AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

A new LPE exploit for Windows for sale in the underground

A new local privilege escalation threat for Windows in the underground forums

A privilege escalation exploit on Windows systems has been discovered in an underground forum. Sold for $120,000, it compromises various versions of Windows in seconds while remaining hidden. Emphasizes the importance of updating and protecting systems.

This pill is also available in Italian language

A new exploit targeting local privilege escalation (LPE) on Windows operating systems was recently spotted in one of the underground forums. The vendor, known by the nickname "vulns-rock", claims that this exploit is capable of compromising various versions of Windows, including the latest releases. Among the declared vulnerable systems are Windows Server 2022, Windows Server 23H2, Windows Server 2019, Windows 10 22H2, Windows 10 21H2, Windows 10 1809, Windows 11 23H2, Windows 11 22H2 and Windows 11 21H2. This exploit, according to the seller's own claims, is sold at a price of $120,000 and allows you to obtain SYSTEM level privileges in just 2 seconds, boasting a success rate of 99.4%. The source code was written in C++ and comes along with detailed documentation to make it easier to use.

Stability and discretion of the exploit

In addition to its impressive technical capabilities, the exploit is described as highly stable, meaning it can operate without causing any noticeable problems to the compromised system. Furthermore, one of its most disturbing features is the ability to execute operations without leaving traces, thus ensuring attackers maintain secret and privileged access. This type of operational discretion poses a serious threat because it allows attackers to execute high-power malicious code without detection, thus increasing the potential for significant damage to compromised systems.

Vulnerabilities in operating systems

The appearance of an exploit of this caliber on the underground market once again highlights the persistent threat posed by cybercriminals and the vulnerabilities present in the most widely used operating systems. Organizations and individual users are constantly exposed to new risks as cybercriminals continue to find and exploit security flaws. This phenomenon highlights the importance of keeping systems updated with the latest security patches and adopting cybersecurity practices that can mitigate these risks.

Importance of cybersecurity

In the face of these persistent threats, it is essential that organizations remain vigilant and proactive in applying security updates promptly. Additionally, it is crucial to implement a comprehensive cybersecurity framework that includes measures such as adopting up-to-date antivirus software, performing regular vulnerability checks, and educating staff on security behaviors. Such measures can help reduce the risk of compromise by sophisticated exploits such as those recently identified. In addition, collaboration and information sharing between companies can play a key role in strengthening collective defense against emerging cyber threats.

Follow us on WhatsApp for more pills like this

06/04/2024 08:51

Editorial AI

Last pills

NotPetya: the cyber attack that changed the face of cyber securityThe global devastation of the NotPetya cyberattack: Analysis of a borderless cyber conflict

Malware emergency on macOS: Atomic Stealer's threat to sensitive data and cryptocurrenciesNew infection and mitigation techniques to protect Mac devices

TPM chip vulnerabilities and risks without physical accessTPM chip security under scrutiny: new vulnerabilities and mitigation strategies

Serious security flaw in PHP on Windows server in CGI modeCVE-2024-4577 vulnerability details and essential mitigations for PHP servers on Windows in CGI mode