Affected by the Microsoft 'PrintNightmare' Vulnerability?
Do this: Microsoft has released guidance for CVE-2021-34527 however, these updates do not protect against the PrintNightmare vulnerability universally. Microsoft also recommends to:
- Stop and disable the Print Spooler service via PowerShell:
- Stop-Service -Name Spooler -Force
- Set-Service -Name Spooler -StartupType Disabled.
- Disable inbound remote printing through Group Policy by disabling the “Allow Print Spooler to accept client connections” policy to block remote attacks, and then restart the system. The system will no longer function as a print server, but local printing to a directly attached device will still be possible.
Additional Info: https://threatpost.com/microsoft-emergency-patch-printnightmare/167578/
Affected by the Kaseya Attack?
Do this: The FBI and CISA recommends shutting down your VSA servers immediately, reporting your compromise to the FBI at ic3.gov, and performing the following mitigation steps as soon as possible:
- Download the Kaseya VSA Detection Tool. This tool analyzes a system (either VSA server or managed endpoint) and determines whether any indicators of compromise (IoC) are present.
- Enable and enforce multi-factor authentication (MFA) on every single account that is under the control of the organization, and—to the maximum extent possible—enable and enforce MFA for customer-facing services.
- Implement allow listing to limit communication with remote monitoring and management (RMM) capabilities to known IP address pairs, and/or
- Place administrative interfaces of RMM behind a virtual private network (VPN) or a firewall on a dedicated administrative network.
Additional Info: https://threatpost.com/kaseya-attack-fallout/167541/
Send Us Your Comments
What did you think of this article? Send us a note to let us know what you liked, would like to see more of, or what we can do better. And don't be surprised if we reach back out with a small 'thank you' gift for your feedback.