Security News > 2022 > May > Hackers have carried out over 65,000 attacks through Windows’ Print Spooler exploit

Hackers have carried out over 65,000 attacks through Windows' Print Spooler exploit.
A new report, from cybersecurity company Kaspersky, has found that cybercriminals conducted approximately 65,000 attacks through Windows' Print Spooler application between July 2021 and April 2022.
Print Spooler is typically employed to help users manage the printing process, but due to numerous vulnerabilities has become a hotbed for cyber criminals looking to carry out attacks.
Print Spooler's vulnerabilities and the numerous attacks.
"We anticipate a growing number of exploitation attempts to gain access to resources within corporate networks, accompanied by a high-risk of ransomware infection and data theft. Through some of these vulnerabilities, attackers can gain access not only to victims' data but also to the whole corporate server. Therefore, it is strongly recommended that users follow Microsoft's guidelines and apply the latest Windows security updates."
Also See Share: Hackers have carried out over 65,000 attacks through Windows' Print Spooler exploit.
News URL
Related news
- Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks (source)
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks (source)
- Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail (source)
- Hackers exploit Cityworks RCE bug to breach Microsoft IIS servers (source)
- XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells (source)
- Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores (source)
- Hacker pleads guilty to SIM swap attack on US SEC X account (source)
- Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks (source)
- SonicWall firewall exploit lets hackers hijack VPN sessions, patch now (source)
- Russian military hackers deploy malicious Windows activators in Ukraine (source)