- Microsoft Corp MSFT has patched a zero-day vulnerability affecting all supported versions of Windows, which per researchers, hackers exploited to launch ransomware attacks.
- Microsoft said on Tuesday that an attacker who successfully exploited the vulnerability in the Windows Common Log File System (CLFS) could gain full access to an unpatched system, TechCrunch reports.
- Russian cybersecurity company Kaspersky says hackers exploited the flaw to deploy Nokoyawa ransomware, predominantly targeting Windows servers belonging to small and medium-sized businesses in the Middle East, North America, and Asia.
- Financially motivated cyber criminals actively exploit zero-day Kaspersky says.
- Also Read: Microsoft Taps OpenAI’s Latest GPT-4 For Cybersecurity Solutions
- Nokoyawa, first observed in February 2022, encrypts files on systems it compromises, but the operators also claim to steal valuable information that they threaten to leak pending a ransom. Reportedly, the ransomware bears links to the now-defunct Hive ransomware gang.
- U.S. cybersecurity agency CISA added the newly patched Windows vulnerability to its known exploited vulnerabilities catalog and urged federal agencies to update systems before May 2.
- Microsoft fixed almost 100 flaws under its regularly scheduled Patch Tuesday update.
- It also rectified a remote code execution flaw that could allow a remote, unauthenticated attacker to run their code with elevated privileges on affected servers with Microsoft’s Message Queuing service enabled.
- Price Action: MSFT shares traded higher by 0.11% at $263.80 premarket on the last check Thursday.
© 2025 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.
Comments
Loading...
Posted In:
Benzinga simplifies the market for smarter investing
Trade confidently with insights and alerts from analyst ratings, free reports and breaking news that affects the stocks you care about.
Join Now: Free!
Already a member?Sign in