HP Threat Research Shows Attackers Exploiting Zero-Day Vulnerability Before Enterprises Can Patch
Retrieved on:
Thursday, October 14, 2021
Cloud, GitHub, Microsoft, Organization, HTA, Microsoft Windows, Â, JavaScript, NIST, Technology, Microsoft OneDrive, Social media, Solution, 3D, RAT, Risk, Hewlett-Packard, Personal computer, Discord, PowerShell, HP Elite x3, NYSE, Office, PALO, HPQ, RATS, MSHTML, HP Inc., GLOBE, AMD, USB, Microsoft Office, VMS, HP, Review, Hewlett Packard Enterprise, Behavior, Software, HTML, Research, National Missing and Unidentified Persons System, Security, Equation, Medical device, Online shopping, Livestock, Cryptocurrency, Risk management
The HP Wolf Security threat research team found evidence that cybercriminals are mobilizing quickly to weaponize new zero-day vulnerabilities.
Key Points:
- The HP Wolf Security threat research team found evidence that cybercriminals are mobilizing quickly to weaponize new zero-day vulnerabilities.
- By September 10 just three days after the initial threat bulletin the HP threat research team saw scripts designed to automate the creation of this exploit being shared on GitHub.
- Once the device is compromised, attackers can install backdoors to systems, which could be sold on to ransomware groups.
- 5 HPs most advanced embedded security features are available on HP Enterprise and HP Managed devices with HP FutureSmart firmware 4.5 or above.