Examiner program operators have learned to crack Windows through office equipment. This is reported by the Bleeping Computer edition.
Experts found out that fraudsters began to use the PrintnightMare vulnerability, which allows you to get control of the PC running Windows and penetrate the system through the printer and other office equipment. It is noted that the Magniber networking attackers compromise the security of servers on which the Printnightmare protection is not installed by remotely installed the DLL boot. Magniber Malicious Simony Program is active since 2017.
“Printnightmare vulnerability in combination with the new deployment of the extortioner program is likely to continue to be used by attackers,” – noticed in the Crowdstrike security agency.
Specialists said that the most vulnerable to attack are computers on which the print queue service service is enabled and the Windows Remote Print Service. Previously, Microsoft has released a partially eliminating the update problem, but a large number of users neglected the update.
In early August, security engineers found out that the security update for Windows leaves the ability to break the system through the Printnightmare vulnerability. This hacking method was described in early July.