wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source: https:\/\/www.theverge.com\/2022\/7\/27\/23281215\/microsoft-austrian-commercial-spyware-dsirf-knotweed-intelligence-committee<\/a> Microsoft\u2019s security and threat intelligence teams have reportedly caught an Austrian company selling spyware based on previously unknown Windows exploits.<\/p>\n The new details were released on Wednesday in a technical blog post<\/a> from Microsoft\u2019s Threat Intelligence Center (MSTIC), published to coincide with written testimony given by the software company to a House Intelligence Committee hearing on commercial spyware and cyber surveillance.<\/p>\n The spyware developer \u2014 officially named DSIRF but which Microsoft tracks under the codename KNOTWEED \u2014 made spyware known as Subzero that was used to target law firms, banks, and consultancy firms in the UK, Austria, and Panama, Microsoft said. Analysis from MSTIC found that exploits used by DSIRF to compromise systems included a zero-day privilege escalation exploit for Windows and an Adobe Reader remote code execution attack. Microsoft says that the exploit being used by DSIRF has now been patched in a security update<\/a>.<\/p>\n DSIRF claims to help multinational corporations perform risk analysis and collect business intelligence, but Microsoft (and other local news reporting<\/a>) have linked the company to the sale of spyware used for unauthorized surveillance. Per Microsoft\u2019s blog post:<\/p>\n MSTIC has found multiple links between DSIRF and the exploits and malware used in these attacks. These include command-and-control infrastructure used by the malware directly linking to DSIRF, a DSIRF-associated GitHub account being used in one attack, a code signing certificate issued to DSIRF being used to sign an exploit, and other open-source news reports attributing Subzero to DSIRF.<\/em><\/p>\n<\/blockquote>\n The new information about Microsoft\u2019s tracking and mitigation of DSIRF \/ KNOTWEED\u2019s exploits was published at the same time as a written testimony<\/a> document submitted to the hearing on \u201cCombatting the Threats to U.S. National Security from the Proliferation of Foreign Commercial Spyware,\u201d held July 27th.<\/p>\n
\n
<\/br><\/code><\/p>\n\n