Connect with us

New vulnerability in Windows makes it easy to gain administrator rights

Published

on

A new vulnerability has been discovered in Windows 10, Windows 11 and Windows Server that allows elevation of local privileges and gaining administrator rights.

An exploit has already been published on the network, with the help of which attackers who have already compromised the system, but have limited access, can gain full control over the device. The vulnerability affects all currently supported versions of Windows.

As part of the latest patch, Microsoft has fixed a Windows Installer privilege escalation vulnerability known as CVE-2021-41379. This vulnerability was discovered by security researcher Abdelhamid Naceri, who found a workaround for the provided fix and a new, more powerful zero-day privilege escalation vulnerability after examining a patch released by Microsoft. Yesterday Naseri posted a working experimental exploit for the new vulnerability on GitHub, explaining that it works on all supported versions of Windows.

In addition, Naseri explains that while Group Policy may be configured to prevent users with basic privileges from using Windows Installer, the new vulnerability bypasses this policy and will work anyway. BleepingComputer tested the InstallerFileTakeOver exploit; and found that it only took him a few seconds to get the privileges he needed. The test was run on Windows 10 21H1 with build number 19043.1348.

Naseri said he publicly disclosed the zero-day vulnerability due to frustration with the cutback to Microsoft’s software bug bounty program. Microsoft did not comment on the situation in any way. They will probably fix the vulnerability in the next patch.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Security

Instagram said it is strengthening the protection of its underage users

Published

on

The head of Instagram is due to speak at a hearing in the US Congress on December 7 and talk about the measures taken by his service to protect children.

Tuesday, December 7th, Instagram administration stated the intention to carefully select the content recommended for teens and to nudge them to other areas if they get hung up on one thing. On its blog, the service announced a few more changes that will affect teenagers.

Instagram chief Adam Mosseri is due to speak at a hearing in the US Congress on Wednesday, December 7, and talk about the measures taken by his service to protect children online.

Recently, Instagram and parent company Meta Platforms (formerly Facebook) have come under fire for the potential harm to the mental health and safety of children online.

According to Mosseri, Instagram will disable the ability for users to tag or mention teenagers who are not their followers. Starting in January 2022, teenagers will have the opportunity to massively delete their content, previously set “likes” and written comments.

The service looked at control tools to limit potentially harmful or sensitive content to teens through search, hashtags, short videos (Reels) and featured pages, Mosseri said.

Instagram is also launching a Take a Break feature for users in the US, UK, Canada and Australia, which will remind users to distract themselves if the user is stuck in the app for a long time.

In March 2022, Instagram will launch its first parental control tool that will allow parents and guardians to see how much time a teen is spending on the app.

In September of this year, the Instagram administration decided to postpone the launch of the version of the application for children for now, and now the press service of the service has confirmed that the Instagram management does not intend to return to this project yet.

Continue Reading

Security

Israeli authorities strengthen oversight of cyber technology exports

Published

on

The move follows a series of scandals involving Israeli spyware developer NSO Group.

Israel’s Defense Export Control Agency has decided to tighten oversight over the export of offensive cyber products. Companies buying Israeli cyber technologies will have to sign a declaration to use the products “only for the investigation and prevention of terrorist attacks and serious crimes.” Countries that violate the terms of use may be subject to sanctions, “including restricting and / or shutting down the cyber system.”

As the Associated Press reported, the decision was made just days after another NSO Group spyware scandal. US diplomats in Uganda have been targeted by a software tool developed by the NSO Group. Spyware, developed by the Israeli company NSO Group, has been used to hack iPhone smartphones by at least nine US foreign policy officials.

The NSO Group has faced a flood of international criticism over accusations that it helps governments spy on political opponents and human rights defenders. However, according to the company itself, its product is intended solely to help countries in the fight against crime and terrorism. Israel’s Defense Ministry has also drastically reduced the list of countries to which Israeli companies are allowed to sell their cyber technology. If earlier the list included 102 countries, now it has been reduced to 37. In particular, Israel’s new allies Morocco and the United Arab Emirates, in which cases of human rights violations are known, were excluded from it.

Continue Reading

Security

Life360 service is suspected of selling geodata of children to third parties

Published

on

The company is one of the largest providers of confidential information on the personal data market.

Specialists of the non-profit organization The Markup spent investigation into the service Life360, which allows tracking the geolocation of children. As it turned out, the company is one of the largest providers of confidential information in the personal data market.

The Markup contacted two former employees of the so-called “data brokers” Cuebiq and X-Mode. Life360 made about $ 16 million in 2020 from selling user data to dozens of different companies, according to whistleblowers. In addition, two former Life360 employees also told the organization about the company’s additional source of income.

According to a former X-Mode employee, the raw location data from Life360 was one of the most valuable offerings on the market due to the sheer volume and accuracy of the data. A former Cuebiq employee joked that the company would not be able to carry out its marketing campaigns without the constant stream of location data from Life360.

The privacy policy of the application specifies the transfer of personal data, but the wording of the document actually allows the company to “transfer information to third parties in a form that allows you to identify the user.”

The functionality of the service allows you to prohibit the transfer of data, but this is not directly communicated to the user. This function is hidden in several sub-items of the settings, and consent to the use of information for commercial purposes is activated by default.

Whistleblowers said the company did not maintain adequate user anonymity and only removed names or home addresses prior to the sale. The rest of the information made it possible to easily identify the identity of the user. Any organization could become a buyer of data from Life360; the company did not enter into transactions only with government agencies.

The founder of the company, Chris Hulls (Chris Hulls) was unable to confirm or deny the results of the investigation.

Continue Reading

Most Popular