๐‡๐Ž๐– ๐“๐Ž ๐ƒ๐ˆ๐’๐€๐๐‹๐„ ๐๐‘๐ˆ๐๐“ ๐’๐๐Ž๐Ž๐‹๐„๐‘ ๐Ž๐ ๐ƒ๐Ž๐Œ๐€๐ˆ๐ ๐‚๐Ž๐๐“๐‘๐Ž๐‹๐‹๐„๐‘๐’

Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.

Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.

The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.

But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so itโ€™s a good idea to disable Print Spooler on domain controllers.

๐Ÿ“บ Watch my YouTube video bellow on how to disable Print Spooler on Domain Controllers ๐Ÿ‘‡ ๐Ÿ‘‡
https://youtu.be/O80HHKdnbcQ

#cswlrd #printspooler #domaincontrollers #printnightmare #videotutorial

How to disable Print Spooler on Domain Controllers | Cybersecurity World

YouTube

Print Spooler is a service that takes care of print management. This includes, but is not limited to, managing printer drivers, scheduling print jobs, etc.

Print Spooler had a critical vulnerability in the past referred to as PrintNightmare (CVE-2021-34527). This vulnerability allowed attackers to execute code with administrator privileges.

The Print Spooler vulnerability was patched promptly, so if you have updated systems, the immediate risk associated with PrintNightmare is no longer present. And for normal systems, it is usually not feasible to disable Print Spooler. It would make printing impossible, which is usually not desirable.

But domain controllers are a critical part of Active Directory and need to be as secure as possible, which means blocking everything that is not needed. And you certainly should not need to print on domain controllers, so itโ€™s a good idea to disable Print Spooler on domain controllers.

๐Ÿ“บ ๐–๐š๐ญ๐œ๐ก ๐ญ๐ก๐ž ๐ซ๐ž๐œ๐จ๐ซ๐๐ข๐ง๐  ๐จ๐ง ๐๐š๐ญ๐ซ๐ž๐จ๐ง (English)
https://www.patreon.com/posts/how-to-disable-106780220?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link

๐Ÿ“บ ๐–๐š๐ญ๐œ๐ก ๐ญ๐ก๐ž ๐ซ๐ž๐œ๐จ๐ซ๐๐ข๐ง๐  ๐จ๐ง ๐…๐จ๐ซ๐ž๐ง๐๐จ๐ซ๐ฌ (Czech)
https://www.forendors.cz/p/39ff110621ce2c644f22b4208dbd07d4

๐Ÿ“บ ๐–๐š๐ญ๐œ๐ก ๐ญ๐ก๐ž ๐ซ๐ž๐œ๐จ๐ซ๐๐ข๐ง๐  ๐จ๐ง ๐‡๐ž๐ซ๐จ๐ก๐ž๐ซ๐จ (Czech)
https://herohero.co/cswrld/post/bceroxowdykkdetywahfshfeaca

๐Ÿ‘Share, like, comment!

#video #tutorial #cswrld #printspooler #printnightmare

How to Disable Print Spooler on Domain Controller

Learn how to disable Print Spooler service on Domain Controller and why it's crucial to do this in this tutorial.

ALI TAJRAN

Do you have Print Spooler enabled on your Domain Controllers? Do you know that the PrintNightmare critical vulnerability was related to the Print Spooler service?

Print Spooler should be disabled on Domain Controllers completely. You can easily disable it via GPO. #cybersecurity #tip #ad #dc #printspooler #printnightmare https://www.cswrld.com/2023/12/how-to-disable-print-spooler-on-domain-controllers/

Sometimes to just have to.... ๐Ÿดโ€โ˜ ๏ธ๐Ÿฆœ๐Ÿดโ€โ˜ ๏ธ๐Ÿฆœ The Day. /Sarcasm /SargasamSea ๐Ÿšข๐Ÿšค

#PrintSpooler ๐Ÿ–จ๏ธ โ˜ฃ๏ธ๐Ÿ“‰๐Ÿ˜ณ

VirusTotal

VirusTotal

Updated... Check out ยนโต ๐Ÿ˜ฏ

Trapped & Traced #GammsGroup #FinFisher 03-13-2023 from new AT&T Motorola Phone under ~$100 ๐Ÿ”Žโ˜ฃ๏ธ๐Ÿคณ๐Ÿ‘€๐Ÿ‘€๐Ÿ”

ยน From Virus Total Scanner: https://www.virustotal.com/en/file/9b53e0eeb35c173fd0c56b85812c0e59501a8588037dc92b8bac38e916ffdf09/analysis/ #VisualVoicemail

GammaGroup.com Visual voicemail FinFisher Module 03-13-2023

New VT generated after Save:
https://www.virustotal.com/graph/embed/g806efa51f1af4a638b20262b6931f8b0caab56f276834ca58b01afcc4605057e

ยฒ From Virus Total Scanner: https://www.virustotal.com/en/file/5387c9d5a137908cdc7820af51fea018c7b96dcce08a32a1fc20e9b6e64c8738/analysis/ #CarrierHub

GammaGroup From FinFisher CarrierHub 03-13-2023

New VT generated after Save:
https://www.virustotal.com/graph/embed/g13901560905741e48e926e061e01252bfa4ff6e8255f4156b56ca739c4ecaff3

ยณ From Virus Total Scanner:
https://www.virustotal.com/en/file/433321001cb907c775e4a06c1a2e36861b0d0355a74b4b9d0d1c2e48cce55d4c/analysis/ #MCMClient

GammaGroup FinFisher Module MCMClient 03-13-2023

New VT generated after Save:
https://www.virustotal.com/graph/embed/gf312aa3fc4174d9b88355ad755e6f24522e795ee3a304d3db07bb0ec7daa702b

โด From Virus Total Scanner: https://www.virustotal.com/en/file/ae22b44ad5381463912046aea7ec541352e22b02f2f0887864807b22473c92ca/analysis/ #MTPHost ๐Ÿ“ฌ Gmail backdoor Client

GammaGroup FinFisher Module MTPHost 03-13-2023

New VT generated after Save:
https://www.virustotal.com/graph/embed/g2579d64499654488a367fc14de7457bb6cd1b7489d0840cf8e0b61baa1d96bd6

โต
From Virus Total Scanner: https://www.virustotal.com/en/file/727ed61fe7e6476a4a7e08fcc16447fb74f6df317ea16f483efcf3da709cd4ba/analysis/ #MobileInstaller

GammaGroup FinFisher Module MobileInstaller 03-13-2023

New VT generated after Save:
https://www.virustotal.com/graph/embed/g5af535a69bba4ad6a8db6866f9e46075d42e2e8e0b424cfb93ec7bd473ff2180

โถ From Virus Total Scanner: https://www.virustotal.com/en/file/87b87fc66535c3415bffd4cd34c48d67054b9b4b90c4092fa535cb45ed5a0f41/analysis/ #InvisibleNet Motorola

GammaGroup FinFisher Module InvisibleNet 03-13-2023

New VT generated after Save:
https://www.virustotal.com/graph/embed/g01fa7fb9fb744f0d903e473bcd5fbad0a079d61992144621852170d09a81b6c9

โท https://www.virustotal.com/en/file/4530ed14a588eec9d7886e175266233f703dc5c9926fed3453b342f3cee6af48/analysis/ #ModemService

New VT generated after Save:
https://www.virustotal.com/graph/embed/gbc0a2d0323554e029d8b1285127ed47431904bfe3cb44ca88d0261d8111380e4

โธ https://www.virustotal.com/en/file/5fbac1a6ae81827f92cbfb84354b9901a641723047e859695edef2e6b7f57692/analysis/ #ComMediaTekPresence Presence.apk

New VT generated after Save:
https://www.virustotal.com/graph/embed/g310e8819ae574d76b7b9683f5991aa8a7664ec5b219a4b9697b9bbaed851f06d

โน https://www.virustotal.com/en/file/c5b90ca64afa869f498937564c569c1b70074245f27157371b7c3123b9565056/analysis/ #GooglePermissionsControllerOverlay

New VT generated after Save:
https://www.virustotal.com/graph/embed/g52ab9b1e8c044e95bbe068993ba35ba89e98cd251dea4aca991ee56cb33e177f

ยนโฐ https://www.virustotal.com/en/file/725af7257edc55088956844e4c8a2d048e7e6127750f5934b99f794582df7f50/analysis/ #PartnerBookmarksProvider

New VT generated after Save:
https://www.virustotal.com/graph/embed/gde904dfdd0a54557bca9f96743df9c3edee4440215e0407cb85f73314ba7c893

ยนยน https://www.virustotal.com/en/file/ceb772b69ad2b76cddba66217cdbeabdf5054a149ff400d705e69cd096ba301e/analysis/ #ONS

New VT generated after Save:
https://www.virustotal.com/graph/embed/gf6667bc42b3d41a2aaf1cfe4f41fa7c067c29e3ac0404ad89f945798f29ae593

ยนยฒ https://www.virustotal.com/en/file/3492a270ccfa240579562b85e23fa4fbfd64513f2d4e82cbb8205b76251f7794/analysis/ #MotoCellBroadcastServiceOverlay

New VT generated after Save:
https://www.virustotal.com/graph/embed/g231c5719476c4c7e8c5822b6b79a891f865d4d08eafb4874aa5cb5eeb9292a3e

ยนยณ https://www.virustotal.com/en/file/586c6882dbfeee773fbb11baae14a125c849f9af43e87184ffc1245761614250/analysis/ #TetheringResOverlay

New VT generated after Save:
https://www.virustotal.com/graph/embed/g3ed40d5ce5054c3d817e9d97ef299f5ce2ea59501dfa4b8a965cf515a58079bb

ยนโด https://www.virustotal.com/en/file/7f774d74ce93e1d1e22f994e4462a66fdebce344f6339f199ba52d0061a51441/analysis/ #TetheringGoogle

New VT generated after Save:
https://www.virustotal.com/graph/embed/gce38b19aa73543df9be5646f94c11750e07f192b156b42a4a0578b13a7b6e351

ยนโต https://www.virustotal.com/en/file/e0c91ff65eed578501c23a364d4f14133fe4932cc06179ba1623ce565ebb61da/analysis/ #EchoLocate ๐Ÿ˜ฏ

New VT generated after Save:
https://www.virustotal.com/graph/embed/geaf172b87c404be2a3aac1edd6d8d1a19806886d236c4146b4cdd403f8d0f5dd

ยนโถ https://www.virustotal.com/en/file/07584a29385d0259a1c0db88dbfed8deb8638c427734efaa7bceb84cf19d83c8/analysis/ #PrintSpooler

New VT generated after Save:

ยนโท https://www.virustotal.com/en/file/965e49275f9f85486462c854b7ec12aa0f921e4db9d50a0094b3fe5394105dd3/analysis/ #MotoAppForecast

New VT generated after Save:

ยนโธ https://www.virustotal.com/en/file/4530ed14a588eec9d7886e175266233f703dc5c9926fed3453b342f3cee6af48/analysis/ #ModemStatsService

New VT generated after Save:

ยนโน https://www.virustotal.com/en/file/9e1d120ab0830655c19acc919689a713fa2236f99e6283900a4a236e0ff8c8f4/analysis/ #Entitlement

New VT generated after Save:

ยฒโฐ https://www.virustotal.com/en/file/42ba9493af33e5f02e01915a71974e68dd829cf7878b1308425519ae033a3ed9/analysis/ #DisplayCutoutEmularionDoubleOverlay

New VT generated after Save:

ยฒยน https://www.virustotal.com/en/file/4344eb23ee58fc17fe6455312ce622a367d94b76d836e44b55a586ff768c904d/analysis/ #Wellbeing

New VT generated after Save:

ยฒยฒ https://www.virustotal.com/en/file/ec50ff27e808b207e3df513b33d55a2a320188da9c39a8f8d8777421c28fe8f2/analysis/ #ThreeCDeviceManagementBinary

New VT generated after Save:

ยฒยณ #GammaGroup #FinFisher #FinSpy #Finsky #infosec #detectionkit for #Android apps list & tools involved for this #investigation

ยน Firewall AI -๐Ÿ”Ž Blocking / Host Lists ๐Ÿ”
ยฒ VirusTotal App ๐Ÿ”Ž๐Ÿคณ๐Ÿ’ปโ˜ฃ๏ธ๐Ÿ”
ยณ VirusTotal Forensics ENV Read-Only Account ๐Ÿ”Žโ˜ฃ๏ธ๐Ÿ”
โด PCAPdroid App - PCAP files / Host Lists ๐Ÿ”Ž๐Ÿ—’๏ธ๐Ÿ”
โต Textpad or Text file editor - ๐Ÿ”Ž๐Ÿ“๐Ÿ”
โถ Web2 + Web3 posting ๐Ÿ‘จโ€๐Ÿ’ป๐Ÿ‘ฉโ€๐Ÿ’ป๐Ÿ’ป๐Ÿ–ฅ๏ธ๐Ÿ’ฟ๐Ÿ’พ๐Ÿ–จ๏ธ๐Ÿ‘€๐ŸŽง๐Ÿ‘‚

VirusTotal

VirusTotal

๐Ÿ“ข For this month patch Tuesday we got Microsoft Signed Drivers Being Used maliciously, a print spooler privilege escalation, AD privileged escalation and a SPNEGO RCE and more.

The first one should really trigger your update schedule and don't forget to hunt for the #IoC published by Mandant, Sophos and others in the #security community.

#patchtuesday #microsoft #AD #printspooler

โ–ซ๏ธhttps://msrc.microsoft.com/update-guide/vulnerability/ADV220005
โ–ซ๏ธhttps://www.mandiant.com/resources/blog/hunting-attestation-signed-malware
โ–ซ๏ธhttps://news.sophos.com/en-us/2022/12/13/signed-driver-malware-moves-up-the-software-trust-chain/
โ–ซ๏ธhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44681
โ–ซ๏ธhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38042
โ–ซ๏ธhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37958

Security Update Guide - Microsoft Security Response Center

Microsoft Patch Tuesday, February 2022 Edition - Microsoft today released software updates to plug security holes in its Windows o... https://krebsonsecurity.com/2022/02/microsoft-patch-tuesday-february-2022-edition/ #andrewcunningham #cve-2022-21989 #cve-2022-21996 #cve-2022-22005 #recordedfuture #immersivelabs #printspooler #timetopatch #arstechnica #gregwiseman #allanliska #kevinbreen #rapid7 #win32k
Microsoft Patch Tuesday, February 2022 Edition โ€“ Krebs on Security

Microsoft Patch Tuesday, February 2022 Edition โ€“ Krebs on Security