Articles tagged "Windows"

Found 36 articles

Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

ViperTunnel is a new backdoor malware linked to the DragonForce ransomware, specifically targeting businesses that operate on Windows servers in the US and the UK. This Python-based malware allows attackers to gain unauthorized access to systems, which can lead to data theft or further exploitation. Companies utilizing Windows server environments should be particularly vigilant, as the malware poses a significant risk to their operations and data security. The emergence of ViperTunnel highlights the ongoing challenges businesses face in protecting their networks from evolving ransomware threats. Organizations are urged to implement strong security measures and regularly update their systems to fend off such attacks.

Impact: Windows servers
Remediation: Organizations should implement strong security measures, regularly update their systems, and monitor for unusual activities.
Read Original

A new privilege escalation vulnerability, dubbed 'BlueHammer', has been identified in Windows operating systems. This flaw, which merges a time-of-check to time-of-use (TOCTOU) vulnerability with path confusion, allows attackers to gain higher-level access to systems. Users of affected Windows versions are particularly at risk, as this could enable unauthorized actions that compromise system security. The release of exploit code for BlueHammer raises concerns about its potential use in cyberattacks, making it crucial for organizations to address this vulnerability promptly. Keeping systems updated and applying any available patches will be essential to mitigate the risks associated with this flaw.

Impact: Windows operating systems with the BlueHammer vulnerability
Remediation: Users should apply the latest patches and updates from Microsoft to mitigate the vulnerability.
Read Original

Windows 11 users who attempted to install a problematic preview update released in March are encouraged to download a new out-of-band update that fixes installation errors. This recent update addresses issues that may have prevented users from successfully applying the earlier version. Affected users should check for the latest updates in their system settings to ensure they have the fix installed. This situation is important because installation errors can disrupt users' workflows and impact system stability. Keeping software up to date is crucial for security and performance.

Impact: Windows 11
Remediation: Users should download the new out-of-band update to fix installation errors from the March preview update.
Read Original

Microsoft has withdrawn the KB5079391 update for Windows 11 after users reported installation issues resulting in error code 0x80073712. This non-security preview update was intended to enhance the operating system but instead caused problems for those attempting to install it. The company is now investigating the source of the error, which is affecting users who downloaded this particular update. For many, this means they may have to wait longer for fixes or improvements that were supposed to come with the update. It's a reminder of the potential complications that can arise from software updates and the importance of monitoring system changes closely.

Impact: Windows 11, KB5079391 update
Remediation: Microsoft has pulled the KB5079391 update and is investigating the issue.
Read Original

A pro-Ukrainian hacking group known as Bearlyfy has carried out over 70 cyber attacks against Russian companies since January 2025. Their recent campaigns have utilized a custom ransomware known as GenieLocker, which targets Windows systems. This group aims to disrupt operations in Russian businesses, indicating a strategic move in the ongoing conflict between Ukraine and Russia. The use of ransomware adds a financial pressure point, potentially crippling affected organizations. As these attacks continue, it raises concerns about the security of critical infrastructure and business operations in the region.

Impact: Russian companies, Windows systems, GenieLocker ransomware
Remediation: N/A
Read Original
FBI Warns of Iran’s Handala Hack Group Using Fake Apps to Spy on Windows Users

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

The FBI has issued a warning about the Handala Hack Group, which has ties to Iran and is targeting Windows users by distributing fake versions of popular messaging apps, WhatsApp and Telegram. These counterfeit applications are designed to spy on users and potentially steal sensitive information. The attackers are using social engineering tactics to trick individuals into downloading the malicious software, which can lead to significant privacy breaches. This situation is particularly concerning as it underscores the risks associated with downloading apps from unofficial sources. Users are advised to only download applications from trusted sources and to remain vigilant about the permissions they grant to software.

Impact: Windows operating systems, WhatsApp, Telegram
Remediation: Users should only download applications from official sources and review app permissions carefully.
Read Original

As ransomware payments decline to historic lows, attackers are changing their tactics to adapt to the shrinking market. Research indicates that many ransomware actors are moving away from using sophisticated tools like Cobalt Strike and are instead relying on native Windows tools to carry out their attacks. This shift comes as the frequency of data theft incidents is increasing, suggesting that attackers are looking for ways to maintain their profitability despite the challenges. The implications of this trend are concerning for organizations, as it may lead to more widespread and varied attacks that are harder to detect and defend against. Companies need to stay vigilant and adapt their security measures to counter these evolving threats.

Impact: Cobalt Strike, native Windows tools
Remediation: Organizations should enhance their security protocols, monitor for unusual activity, and consider training staff on recognizing potential threats.
Read Original

Microsoft has released an out-of-band update to address three vulnerabilities in Windows 11's Routing and Remote Access Service (RRAS). The vulnerabilities, identified as CVE-2026-25172, CVE-2026-25173, and CVE-2026-26111, could potentially allow remote code execution when users connect to a malicious server. This is a serious concern as it could enable attackers to execute harmful code on affected systems. Users of Windows 11 should ensure they apply the latest updates to protect their devices from these risks. The prompt release of this patch reflects the urgency in addressing vulnerabilities that can be exploited remotely, highlighting the need for users to stay vigilant about software updates.

Impact: Windows 11, Routing and Remote Access Service (RRAS)
Remediation: Users should apply the latest updates provided by Microsoft to address the vulnerabilities. Specific patch numbers or versions were not mentioned, but keeping Windows 11 updated is essential.
Read Original

A new banking malware known as VENON has been discovered, targeting 33 banks in Brazil. This malware is notable for being written in Rust, which differentiates it from other prevalent malware in the region that typically uses Delphi. It specifically aims to steal user credentials by infecting Windows systems. Researchers first identified VENON last month, raising concerns about its potential impact on Brazilian banking customers. This malware represents an evolving threat in the Latin American cybercrime landscape, and users should be vigilant about their online security.

Impact: 33 Brazilian banks, Windows systems
Remediation: Users should ensure their antivirus software is up to date and be cautious when entering personal information online.
Read Original

A Chinese-speaking cyber actor has reportedly been targeting critical sectors in Asia for several years using a mix of custom malware, open-source tools, and living-off-the-land (LOTL) binaries. This activity appears to be focused on espionage, affecting both Windows and Linux systems. The attackers' tactics, which combine tailored malware with readily available tools, suggest a sophisticated approach aimed at infiltrating sensitive networks. The long-term nature of this threat raises concerns for organizations in the region, as prolonged access could lead to significant data breaches and intelligence gathering. Companies in critical infrastructure sectors need to be vigilant and enhance their cybersecurity measures to defend against these persistent threats.

Impact: Windows and Linux systems in critical Asian sectors
Remediation: Organizations should conduct regular security audits, implement advanced threat detection solutions, and ensure all systems are patched and updated to mitigate risks.
Read Original

Despite the widespread implementation of multi-factor authentication (MFA) in organizations, many still fall victim to credential theft. Attackers are exploiting valid usernames and passwords to gain unauthorized access to networks, particularly in Windows environments. The problem isn't with MFA itself, but rather with how comprehensively it is enforced through identity providers like Microsoft Entra ID and Okta. If MFA isn't applied consistently across all access points, attackers can bypass these security measures. This situation emphasizes the need for companies to ensure that MFA is enforced everywhere, not just in select areas, to truly safeguard their systems from credential abuse.

Impact: Microsoft Entra ID, Okta, Windows environments
Remediation: Ensure comprehensive enforcement of MFA across all access points and systems
Read Original

In February 2026, Microsoft addressed over 50 security vulnerabilities during its Patch Tuesday update, including six zero-day flaws that were actively exploited by attackers. Notably, three of these zero-days involve security feature bypasses. One of the vulnerabilities, identified as CVE-2026-21513, impacts the MSHTML/Trident browser engine used in Internet Explorer on Windows, while CVE-2026-21514 affects Microsoft Word. Attackers can exploit these vulnerabilities by tricking users into opening malicious files or links. As these security holes are actively being exploited, users and organizations must apply the updates promptly to protect their systems from potential breaches.

Impact: Microsoft Windows (Internet Explorer), Microsoft Word
Remediation: Users are advised to install the latest security updates from Microsoft to mitigate these vulnerabilities. Specific patches addressing these issues were released as part of the February 2026 Patch Tuesday.
Read Original

A North Korea-associated hacking group known as UNC1069 is targeting cryptocurrency organizations to steal sensitive information from both Windows and macOS systems. Their approach involves social engineering tactics, including the use of a compromised Telegram account to set up a fake Zoom meeting. This deception leads victims to download malware through a method called ClickFix, which researchers believe may also utilize AI-generated content to enhance its effectiveness. The implications of these attacks are significant, as they not only threaten the financial security of targeted companies but also highlight the evolving tactics used by cybercriminals in the cryptocurrency sector. Protecting against such sophisticated schemes is increasingly critical for organizations in this space.

Impact: Windows and macOS systems, cryptocurrency organizations
Remediation: Organizations should implement strong security protocols, educate employees about social engineering tactics, and monitor communications for suspicious activity.
Read Original
UK Construction Firm Hit by Prometei Botnet Hiding in Windows Server

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A UK construction firm has fallen victim to an attack by the Russian Prometei botnet, as detailed by cybersecurity firm eSentire. The attack involved the use of TOR for anonymity, and attackers focused on stealing passwords and employing decoy tactics to mislead security measures. This incident raises concerns about the security of critical infrastructure in the construction sector, which may not be as fortified against cyber threats as other industries. The implications are significant, as compromised systems can lead to operational disruptions and financial losses for businesses. Companies in similar sectors should take note and assess their own cybersecurity defenses to prevent similar attacks.

Impact: UK construction firm's Windows Server systems
Remediation: Implement strong password policies, enhance network monitoring, and consider using intrusion detection systems.
Read Original

Avast has rolled out two new security features aimed at detecting scams involving deepfake technology. The Avast Scam Guardian and Scam Guardian Pro are now available for mobile devices, while the Avast Deepfake Guard is launched for Windows PCs. This AI-driven tool is designed to analyze and identify harmful audio that could be embedded within video content. The goal is to enhance protection for users against various scam tactics that can occur through text messages, phone calls, and video platforms. These updates are particularly relevant as the rise of deepfakes poses a growing risk to online security, making it essential for users to have reliable tools to safeguard against such threats.

Impact: Avast Scam Guardian, Scam Guardian Pro, Avast Deepfake Guard, Windows PCs, mobile devices
Remediation: Users should install Avast Scam Guardian, Scam Guardian Pro, and Avast Deepfake Guard to enhance their protection against scams.
Read Original
Page 1 of 3Next