ https://www.virustotal.com/en/file/42ba9493af33e5f02e01915a71974e68dd829cf7878b1308425519ae033a3ed9/analysis/ #DisplayCutoutEmularionDoubleOverlay

New VT generated after Save:

Β²ΒΉ https://www.virustotal.com/en/file/4344eb23ee58fc17fe6455312ce622a367d94b76d836e44b55a586ff768c904d/analysis/ #Wellbeing

New VT generated after Save:

Β²Β² https://www.virustotal.com/en/file/ec50ff27e808b207e3df513b33d55a2a320188da9c39a8f8d8777421c28fe8f2/analysis/ #ThreeCDeviceManagementBinary

New VT generated after Save:

Β²Β³ #GammaGroup #FinFisher #FinSpy #Finsky #infosec #detectionkit for #Android apps list & tools involved for this #investigation

ΒΉ Firewall AI -πŸ”Ž Blocking / Host Lists πŸ”
Β² VirusTotal App πŸ”ŽπŸ€³πŸ’»β˜£οΈπŸ”
Β³ VirusTotal Forensics ENV Read-Only Account πŸ”Žβ˜£οΈπŸ”
⁴ PCAPdroid App - PCAP files / Host Lists πŸ”ŽπŸ—’οΈπŸ”
⁡ Textpad or Text file editor - πŸ”ŽπŸ“πŸ”
⁢ Web2 + Web3 posting πŸ‘¨β€πŸ’»πŸ‘©β€πŸ’»πŸ’»πŸ–₯οΈπŸ’ΏπŸ’ΎπŸ–¨οΈπŸ‘€πŸŽ§πŸ‘‚

VirusTotal

VirusTotal

πŸ“’ For this month patch Tuesday we got Microsoft Signed Drivers Being Used maliciously, a print spooler privilege escalation, AD privileged escalation and a SPNEGO RCE and more.

The first one should really trigger your update schedule and don't forget to hunt for the #IoC published by Mandant, Sophos and others in the #security community.

#patchtuesday #microsoft #AD #printspooler

▫️https://msrc.microsoft.com/update-guide/vulnerability/ADV220005
▫️https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware
▫️https://news.sophos.com/en-us/2022/12/13/signed-driver-malware-moves-up-the-software-trust-chain/
▫️https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44681
▫️https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38042
▫️https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37958

Security Update Guide - Microsoft Security Response Center

Microsoft Patch Tuesday, February 2022 Edition - Microsoft today released software updates to plug security holes in its Windows o... https://krebsonsecurity.com/2022/02/microsoft-patch-tuesday-february-2022-edition/ #andrewcunningham #cve-2022-21989 #cve-2022-21996 #cve-2022-22005 #recordedfuture #immersivelabs #printspooler #timetopatch #arstechnica #gregwiseman #allanliska #kevinbreen #rapid7 #win32k
Microsoft Patch Tuesday, February 2022 Edition – Krebs on Security

Microsoft Patch Tuesday, February 2022 Edition – Krebs on Security