Superseded Microsoft Patches a Zero-Day Flaw in Windows that is Utilised in Ransomware Attacks.

In this article, I will tell you about Superseded Microsoft patches. Microsoft has patched a zero-day vulnerability affecting all supported versions of Windows, which researchers say hackers exploited to launch ransomware attacks.

Microsoft said in a security alert on Tuesday that an attacker who successfully exploited the vulnerability in the Windows Common Log File System (CLFS) could gain full access to an unpatched system. Microsoft confirmed that attackers were actively exploiting the vulnerability.

Russian cybersecurity company Kaspersky says the flaw was used to deploy Nokoyawa ransomware, predominantly targeting Windows servers belonging to small and medium-sized businesses based in the Middle East, North America, and Asia.

Also Read  Privacy Assistant Jumbo is tearing Down its Paywall

In its analysis of the vulnerability, Kaspersky says that the zero-day stands out because it is actively exploited by financially motivated cyber criminals.

Cybercrime groups are becoming increasingly more sophisticated using zero-day exploits in their attacks,” said Boris Larin, a lead security researcher at Kaspersky. “Previously, they were primarily a tool of APT actors, but now cybercriminals have the resources to acquire zero-days and routinely use them in attacks.”

Also Read  Google Fi Hack victim was the Coinbase 2FA app taken over by hackers

Nokoyawa was first observed in February 2022 and is believed to be connected to the now-defunct Hive ransomware gang, which law enforcement infiltrated and shut down in January. “The two families share some striking similarities in their attack chain, from the tools used to the order in which they execute various steps,” Trend Micro said in an analysis at the time.

Superseded Microsoft patches a Zero-Day Flaw in Windows that is Utilised in Ransomware Attacks.

The Nokoyawa malware encrypts files on systems it compromises, but the operators also claim to steal valuable information that they threaten to leak unless a ransom is paid.

Also Read  Legal Juggernaut Proskauer Disclosed Private M&A information from clients.

U.S. cybersecurity agency CISA added the newly patched Windows vulnerability to its known exploited vulnerabilities catalog and urged federal agencies to update systems before May 2.

Microsoft fixed almost 100 flaws as part of its regularly scheduled Patch Tuesday update. The tech giant also fixed a remote code execution flaw that could allow a remote, unauthenticated attacker to run their code with elevated privileges on affected servers with Microsoft’s Message Queuing service enabled.


Sunil Kumar writes about smartphones and laptops for Gadgets360TechNews, out of Delhi. He is the Deputy Editor (Reviews) at Gadgets360TechNews. He has frequently written about the smartphone and PC industry and also has an interest in photography.

Sharing Is Caring:

Leave a Comment