Hackers publish Windows attack code
Immediately after making an unusual patch last week, Microsoft on October 28 has advised its customers that the attack code of the Windows operating system vulnerability is caused by hackers and used in Traditional attacks.
Mr. Mike Reavey, Director of the Microsoft Security Incident Response Center (MSRC), wrote in his department's blog: 'We have identified the exploit code MS08-067 of Microsoft. , this executable code is available online. It is the code to execute remote control hijacking to machines running Windows Server 2003, Windows XP and Windows 2000 '.
Microsoft also publicly announced this recommendation on its website and treated it as the latest threat.
As soon as the patch was released, a Microsoft spokesperson declined to point out where Microsoft found the attack code. He only said that this latest recommendation was made after Microsoft was warned about a public code that was provided in a detailed, reliable way. He also confirmed that this recommendation was extracted from the public code on a website rather than from a proprietary security test application.
Just a day earlier, MSRC spokesman Christopher Budd said: 'We know that someone is developing a reliable code to exploit those errors. We know the discussion of the code is being made public on a website, but our analysts show that the code is often the result of a denial of service. ' He also concluded that: 'Until now, we have not seen any evidence that the code is public'.
Earlier, Microsoft announced it had discovered the vulnerability after several attacks were considered infected by an information stealing software called Trojan Gimmiv or Win32 / MS08067.gen! .
It is not clear whether this publicly-disclosed code is the actual code used in previous attacks. However, the MSRC Reavey department director repeated that Microsoft confirmed that attacks still exist on computers that have not been updated. But the attacks were limited and will be determined, even though the exploit code is publicly available. Users who have updated the latest patch MS08-067 last week will be safe from these attacks.
This security threat bulletin has been posted on the Microsoft website and the patch can be downloaded for free for licensed Windows operating system users.
You should read it
- Top 10 attack techniques on the web
- Hackers use banks as a starting point for phishing attacks
- Microsoft has a group of 'elite' hackers that specialize in attacking Windows to keep the operating system safe
- Air New Zealand hacked, customer information is at risk of falling into the hands of hackers
- The alarming increase in the number of attacks targeted at IoT devices
- White-hat hackers, from their passion to the job to earn money, and little-known things
- Why do hackers hate Sony?
- Classify hackers and career opportunities for true hackers
May be interested
- Hackers can use Ransomware to attack and control robotsioactive, an american security consulting firm, recently launched an attack to prove that hackers can not only use ransomware to attack computers to make ransom, but also attack complex robot systems. are being used in many areas.
- Four Windows vulnerabilities can be exploited in the perfect attack chainthe vulnerabilities include: 2 remote code execution errors, 1 privilege escalation error and 1 secure boot security feature bypass error. under ideal conditions, hackers can combine 4 vulnerabilities to form a perfect attack chain.
- How does malicious code break into user PC (Part 2)the previous article detailed how aggressive hackers infect malicious code and can see that these are extremely dangerous attack techniques.
- What is SS7 attack? What can hackers use it for?an ss7 attack is a very dangerous attack method. an ss7 attack can be used to bypass two-factor authentication. so what specifically is the ss7 attack? what can a hacker do with an ss7 attack?
- Vista suffered the first attackjust a week after the launch of microsoft windows vista suffered the first attack by hackers. however, vista is just a victim of abuse in this attack, not a target.
- Discovering a large-scale APT attack into Vietnam, users need to quickly download the malicious toolthe department of information security recommends that users urgently download this malicious code-checking and removal tool on ais.gov.vn; vncert.vn was built and provided by the department.
- The source code of Windows 10 is revealed by hackers on the networkaccording to register, microsoft's exclusive, proprietary windows 10 code compiler has been leaked online.
- What is Smurf Attack? How to prevent Smurf Attack?smurf attack is a type of ddos attack, hackers will attack the victim's server by sending fake ip requests using internet control message protocol to create fake accesses that overload the target device or network.
- Test knowledge about hackingthis is a short educational questioning package that aims to give you some techniques that hackers use and help you protect your code from attack. you will be provided with the correct answer with detailed explanation after you have completed all the questions.
- How to protect your computer from Thunderspy attackthunderspy is a security attack technique on hardware devices and the article will guide tips against it.