Back in 2022, Microsoft fixed a fatal flaw in Windows that was causing a lot of cybercrime. This flaw was the CryptoAPI vulnerability that could’ve caused a wide range of spoofing attacks. While the flaw has now been patched, it is still present in quite a few endpoints that make systems and servers that are using Windows more at risk than might have been the case otherwise.
Researchers working at Akamai have brought the continued presence of this vulnerability to light, and they found that no more than 1% of all data centers have used the patch provided by Microsoft. That’s despite the threat rating for this flaw being as high as 7.5, although it should be mentioned that even systems that don’t have the patch yet would need a vulnerable app in order to get attacked by ransomware or some other type of malware.
With all of that having been said and now out of the way, it is important to note that Microsoft confirmed that there had been no instances of this vulnerability having been exploited so far. In spite of the fact that this is the case, now that it has come to light, there will likely be a higher proportion of threat actors who will begin the hunt for a suitable endpoint.
Users would do well to install a firewall because of the fact that this is the sort of thing that could potentially end up keeping a number of threats at bay. Making sure that your systems are fully patched is yet another important thing to do, since it can ensure that any vulnerabilities will be closed up well before malicious actors have had the chance to exploit them.
There might be a sudden uptick in threat actors who choose to exploit this particular vulnerability. The low adoption rate for the patch is a pertinent issue that must be resolved sooner rather than later, otherwise we might see a huge rise in ransomware especially since Windows is a popular OS for data centers to use with all things having been considered and taken into account.
Photo: WhataWin / Getty Images
Read next: There is a new malware going around that is using Google Ads to find victims
Researchers working at Akamai have brought the continued presence of this vulnerability to light, and they found that no more than 1% of all data centers have used the patch provided by Microsoft. That’s despite the threat rating for this flaw being as high as 7.5, although it should be mentioned that even systems that don’t have the patch yet would need a vulnerable app in order to get attacked by ransomware or some other type of malware.
With all of that having been said and now out of the way, it is important to note that Microsoft confirmed that there had been no instances of this vulnerability having been exploited so far. In spite of the fact that this is the case, now that it has come to light, there will likely be a higher proportion of threat actors who will begin the hunt for a suitable endpoint.
Users would do well to install a firewall because of the fact that this is the sort of thing that could potentially end up keeping a number of threats at bay. Making sure that your systems are fully patched is yet another important thing to do, since it can ensure that any vulnerabilities will be closed up well before malicious actors have had the chance to exploit them.
There might be a sudden uptick in threat actors who choose to exploit this particular vulnerability. The low adoption rate for the patch is a pertinent issue that must be resolved sooner rather than later, otherwise we might see a huge rise in ransomware especially since Windows is a popular OS for data centers to use with all things having been considered and taken into account.
Photo: WhataWin / Getty Images
Read next: There is a new malware going around that is using Google Ads to find victims