Jump to content
  • Sign Up
×
×
  • Create New...

Microsoft Detects, Patches Zero-Day Exploit Used to Target European, Central American Users


Recommended Posts

  • Diamond Member

This is the hidden content, please
Detects, Patches Zero-Day Exploit Used to Target *********, Central ********* Users

This is the hidden content, please
has published an analysis of Knotweed, a private-sector offensive actor (PSOA) that developed and used a malware called Subzero to ******* Windows as well as
This is the hidden content, please
customers by using multiple zero-day exploits. The company intends to use the analysis to inform customers and industry partners to improve detection of these attacks. The company says that the exploit, which included the one that was patched in the July 2022 security update, was used to target customers in Europe and Central America.

The

This is the hidden content, please
Threat Intelligence Center (MSTIC) and the
This is the hidden content, please
Security Response Center (MSRC)
This is the hidden content, please
the Austria-based PSOA which was carrying out limited and targeted attacks against ********* and Central ********* customers by using malware called Subzero. The malware can be used to hack targets’ phones, computers, networks as well as internet-connected devices.

As per

This is the hidden content, please
, Knotweed was not only selling the hacking tools to third parties but also running targeted operations. The Windows-maker was able to spot two business models — access-as-a-service and hack-for-hire — associated with the “cyber mercenaries.”

“In access-as-a-service, the PSOA sells full end-to-end hacking tools that can be used by the purchaser in operations, with the PSOA not involved in any targeting or running of the operation,”

This is the hidden content, please
said. In hack-for-hire, the actor runs the targeted operations based on the detailed information provided by the purchaser.
This is the hidden content, please
observed Knotweed-associated infrastructure in some attacks, suggesting a combination of both business tactics deployed by cyber **********.

Citing a

This is the hidden content, please
of DSIRF (the name by which Knotweed is publicly known),
This is the hidden content, please
says MSTIC found the Subzero malware being deployed through a variety of methods, including zero-day exploits in Windows and
This is the hidden content, please
Reader, in 2021 and 2022. It says that the victims of the attacks include law firms, banks, and strategic consultancies in countries such as Austria, Panama, and the ******* Kingdom.

As per the website, DSIRF offers data-driven intelligence services in the form of research and forensics to corporations.

This is the hidden content, please
says it will continue to monitor Knotweed’s activities “and implement protections for our customers.” The company is also encouraging quick deployment of the July 2022
This is the hidden content, please
security updates to protect their systems against exploits. “
This is the hidden content, please
Defender Antivirus and
This is the hidden content, please
Defender for Endpoint have also implemented detections against Knotweed’s malware and tools,” it said.


Affiliate links may be automatically generated – see our ethics statement for details.



This is the hidden content, please

This is the hidden content, please
knotweed subzero malware zero day exploit windows
This is the hidden content, please
cybersecurity
This is the hidden content, please
,knotweed,subzero,malware,zero day exploit,cybersecurity,windows,
This is the hidden content, please

#
This is the hidden content, please
#Detects #Patches #ZeroDay #Exploit #Target #********* #Central #********* #Users

This is the hidden content, please


Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.