#CyberSecurity #Microsoft #Windows #Rootkits #NorthKorea: "Hackers backed by the North Korean government gained a major win when Microsoft left a Windows zero-day unpatched for six months after learning it was under active exploitation.

Even after Microsoft patched the vulnerability last month, the company made no mention that the North Korean threat group Lazarus had been using the vulnerability since at least August to install a stealthy rootkit on vulnerable computers. The vulnerability provided an easy and stealthy means for malware that had already gained administrative system rights to interact with the Windows kernel. Lazarus used the vulnerability for just that. Even so, Microsoft has long said that such admin-to-kernel elevations don’t represent the crossing of a security boundary, a possible explanation for the time Microsoft took to fix the vulnerability."

https://arstechnica.com/security/2024/03/hackers-exploited-windows-0-day-for-6-months-after-microsoft-knew-of-it/

Reply to this note

Please Login to reply.

Discussion

This is why I believe in *immediate* disclosure of vulnerabilities. The user should be informed regardless of whether a fix is in the works, if the exploit is only partially investigated, etc. so they can make their own decisions about security.

Maybe someone can share this concept with

Maxim Dounin, former developer of Nginx. 😜

nostr:nevent1qqs2f7qtahg5vd66g0aytvjn0d8z4w09v4ukd6dmlhaarxj0aghcdhqpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtczyq9m3nad93809a55l6mgwz8k022dskef69ggphupwjuyshj8rdngxqcyqqqqqqgqquc4q