ngCERT  2nd Advisory on WannaCry/WCry/WCrypt0 Ransomware  Warm and Remote Desktop Protocol (RDP)  & Server Message Block (SMB) Protocol Vulnerability
ngCERT 2nd Advisory on WannaCry/WCry/WCrypt0 Ransomware Warm and Remote Desktop Protocol (RDP) & Server Message Block (SMB) Protocol Vulnerability
  • Alert & Advisory
  • May 15, 2017

The Remote Desktop Protocol (RDP) and a vulnerability in the implementation of the Server Message Block SMB protocol of Microsoft Windows Operating System is currently being exploited by a ransomware called WannaCry worm. The worm encrypts all files on an infected computer’s hard drive.

ngCERT VMware Tools vulnerability
ngCERT VMware Tools vulnerability
  • Alert & Advisory
  • January 16, 2020

A vulnerability in VMware Tools is a functionality that was removed from VMware Tools 11.0.0 and it has been determined to affect VMware Tools for Windows version 10.x.y.

ngCERT Advisory on Scranos Malware
ngCERT Advisory on Scranos Malware
  • Alert & Advisory
  • February 10, 2020

Scranos is a Trojan horse that steals information from the compromised computer. It may also download potentially malicious files. Scranos cloaks itself as cracked software or apps that pose as legitimate programs, such as ebook readers, video players, drivers, and even security products. Upon execution, a rootkit driver is installed to hide the malware.

Windows 10 Task Scheduler Zero-Day Vulnerability
Windows 10 Task Scheduler Zero-Day Vulnerability
  • Vulnerability
  • February 10, 2020

Microsoft Windows Task Scheduler is a set of Microsoft Windows components that allows for the execution of scheduled tasks. The exploit "functions reliably on 32- and 64-bit Windows 10 platforms, as well as Windows Server 2016 and Windows Server 2019.

Intel Chips Vulnerability
Intel Chips Vulnerability
  • Vulnerability
  • February 10, 2020

Millions of computers powered by Intel processors are affected by vulnerabilities that can be exploited by malicious actors to obtain potentially sensitive information. The side-channel attack methods, named ZombieLoad, Rogue In-Flight Data Load,(RIDL) and Fallout, are similar to the notorious Meltdown and Spectre. The attack methods work against both PCs and cloud environments, and they can be launched against most Intel CPUs.

Related Articles