How to fix Windows under attack by zero-day flaw right now

Advertisements

Please update your Follina zero-day so that hackers can’t take advantage of it.

(Image credit: sdx15 / Shutterstock)

Do you have a Windows-based computer? In order to avoid being a victim of a cyberattack, make sure you have the most recent version of your operating system installed.

According to Beeping Computer, the June 2022 cumulative Windows Updates contain fixes for a zero-day flaw that allowed an attack dubbed Follina (CVE-2022-30190(opens in new tab)) to take hold of the system.

Advertisements

Hackers may take advantage of a remote code execution problem in Microsoft’s Windows Support Diagnostic Tool (MSDT), which allowed them to install programs, change or delete data or create a new Windows account with compromised user rights on the vulnerable PC. Windows 7 and later are affected by the problem.

Chinese hackers have exploited the issue, according to Proofpoint(opens in new tab), and have been sending malicious documents to Tibetans as a result. In addition, the bug has been exploited to target government agencies in the United States and the European Union.

In other words, you may not be the target of state-sponsored hackers, but cyber thieves could still take advantage of this flaw in unpatched PCs. That’s why, much like Microsoft, we urge that you keep your computer up to date with the latest patches.

Advertisements

“Customers are urged by Microsoft to do so in order to be fully protected from the security flaw. Customers who have their PCs set up to automatically receive software updates need not do anything else “said the software giant.

As a result, if you’ve enabled automatic updates, you’re probably already covered. However, if this is not the case, you should make sure you have the most recent patch installed.

Navigate to the Windows Settings app, select “Update & Security,” then select “Windows Update,” and you’ll see if your PC is current, or if an update is required. If you want to keep your PC safe from nefarious or otherwise opportunistic hackers, be sure to follow these simple steps.

Advertisements

Leave a Comment