New Nokoyawa Ransomware Attacks Exploiting a Windows Zero-Day Vulnerability
Exploiting a zero-day vulnerability (CVE-2023-28252) in the Windows Common Log File System, threat actors have launched new attacks to distribute Nokoyawa ransomware payloads. However, Microsoft has already addressed the vulnerability as part of the latest Patch Tuesday release.
This means that attackers can exploit the vulnerability to gain unauthorized access to systems, steal data, or launch other malicious activities.
Zero-day vulnerabilities are considered particularly dangerous because there are no known fixes or patches available to address them, leaving systems vulnerable to attack until a patch or workaround is developed. Once a zero-day vulnerability is discovered, it is usually sold on the dark web to cybercriminals or state-sponsored hackers, who then use it to launch attacks.
Attempted cyberattacks using the updated Nokoyawa ransomware, exploiting the aforementioned flaw, targeting Windows servers of small and medium-sized businesses across North America and the Middle East. Nokoyawa ransomware operation has also leveraged other exploits aimed at the CLFS driver industries since last June, using five or more exploits. The early variants of Nokoyawa were just 'rebranded' versions of JSWorm ransomware. However, in this attack, cybercriminals have used a newer and distinct version of Nokoyawa.
To protect against Windows zero-day vulnerabilities, it is important to keep your operating system up to date with the latest security patches and updates. Additionally, using anti-virus software, firewalls, and other security measures can help to reduce the risk of attack. It is also important to exercise caution when opening emails or attachments from unknown sources and to be wary of suspicious links or websites.
If you suspect that your system has been infected with Nokoyawa ransomware or any other type of malware, it's important to take immediate action. Disconnect your computer from the internet and contact a reputable cybersecurity professional or organization for assistance.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)