The Flame virus may not have spread like wildfire, but it packed a little heat, nonetheless. This thing never would have got around at all were it not for fake security certificates purporting to be from Microsoft. Using these, the malware was able to sign on as if it were an actual honest-to-goodness Microsoft product.
It appears the vulnerability is not widespread, is limited to older revs of Terminal Services and only cracks unpatched systems.
Microsoft's advice? Get patched! If you have automatic updates, you are probably already all set. More on this will be learned and perhaps more patch code released next Tuesday.
The Flame virus could be real bad news in the long run as some security folks think it was built with spying and international troublemaking in mind. Like some hunks of malware, this could stick around in various forms for years to come.
Posted by Doug Barney on 06/08/2012 at 1:19 PM
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week announced the release of a publicly available and free post-incident hunting tool for organizations using Microsoft Azure, Azure Active Directory and Microsoft 365 applications.
Microsoft this week reminded organizations using Microsoft Teams Rooms devices of a coming July 1 deadline to get their licenses compliant with its relatively new Basic and Pro plans.
Simplified labeling and documentation are key to avoiding a management mess.
Microsoft this week announced a preview of custom claims providers for Azure Active Directory users.
Microsoft this week announced plans to shift the schedule for when it releases its optional nonsecurity patch previews for Windows systems.
More Tech Library