Undoubtedly, the high level of Windows vulnerability has been exploited by unauthorized users when trying to get complete remote control of the attacked device. Malicious equipment is very dangerous because it can work without being noticed. Fortunately, the fix for this is already available.
This defect was discovered by Kaspersky Lab's computer security experts with its automated technologies. The attack was carried out with malicious software that set up a backdoor to the Windows core.
Why is it better not to look for an update for Windows 10?
How they carried out the attack
The attack started with the launch of a malicious executable file (.exe) triggered the malware installation. She took advantage of the zero-day vulnerability and was able to get special rights to successfully stay on the device of the victim attacked, and then through the otherwise legitimate Windows operating system, configured a backdoor for her malicious activity.
New discovery threatens 80% of computers: what do you need to know?
Microsoft will take about seven gigabytes of its disk for its arbitrariness
This widget is (also this time) a shell, Windows PowerShell, found on all devices in all current versions of Microsoft's Windows operating system.
What all those who care about the next Microsoft action can do?
Malicious software then sets up another side door, allowing online criminals to fully control the infected system.
An unusual problem with Windows also in Slovenia. What to do if it shows up?
Instant fixation significantly reduces risks
Kaspersky Lab's computer security experts have noted the vulnerability of Microsoft, which has already made a correction and published it today.
If you are using Windows 10, you should do this
Users of this time, of course, also recommend that they regularly install all patches and (verified) security updates as they do so in a meaningful way to protect their computer systems and their invaluable data on them.
Microsoft wants you to replace a week as fast as possible