Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ 0-Days Sold By Austrian Firm Used To Hack Windows Users, Microsoft Says

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š 0-Days Sold By Austrian Firm Used To Hack Windows Users, Microsoft Says


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: tech.slashdot.org

Longtime Slashdot reader HnT shares a report from Ars Technica: Microsoft said on Wednesday that an Austria-based company named DSIRF used multiple Windows and Adobe Reader zero-days to hack organizations located in Europe and Central America. Members of the Microsoft Threat Intelligence Center, or MSTIC, said they have found Subzero malware infections spread through a variety of methods, including the exploitation of what at the time were Windows and Adobe Reader zero-days, meaning the attackers knew of the vulnerabilities before Microsoft and Adobe did. Targets of the attacks observed to date include law firms, banks, and strategic consultancies in countries such as Austria, the UK, and Panama, although those aren't necessarily the countries in which the DSIRF customers who paid for the attack resided. "MSTIC has found multiple links between DSIRF and the exploits and malware used in these attacks," Microsoft researchers wrote. "These include command-and-control infrastructure used by the malware directly linking to DSIRF, a DSIRF-associated GitHub account being used in one attack, a code signing certificate issued to DSIRF being used to sign an exploit, and other open source news reports attributing Subzero to DSIRF." Referring to DSIRF using the work KNOTWEED, Microsoft researchers wrote: In May 2022, MSTIC found an Adobe Reader remote code execution (RCE) and a 0-day Windows privilege escalation exploit chain being used in an attack that led to the deployment of Subzero. The exploits were packaged into a PDF document that was sent to the victim via email. Microsoft was not able to acquire the PDF or Adobe Reader RCE portion of the exploit chain, but the victim's Adobe Reader version was released in January 2022, meaning that the exploit used was either a 1-day exploit developed between January and May, or a 0-day exploit. Based on KNOTWEED's extensive use of other 0-days, we assess with medium confidence that the Adobe Reader RCE is a 0-day exploit. The Windows exploit was analyzed by MSRC, found to be a 0-day exploit, and then patched in July 2022 as CVE-2022-22047. Interestingly, there were indications in the Windows exploit code that it was also designed to be used from Chromium-based browsers, although we've seen no evidence of browser-based attacks. The CVE-2022-22047 vulnerability is related to an issue with activation context caching in the Client Server Run-Time Subsystem (CSRSS) on Windows. At a high level, the vulnerability could enable an attacker to provide a crafted assembly manifest, which would create a malicious activation context in the activation context cache, for an arbitrary process. This cached context is used the next time the process spawned. CVE-2022-22047 was used in KNOTWEED related attacks for privilege escalation. The vulnerability also provided the ability to escape sandboxes (with some caveats, as discussed below) and achieve system-level code execution. The exploit chain starts with writing a malicious DLL to disk from the sandboxed Adobe Reader renderer process. The CVE-2022-22047 exploit was then used to target a system process by providing an application manifest with an undocumented attribute that specified the path of the malicious DLL. Then, when the system process next spawned, the attribute in the malicious activation context was used, the malicious DLL was loaded from the given path, and system-level code execution was achieved. Microsoft recommends a number of security considerations to help mitigate this attack, including patching CVE-2022-22047, updating Microsoft Defender Antivirus to update 1.371.503.0 or later, and enabling multifactor authentication (MFA).

Read more of this story at Slashdot.

...



๐Ÿ“Œ Fitbit Says Data of Its 28 Million Users Will Not Be Sold Or Used For Google Ads


๐Ÿ“ˆ 31.1 Punkte

๐Ÿ“Œ Austrian foreign ministry: 'State actor' hack on government IT systems is over


๐Ÿ“ˆ 27.6 Punkte

๐Ÿ“Œ Firm Says Wawa Customers' Hacked Credit Card Info Being Sold


๐Ÿ“ˆ 27.49 Punkte

๐Ÿ“Œ Hacky hack on whack 'Hacky Hack Hack' Mac chaps hack attack rap cut some slack


๐Ÿ“ˆ 25.7 Punkte

๐Ÿ“Œ Microsoft Uncovers Austrian Company Exploiting Windows and Adobe Zero-Day Exploits


๐Ÿ“ˆ 24.97 Punkte

๐Ÿ“Œ Equifax Says Execs Unaware of Hack When They Sold Stock


๐Ÿ“ˆ 24.67 Punkte

๐Ÿ“Œ Grand Theft Auto 5 has sold around 190 million copies, Red Dead Redemption 2 over 57 million copies sold


๐Ÿ“ˆ 24.48 Punkte

๐Ÿ“Œ Hyundai Sold More Creta Than Maruti Sold Vitara Brezza, Hereโ€™s Why


๐Ÿ“ˆ 24.48 Punkte

๐Ÿ“Œ Microsoft Goes After Chinese Firm That Hacked Xbox Accounts, Sold FIFA Currency


๐Ÿ“ˆ 23.41 Punkte

๐Ÿ“Œ Mysterious MMS Fingerprint Hack Used By Spyware Firm NSO Group Revealed


๐Ÿ“ˆ 23.25 Punkte

๐Ÿ“Œ Mysterious โ€˜MMS Fingerprintโ€™ Hack Used by Spyware Firm NSO Group Revealed


๐Ÿ“ˆ 23.25 Punkte

๐Ÿ“Œ Former WSJ Reporter Says Law Firm Used Indian Hackers To Sabotage His Career


๐Ÿ“ˆ 22.83 Punkte

๐Ÿ“Œ Trump campaign used UK firm to access data of 50m Facebook users video


๐Ÿ“ˆ 22.1 Punkte

๐Ÿ“Œ Smart Home Tech Exposed by Simple MQTT Hack says Security Firm Avast


๐Ÿ“ˆ 21.67 Punkte

๐Ÿ“Œ Japan Firm Says $32 Million Missing in Cryptocurrency Hack


๐Ÿ“ˆ 21.67 Punkte

๐Ÿ“Œ Cyber-security firm doxxes hacker who sold MySpace and Dropbox databases in 2016


๐Ÿ“ˆ 21.48 Punkte

๐Ÿ“Œ Cyber-security firm doxxes hacker who sold MySpace and Dropbox databases in 2016


๐Ÿ“ˆ 21.48 Punkte

๐Ÿ“Œ FireEye sold to McAfee's new owners for $1.2bn as Mandiant split into standalone firm again


๐Ÿ“ˆ 21.48 Punkte

๐Ÿ“Œ Cyber-security firm doxxes hacker who sold MySpace and Dropbox databases in 2016 | ZDNet


๐Ÿ“ˆ 21.48 Punkte

๐Ÿ“Œ Cyber-security firm doxxes hacker who sold MySpace and Dropbox databases in 2016 | ZDNet


๐Ÿ“ˆ 21.48 Punkte

๐Ÿ“Œ Austrian hotel experiences โ€˜ransomware of things attackโ€™


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ IoT Ransomware Against Austrian Hotel


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ Internet an Board bei Austrian Airlines


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ Austrian Partner of the Year 2016: Fortinet ehrt seine besten Reseller


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ Neo-Nazi DailyStormer Booted Off By Austrian Domain Registrar


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ Austrian Standards zertifiziert Datenschutzbeauftragte


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ DDoS Attack Takes Down Austrian Parliament Website, Turkish Hackers Claim Attack


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ Hackers find life-threatening vulnerabilities in Austrian ski lift control unit


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ Sicherheit - Security-Panne: Austrian Airlines zeigte Nutzerinfos fremder User an


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ WK Wien: Austrian Cloud ist bereits Realitรคt


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ Austrian Airlines will Drohnen zum Check von Flugzeugen einsetzen


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ Lufthansa und Austrian: Internetzugang kostet zwischen 3 und 12 Euro je Kurzstrecke


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ Facebook Must Delete Hate Postings Worldwide, Rules Austrian Court


๐Ÿ“ˆ 21.18 Punkte

๐Ÿ“Œ Lock Out: the Austrian Hotel That Was Hacked Four Times


๐Ÿ“ˆ 21.18 Punkte











matomo