Category: Microsoft|Jul 5, 2019 | Author: Admin

You do not need to click a single link to be exposed to it

Share on

Pests that exploit Windows 10 holes.

itchannel_article_015.jpg

Pests that exploit Windows 10 holes.

Security researchers have uncovered a malware program that in many cases do not even require user input to attack vulnerable servers. Scientists warn of a new hole being exploited by malicious people to remotely control attacks.

Regardless of user interaction
The damage is known as Sodin ransomware and Sodinokibi or REvil. Initially, this was distributed by exploiting a vulnerability in Oracle Weblogic, while the malicious in recent times have jumped to a so-called "day-zero" vulnerability in Windows (CVE-2018-8453). There are security researchers from Kaspersky who report the news.

The hole provides those who perform the attacks with extended privileges that can further be used to take advantage of the processor's architecture to avoid being detected. Extra problematic is that it often does not require interaction on the part of the user.

Widespread worldwide
According to Kaspersky, the Sodin virus is widespread all over the world, but a clear predominance of virus cases was found in Asian areas, specifically Taiwan with just under 18 percent of cases, Hong Kong and South Korea by just under nine percent. However, it has spread across western parts of the world, including Germany, Italy, and Spain.

Sponsored Ads:

Comments:


Cloudflare-12-06-25.png

Google Cloud and Cloudflare hit by widespread service outages

Category: IT|Jun 12, 2025 | Author: Admin
Outlook-11-06-25.png

Microsoft Outlook to block more risky attachments used in attacks

Category: Microsoft|Jun 11, 2025 | Author: Admin
Google_headpic-10-06-25.png

Google patched bug leaking phone numbers tied to accounts

Category: Google|Jun 10, 2025 | Author: Admin
Vodafone-headpic-09-06-25.png

Germany fines Vodafone $51 million for privacy, security breaches

Category: IT|Jun 9, 2025 | Author: Admin
Microsoft_logo-08-06-25.png

Microsoft unveils free EU cybersecurity program for governments

Category: Microsoft|Jun 8, 2025 | Author: Admin
FBI__headpic-07-06-25.jpg

Play ransomware breached 900 victims, including critical orgs

Category: IT|Jun 7, 2025 | Author: Admin
Cisco-06-06-25.png

Cisco warns of ISE and CCP flaws with public exploit code

Category: IT|Jun 6, 2025 | Author: Admin
Tu-160_strategic_bomber_aircraft-05-06-25.png

Ukraine claims it hacked Tupolev, Russia’s strategic warplane maker

Category: General|Jun 5, 2025 | Author: Admin
salesforce-04-06-25.png

Hackers target Salesforce accounts in data extortion attacks

Category: Google|Jun 4, 2025 | Author: Admin
logo.png

Mozilla launches new system to detect Firefox crypto drainer add-ons

Category: IT|Jun 3, 2025 | Author: Admin
Google_Chrome-02-06-25.png

Google Chrome to distrust Chunghwa Telecom, Netlock certificates in August

Category: Google|Jun 2, 2025 | Author: Admin
Cisco-logo-01-06-25.png

Exploit details for max severity Cisco IOS XE flaw now public

Category: IT|Jun 1, 2025 | Author: Admin
firefox-header-31-05-25.png

Mozilla releases Firefox 139.0.1 update to fix artifacts on Nvidia GPUs

Category: IT|May 31, 2025 | Author: Admin
microsoft-notepad-30-05-25.png

Microsoft now testing Notepad text formatting in Windows 11

Category: Microsoft|May 30, 2025 | Author: Admin
Windows_11_headpic-29-05-25.png

Windows 11 might fail to start after installing KB5058405

Category: Microsoft|May 29, 2025 | Author: Admin
more