ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Allied 2016 HDCAM x264 AC3 HQMic-CPG
View Torrent Info: Underworld Blood Wars 2016 HDCAM NAKRO
View Torrent Info: Moana 2016 HD-TS XviD AC3-CPG
View Torrent Info: Shut.In.2016.HDCAM.x264 - Lesnar
Hot torrents
XVID DIVX
View Torrent Info: SiREN.2016.DVDRip.XViD-ETRG
View Torrent Info: Evans.Crime.2015.HDRip.XViD-ETRG
View Torrent Info: 31.2016.BRRip.XViD.AC3-ETRG
View Torrent Info: A Girl Like Grace.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: Mechanic.Resurrection.2016.BluRay.720p.DTS.AC3.x264-ETRG
View Torrent Info: The.Mechanic.2011.BluRay.720p.DTS.AC3.x264-ETRG
View Torrent Info: Ordinary.World.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Miss.Peregrines.Home.for.Peculiar.Children.2016.720p.BRRip.x264.AAC-ETRG
Hot torrents
Television
View Torrent Info: Arrow.S05E09.HDTV.x264-LOL[ettv]
View Torrent Info: Vikings.S04E12.HDTV.x264-KILLERS[ettv]
View Torrent Info: Survivor.S33E13.HDTV.x264-CROOKS[ettv]
View Torrent Info: Designated.Survivor.S01E09.HDTV.x264-KILLERS[ettv]
View Torrent Info: Madaari (2016) HQ 1080p Blu-Ray x264 DTSHD-MA 5.1 ESub -DDR
View Torrent Info: AE DIL HAI MUSHKIL (2016) DVDRIP 1CDRIP x264 AAC ESub [DDR]
View Torrent Info: Train.To.Busan.2016.720p.WEBRip.x264.Korean.AAC-ETRG
View Torrent Info: YZ.2016.Marathi.1080p.WEB-DL.H264.ESub.AAC2.0-DDR
30s
Chat
To add new messages please Login or Register for FREE
Warning! Protect Yourself from Lawsuits and Fines!
Your IP Address is 54.211.82.105.   Location is United States
Your IP Address is visible to EVERYONE. Hide your IP ADDRESS with a VPN while torrenting!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > Microsoft Warns about Vulnerability Targeting Taiwan

Microsoft Warns about Vulnerability Targeting Taiwan

Microsoft Warns about Vulnerability Targeting Taiwan

Added: Tuesday, November 4th, 2014
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
The tech giant warned about new unpatched software vulnerability affecting almost all Windows computers. The flaw looks very similar to the one used in recent hacker attacks on the Ukrainian government. Now it is being used against Taiwanese targets: the attackers create malicious PowerPoint documents which launch exploit code on target machines when opened. The security experts admit the hackers could have used any Office file, but for some reason those chose PowerPoint.
screenshot_47.png

Cyber intelligence experts warned that another (though similar) flaw was being used in so-called “Sandworm” attacks against Ukraine, the European Union, Nato, French telecom companies and even Polish energy suppliers. In previous cases, Russian hackers were suspected of intrusions.

Security companies believe that the two vulnerabilities are linked and have been exploited in the same way. While investigating the patch for the first flaw, the researchers found out that the fix wasn’t working and the vulnerability could still be exploited. However, there is no evidence that the recent flaw was being used by the same Sandworm hacker crew. The security firm’s sensors had detected an activity indicating the zero-day vulnerability was being used to attack people in Taiwan. They came to a conclusion that the Microsoft’s patch for the Sandworm flaw didn’t work properly and the new vulnerability exploits that.

The researchers have seen a number of samples, one of which probably targeted Taiwan and delivered the Taidoor malware. This type of activity has been attributed to Chinese cyber espionage in the past.

3 Google and 2 McAfee researchers were credited with disclosing the latest flaw to Microsoft. It turned out that the vulnerability targets all supported versions of Windows except Windows Server 2003, originating from a technology called an Object Linking and Embedding (OLE) object – this one is used to share data between several applications. For example, in Microsoft Office this technology is used when parts of a file appear within another file, like when an Excel chart is included in a Word document.

When the victim opens a malicious document, usually received via email, they risked handing over control of their machine to the attackers. The experts point out that this vulnerability can’t directly grant an attacker administrator-level access, but would allow them the same permissions as the victim. Advanced users will notice the “User Access Control” popup that requires consent when a malicious file is opened. In the meantime, Microsoft didn’t disclose when it was going to release a patch for the bug, but the company has included a fix-it solution in its advisory.

So, for now, Internet users are recommended to be careful about opening Office documents received via email, social media or instant messengers from unknown parties. Everyone is also reminded of links from untrusted sources, because those may be used to launch a malicious Office document from the hacker’s website.

Posted by:  SuperAdmin
Date:  Tuesday, November 4th, 2014



Comments (4) (please add your comment »)

1
posted by ET junkieET loverTurtle (2014-11-05 00:07:18)
teethors avatarthis is something to be aware of, tnx for the share

2
posted by (2014-11-05 03:11:27)
bm777 avatarAnother reason to stay away from MS products...

3
posted by (2014-11-06 05:18:58)
sly6299 avatarI can't stay away from MS product, my business depend on Windows product, so far there's no Android, iOS or OSX ERP products

4
posted by (2014-11-06 23:12:00)
cggc avataraffected bundles internet and cable tv because it innocent people who use service like home utility and don't figure it out some hackers watch for etc.. kind of business and or have part of easy cakes around...



Articles Search
Most Popular Stories
Articles Categories
Articles Tags


Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc1