Security News > 2022 > May > Hackers have carried out over 65,000 attacks through Windows’ Print Spooler exploit
Hackers have carried out over 65,000 attacks through Windows' Print Spooler exploit.
A new report, from cybersecurity company Kaspersky, has found that cybercriminals conducted approximately 65,000 attacks through Windows' Print Spooler application between July 2021 and April 2022.
Print Spooler is typically employed to help users manage the printing process, but due to numerous vulnerabilities has become a hotbed for cyber criminals looking to carry out attacks.
Print Spooler's vulnerabilities and the numerous attacks.
"We anticipate a growing number of exploitation attempts to gain access to resources within corporate networks, accompanied by a high-risk of ransomware infection and data theft. Through some of these vulnerabilities, attackers can gain access not only to victims' data but also to the whole corporate server. Therefore, it is strongly recommended that users follow Microsoft's guidelines and apply the latest Windows security updates."
Also See Share: Hackers have carried out over 65,000 attacks through Windows' Print Spooler exploit.
News URL
Related news
- Iranian hackers now exploit Windows flaw to elevate privileges (source)
- Exploit released for new Windows Server "WinReg" NTLM Relay attack (source)
- North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks (source)
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure (source)
- OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf (source)
- Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems (source)
- North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware (source)
- Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials (source)
- Hackers exploit Roundcube webmail flaw to steal email, credentials (source)