Diamond Member Pelican Press 0 Posted March 8 Diamond Member Share Posted March 8 This is the hidden content, please Sign In or Sign Up Detects, Patches Zero-Day Exploit Used to Target *********, Central ********* Users This is the hidden content, please Sign In or Sign Up has published an analysis of Knotweed, a private-sector offensive actor (PSOA) that developed and used a malware called Subzero to ******* Windows as well as This is the hidden content, please Sign In or Sign Up customers by using multiple zero-day exploits. The company intends to use the analysis to inform customers and industry partners to improve detection of these attacks. The company says that the exploit, which included the one that was patched in the July 2022 security update, was used to target customers in Europe and Central America. The This is the hidden content, please Sign In or Sign Up Threat Intelligence Center (MSTIC) and the This is the hidden content, please Sign In or Sign Up Security Response Center (MSRC) This is the hidden content, please Sign In or Sign Up the Austria-based PSOA which was carrying out limited and targeted attacks against ********* and Central ********* customers by using malware called Subzero. The malware can be used to hack targets’ phones, computers, networks as well as internet-connected devices. As per This is the hidden content, please Sign In or Sign Up , Knotweed was not only selling the hacking tools to third parties but also running targeted operations. The Windows-maker was able to spot two business models — access-as-a-service and hack-for-hire — associated with the “cyber mercenaries.” “In access-as-a-service, the PSOA sells full end-to-end hacking tools that can be used by the purchaser in operations, with the PSOA not involved in any targeting or running of the operation,” This is the hidden content, please Sign In or Sign Up said. In hack-for-hire, the actor runs the targeted operations based on the detailed information provided by the purchaser. This is the hidden content, please Sign In or Sign Up observed Knotweed-associated infrastructure in some attacks, suggesting a combination of both business tactics deployed by cyber **********. Citing a This is the hidden content, please Sign In or Sign Up of DSIRF (the name by which Knotweed is publicly known), This is the hidden content, please Sign In or Sign Up says MSTIC found the Subzero malware being deployed through a variety of methods, including zero-day exploits in Windows and This is the hidden content, please Sign In or Sign Up Reader, in 2021 and 2022. It says that the victims of the attacks include law firms, banks, and strategic consultancies in countries such as Austria, Panama, and the ******* Kingdom. As per the website, DSIRF offers data-driven intelligence services in the form of research and forensics to corporations. This is the hidden content, please Sign In or Sign Up says it will continue to monitor Knotweed’s activities “and implement protections for our customers.” The company is also encouraging quick deployment of the July 2022 This is the hidden content, please Sign In or Sign Up security updates to protect their systems against exploits. “ This is the hidden content, please Sign In or Sign Up Defender Antivirus and This is the hidden content, please Sign In or Sign Up Defender for Endpoint have also implemented detections against Knotweed’s malware and tools,” it said. Affiliate links may be automatically generated – see our ethics statement for details. This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up knotweed subzero malware zero day exploit windows This is the hidden content, please Sign In or Sign Up cybersecurity This is the hidden content, please Sign In or Sign Up ,knotweed,subzero,malware,zero day exploit,cybersecurity,windows, This is the hidden content, please Sign In or Sign Up # This is the hidden content, please Sign In or Sign Up #Detects #Patches #ZeroDay #Exploit #Target #********* #Central #********* #Users This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/422-microsoft-detects-patches-zero-day-exploit-used-to-target-european-central-american-users/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now