Windows Users Be Warned, 'Complete Hack' Flaw Used in Attacks!

Windows Users Be Warned, ‘Complete HackFlaw Used in Attacks!

1 Star2 Stars3 Stars4 Stars5 Stars (Sin clasificación todavía)
Cargando ...

A team of security experts discovered a ‘Complete Controlweakness in the Windows operating system which can cause a wide variety of dangerous actions. The problem lies within vulnerable that is exploited by the device drivers and operating system allowing for malware code to be run on the host systems.

‘Complete HackWindows Flaw Affects all Unpatched Windows Systems

According to a recent security report made by an independent security company almost all major hardware manufacturers have provided device drivers for the modern Windows operating system that can be vulnerable to a flaw known as the ‘Complete hack’. This is a weakness found in all modern iterations of the system and it appears that the problem has been identified across all major vendors: Toshiba, Huawei, Intel, ASUS, Nvidia and etc. The criminals when exploiting the code can allow for malware apps to gain kernel privileges thus allowing direct access to the affected host’s firmware. There have been verified intrusion that take advantage of the ‘Complete Hackwhich will deploy the so-called NanoCore RAT (Remote Access Trojan).

Relacionado: Retire Nanocore RAT de su sistema

This is a very old and widely known weapon in the dark underground communities which can be used both against home users and corporate networks. Several versions of it have been available for a price under certain conditions and the newest versions of it are now free of charge. Wielding it computer hackers can cause much damage to the compromised systems. Some of the most common dangers include the following:

  • Script Launching — The virus can launch various scripts including ones with administrative privileges. They can launch both macros, PowerShell and command prompt actions.
  • Registro de Cambios de Windows — The changing of the Wndows Registry values is related to the setting of the threat as persistent. This will set it to automatically start when the computer is launched.
  • Aplicaciones de Seguridad de bypass — The made infections can be used to scan for the presence of engines and applications that can effectively remove the defenses of the host.

All users are urged in order to patch their drivers and apply all latest Windows updates in order to protect themselves.


Martin Beltov

Martin se graduó con un título en Edición de la Universidad de Sofía. Como un entusiasta de la seguridad cibernética que le gusta escribir sobre las últimas amenazas y mecanismos de intrusión.

Más Mensajes - Sitio web

Gorjeogoogle Plus

Dejar un comentario

Su dirección de correo electrónico no será publicada. Los campos necesarios están marcados *

Se agotó el tiempo límite. Vuelve a cargar de CAPTCHA.

Compartir en Facebook Compartir
Cargando ...
Compartir en Twitter Pío
Cargando ...
Compartir en Google Plus Compartir
Cargando ...
Compartir en Linkedin Compartir
Cargando ...
Compartir en Digg Compartir
Compartir en Reddit Compartir
Cargando ...
Compartir en Stumbleupon Compartir
Cargando ...