Windows Users Be Warned, 'Complete Hack' Flaw Used in Attacks!
CYBER NEWS

Windows Users Be Warned, ‘Complete Hack’ Flaw Used in Attacks!

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

A team of security experts discovered a ‘Complete Control’ weakness in the Windows operating system which can cause a wide variety of dangerous actions. The problem lies within vulnerable that is exploited by the device drivers and operating system allowing for malware code to be run on the host systems.




‘Complete Hack’ Windows Flaw Affects all Unpatched Windows Systems

According to a recent security report made by an independent security company almost all major hardware manufacturers have provided device drivers for the modern Windows operating system that can be vulnerable to a flaw known as the ‘Complete hack’. This is a weakness found in all modern iterations of the system and it appears that the problem has been identified across all major vendors: Toshiba, Huawei, Intel, ASUS, Nvidia and etc. The criminals when exploiting the code can allow for malware apps to gain kernel privileges thus allowing direct access to the affected host’s firmware. There have been verified intrusion that take advantage of the ‘Complete Hack” which will deploy the so-called NanoCore RAT (Remote Access Trojan).

Related: Remove NanoCore RAT from Your System

This is a very old and widely known weapon in the dark underground communities which can be used both against home users and corporate networks. Several versions of it have been available for a price under certain conditions and the newest versions of it are now free of charge. Wielding it computer hackers can cause much damage to the compromised systems. Some of the most common dangers include the following:

  • Script Launching — The virus can launch various scripts including ones with administrative privileges. They can launch both macros, PowerShell and command prompt actions.
  • Windows Registry Changes — The changing of the Wndows Registry values is related to the setting of the threat as persistent. This will set it to automatically start when the computer is launched.
  • Security Applications Bypass — The made infections can be used to scan for the presence of engines and applications that can effectively remove the defenses of the host.

All users are urged in order to patch their drivers and apply all latest Windows updates in order to protect themselves.

Avatar

Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

More Posts - Website

Follow Me:
TwitterGoogle Plus

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...