Security News > 2022 > May > Hackers have carried out over 65,000 attacks through Windows’ Print Spooler exploit

Hackers have carried out over 65,000 attacks through Windows' Print Spooler exploit.
A new report, from cybersecurity company Kaspersky, has found that cybercriminals conducted approximately 65,000 attacks through Windows' Print Spooler application between July 2021 and April 2022.
Print Spooler is typically employed to help users manage the printing process, but due to numerous vulnerabilities has become a hotbed for cyber criminals looking to carry out attacks.
Print Spooler's vulnerabilities and the numerous attacks.
"We anticipate a growing number of exploitation attempts to gain access to resources within corporate networks, accompanied by a high-risk of ransomware infection and data theft. Through some of these vulnerabilities, attackers can gain access not only to victims' data but also to the whole corporate server. Therefore, it is strongly recommended that users follow Microsoft's guidelines and apply the latest Windows security updates."
Also See Share: Hackers have carried out over 65,000 attacks through Windows' Print Spooler exploit.
News URL
Related news
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks (source)
- Chinese hackers targeted sanctions office in Treasury attack (source)
- New DoubleClickjacking attack exploits double-clicks to hijack accounts (source)
- LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers (source)
- Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks (source)
- Hackers exploit KerioControl firewall flaw to steal admin CSRF tokens (source)
- Security pros baited with fake Windows LDAP exploit traps (source)
- New Web3 attack exploits transaction simulations to steal crypto (source)
- Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners (source)