ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

1.5 billion Windows computers potentially affected by unpatched 0-day exploit | #CyberSecurity #Awareness

1.5 billion Windows computers potentially affected by unpatched 0-day exploit | #CyberSecurity #Awareness | ICT Security-Sécurité PC et Internet | Scoop.it
Information security bods at Trustwave have found a zero-day exploit affecting all versions of Microsoft's OS Windows, all the way from Windows 2000 up to a fully patched version of Windows 10 including all server editions. 

It estimates that this affects 1.5 billion computers around the world.

The company provides threat intelligence services and regularly monitors several forums, and it is through this it discovered the exploit which was found on a Russian speaking forum and is currently being offered for sale for £62,000 ($US 90,000).

Trustwave cautioned that there is currently no fix for the exploit and has recommended Windows users stay vigilant for phishing emails. In addition, it has also issued a more general warning about the rise of malware-as-a-service (MaaS). 

Ziv Mador, VP of security research at Trustwave, told SCMagazineUK.com, “This is a very serious exploit. From what we've seen in the past, exploits of this type tend to have somewhere in the region of a 10 percent success rate which spells bad news all around.”

According Trustwave, Microsoft has been notified of the zero day offering and is continuing to monitor the situation.

 

Gust MEES's insight:

Information security bods at Trustwave have found a zero-day exploit affecting all versions of Microsoft's OS Windows, all the way from Windows 2000 up to a fully patched version of Windows 10 including all server editions. 

It estimates that this affects 1.5 billion computers around the world.

The company provides threat intelligence services and regularly monitors several forums, and it is through this it discovered the exploit which was found on a Russian speaking forum and is currently being offered for sale for £62,000 ($US 90,000).

Trustwave cautioned that there is currently no fix for the exploit and has recommended Windows users stay vigilant for phishing emails. In addition, it has also issued a more general warning about the rise of malware-as-a-service (MaaS). 

Ziv Mador, VP of security research at Trustwave, told SCMagazineUK.com, “This is a very serious exploit. From what we've seen in the past, exploits of this type tend to have somewhere in the region of a 10 percent success rate which spells bad news all around.”

According Trustwave, Microsoft has been notified of the zero day offering and is continuing to monitor the situation.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Microsoft patches critical Windows zero-day bug that hackers are now exploiting

Microsoft patches critical Windows zero-day bug that hackers are now exploiting | ICT Security-Sécurité PC et Internet | Scoop.it
Microsoft today delivered six security updates to patch 11 vulnerabilities in Windows, Internet Explorer, Office and several other products, including one bug that attackers are already exploiting.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Microsoft warns users about 0-day behind PowerPoint attacks

Microsoft warns users about 0-day behind PowerPoint attacks | ICT Security-Sécurité PC et Internet | Scoop.it

Might put out patch in update, might chuck it out sooner.

The bug (CVE-2014-6352) can be triggered by sending a specially crafted Microsoft Office files to intended targets before tricking them into opening the booby-trapped files. "Currently, attacks using PowerPoint files are known to exist, but all Office file types can be used to carry out this attack," Jonathan Leopando, a technical communications staffer at Trend Micro, warns in a blog post.


Gust MEES's insight:

The bug (CVE-2014-6352) can be triggered by sending a specially crafted Microsoft Office files to intended targets before tricking them into opening the booby-trapped files. "Currently, attacks using PowerPoint files are known to exist, but all Office file types can be used to carry out this attack," Jonathan Leopando, a technical communications staffer at Trend Micro, warns in a blog post.

No comment yet.