Microsoft on Monday rushed out an emergency patch for a critical vulnerability that criminals are exploiting to install malware on all supported versions of the Windows operating system.
As promised Friday, Microsoft released the update outside of its normal patching schedule because the vulnerability is being actively targeted. When the flaw first came to public attention three weeks ago, it was being used to attack SCADA — supervisory control and data acquisition — systems that control sensitive equipment at power plants, gas refineries, and other other critical infrastructure.
Since then, it’s been used to install general-purpose malware from Zeus and other do-it-yourself crimeware kits used to siphon credit card numbers and other sensitive data from compromised computers. The Windows flaw resides in a shortcut feature that makes it easy to store commonly accessed files and folders on the operating-system desktop.
Users who employed a stopgap FixIt published two weeks ago should roll back their machines using the “disable workaround” feature here. Those who don’t follow this advice will find that icons fail to display properly, causing folders and files to appear white without any of the customary graphics.
Users will most likely have to reboot their machines twice — once after uninstalling the workaround, and again after installing the update.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.