wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/04\/12\/microsoft-windows-zero-day-ransomware\/<\/a><\/br> Microsoft has patched a zero-day vulnerability affecting all supported versions of Windows, which researchers say hackers exploited to launch ransomware attacks.<\/p>\n Microsoft said<\/a> in a security alert on Tuesday that an attacker who successfully exploited the vulnerability in the Windows Common Log File System (CLFS) could gain full access to an unpatched system. Microsoft confirmed that attackers were actively exploiting the vulnerability.<\/p>\n Russian cybersecurity company Kaspersky says<\/a> the flaw was used to deploy Nokoyawa ransomware, predominantly targeting Windows servers belonging to small and medium-sized businesses based in the Middle East, North America and Asia.<\/p>\n In its analysis of the vulnerability, Kaspersky says that the zero-day stands out because it is actively exploited by financially motivated cyber criminals.<\/p>\n \u201cCyber crime groups are becoming increasingly more sophisticated using zero-day exploits in their attacks,\u201d said Boris Larin, lead security researcher at Kaspersky. \u201cPreviously, they were primarily a tool of APT actors, but now cyber criminals have the resources to acquire zero-days and routinely use them in attacks.\u201d<\/p>\n Nokoyawa was first observed in February 2022 and is believed to be connected to the now-defunct Hive ransomware gang<\/a>, which law enforcement infiltrated and shut down<\/a> in January. \u201cThe two families share some striking similarities in their attack chain, from the tools used to the order in which they execute various steps,\u201d Trend Micro said<\/a> in an analysis at the time.<\/p>\n The Nokoyawa malware encrypts files on systems it compromises, but the operators also claim to steal valuable information that they threaten to leak unless a ransom is paid.<\/p>\n U.S. cybersecurity agency CISA added the newly patched Windows vulnerability to its known exploited vulnerabilities catalog<\/a> and urged federal agencies to update systems before May 2.<\/p>\n Microsoft fixed almost 100 flaws as part of its regularly scheduled Patch Tuesday update. The tech giant also fixed a remote code execution flaw that could allow a remote, unauthenticated attacker to run their code with elevated privileges on affected servers with Microsoft\u2019s Message Queuing service enabled.<\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nMicrosoft patches Windows zero-day bug used in ransomware attacks<\/br>
\n2023-04-12 21:48:57<\/br><\/p>\n