Frequent readers will recall that a pretty bad vulnerability in Windows was disclosed on Twitter last week that had the potential to be really bad if the bad guys stated to exploit that if Microsoft didn’t come up with a quick fix.
Guess what, the forces of evil have started to exploit it.
ESET’s Matthieu Faou has disclosed on Wednesday that a group of hackers called PowerPool is actively exploiting the bug to move from hijacked user accounts to full system administrator-level control of already infiltrated Windows boxes. Which of course is very, very, very bad. Because chances are if these guys are leveraging tis bug, there are others who are leveraging this bug as well. Thus Microsoft now more than ever needs to step up and address this before this becomes extraordinarily bad.
Like this:
Like Loading...
Related
This entry was posted on September 6, 2018 at 7:49 am and is filed under Commentary with tags Microsoft. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Recently Outed Windows Exploit Now Actively Being Used By Evil Doers
Frequent readers will recall that a pretty bad vulnerability in Windows was disclosed on Twitter last week that had the potential to be really bad if the bad guys stated to exploit that if Microsoft didn’t come up with a quick fix.
Guess what, the forces of evil have started to exploit it.
ESET’s Matthieu Faou has disclosed on Wednesday that a group of hackers called PowerPool is actively exploiting the bug to move from hijacked user accounts to full system administrator-level control of already infiltrated Windows boxes. Which of course is very, very, very bad. Because chances are if these guys are leveraging tis bug, there are others who are leveraging this bug as well. Thus Microsoft now more than ever needs to step up and address this before this becomes extraordinarily bad.
Share this:
Like this:
Related
This entry was posted on September 6, 2018 at 7:49 am and is filed under Commentary with tags Microsoft. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.