Tech/Science

Dual Cyber Threats Targeting Windows Features Pose Risk to Personal Computers

Your personal computer is currently under a dual threat from cyber attackers, with vulnerabilities targeting key Windows features. These threats include an exploit in Windows search functionality and a security gap in the Windows Wi-Fi driver.

The first vulnerability involves a sophisticated method that hackers are using to manipulate Windows search. This attack typically starts with phishing emails containing malicious .ZIP attachments disguised as legitimate documents, such as invoices. When users open these attachments, a batch script is triggered, prompting Windows Explorer to search for specific terms like ‘INVOICE’ and then quickly switching to ‘Downloads.’ This deceptive tactic aims to trick users into believing they are viewing their downloaded files, while in reality, malicious operations are being initiated. Although the exact nature of the malware being distributed is not yet disclosed, users can protect themselves by disabling search-ms/search URI protocol handlers in the registry and exercising caution when opening email attachments.

The second vulnerability poses a more serious threat as it targets the Windows Wi-Fi driver, allowing hackers to execute malicious code on a PC within range of a public Wi-Fi network. This security flaw affects all recent versions of Windows Server and Windows operating systems. Notably, attackers can exploit this vulnerability without prior access to the target computer, bypassing authentication protocols and executing code without user interaction. This critical flaw, identified as CVE-202430078, underscores the risks associated with connecting to public Wi-Fi networks and emphasizes the importance of security measures.

Users using unpatched versions of Windows 10 or 11, as well as Windows Server editions from 2008 onwards, are at risk of exploitation. Microsoft has responded to these threats by releasing a comprehensive fix on June 11, addressing 49 CVEs across Windows, Office, and related components. It is crucial for users to update their systems promptly to mitigate these security risks and safeguard their personal information.

LEAVE A RESPONSE

Your email address will not be published. Required fields are marked *