Windows Users Be Warned, 'Complete Hack' Flaw Used in Attacks!
CYBER NEWS

Windows Users Be Warned, ‘Complete HackFlaw Used in Attacks!

1 Star2 Stars3 Stars4 Stars5 Stars (Ingen stemmer endnu)
Loading ...

A team of security experts discovered a ‘Complete Controlweakness in the Windows operating system which can cause a wide variety of dangerous actions. The problem lies within vulnerable that is exploited by the device drivers and operating system allowing for malware code to be run on the host systems.




‘Complete HackWindows Flaw Affects all Unpatched Windows Systems

According to a recent security report made by an independent security company almost all major hardware manufacturers have provided device drivers for the modern Windows operating system that can be vulnerable to a flaw known as the ‘Complete hack’. This is a weakness found in all modern iterations of the system and it appears that the problem has been identified across all major vendors: Toshiba, Huawei, Intel, ASUS, Nvidia and etc. The criminals when exploiting the code can allow for malware apps to gain kernel privileges thus allowing direct access to the affected host’s firmware. There have been verified intrusion that take advantage of the ‘Complete Hackwhich will deploy the so-called NanoCore RAT (Remote Access Trojan).

Relaterede: Fjern NanoCore RAT fra dit system

This is a very old and widely known weapon in the dark underground communities which can be used both against home users and corporate networks. Several versions of it have been available for a price under certain conditions and the newest versions of it are now free of charge. Wielding it computer hackers can cause much damage to the compromised systems. Some of the most common dangers include the following:

  • Script Launching — The virus can launch various scripts including ones with administrative privileges. They can launch both macros, PowerShell and command prompt actions.
  • Windows Registry Ændringer — The changing of the Wndows Registry values is related to the setting of the threat as persistent. This will set it to automatically start when the computer is launched.
  • Sikkerhed Applikationer Bypass — The made infections can be used to scan for the presence of engines and applications that can effectively remove the defenses of the host.

All users are urged in order to patch their drivers and apply all latest Windows updates in order to protect themselves.

Avatar

Martin Beltov

Martin dimitterede med en grad i Publishing fra Sofia Universitet. Som en cybersikkerhed entusiast han nyder at skrive om de nyeste trusler og mekanismer indbrud.

Flere indlæg - Websted

Følg mig:
TwitterGoogle Plus

Efterlad en kommentar

Din e-mail-adresse vil ikke blive offentliggjort. Krævede felter er markeret *

Frist er opbrugt. Venligst genindlæse CAPTCHA.

Del på Facebook Del
Loading ...
Del på Twitter Tweet
Loading ...
Del på Google Plus Del
Loading ...
Del på Linkedin Del
Loading ...
Del på Digg Del
Del på Reddit Del
Loading ...
Del på Stumbleupon Del
Loading ...