HomeNewsKaspersky fixes a vulnerability that might result in an unbootable system

Kaspersky fixes a vulnerability that might result in an unbootable system

-

Last Updated on 22/11/2021 by Sunaina

On Monday, Kaspersky sent two advisory to consumers, warning them of a vulnerability that can result in unbootable devices and a phishing effort involving messages sent from a Kaspersky email address.

The vulnerability, disclosed to Trend Micro via its Zero Day Initiative (ZDI) by researcher Abdelhamid Naceri, affects Windows versions of Kaspersky Anti-Virus, Internet Security, Total Security, Small Office Security, Security Cloud, and Endpoint Security products.

The vulnerability, identified as CVE-2021-35053, is connected to Firefox and may be used to launch denial-of-service (DoS) attacks.

“Possible system loss of service if Firefox browser settings are changed arbitrarily.” “An attacker might modify certain Firefox browser settings files and then reboot the system to render the machine unbootable,” Kaspersky warned in an alert.

Patches for each of the affected items have been issued by the firm. ZDI has yet to issue an advisory outlining this vulnerability, although it’s worth mentioning that the company is working on three advisories for vulnerabilities uncovered in Kaspersky products by Naceri in August.

On Monday, Kaspersky warned that a recent spear-phishing attempt targeting Office 365 credentials included emails purportedly issued by the firm. The phishing emails alert recipients of a new fax and are intended to get users to visit websites set up to steal Microsoft credentials.

Kaspersky fixes a vulnerability that might result in an unbootable system 1

“These phishing attempts rely on a phishing kit we call ‘Iamtheboss,’ which is used in tandem with another phishing kit called ‘MIRCBOOT,'” Kaspersky added. “The action might be linked to many cybercriminals.”

Some of these emails are sent from “noreply(at)sm.kaspersky.com.” The emails were sent using Amazon’s Simple Email Service (SES) and a valid SES token supplied to a third party during the testing of Kaspersky’s 2050.earth website, which is hosted by Amazon. The site is “about the future as viewed by futurologists, scientists, and Internet users from all around the world.”

“When these phishing assaults were discovered, the SES token was promptly cancelled.” “At 2050.earth and linked services, no server penetration, illegal database access, or other malicious activity was discovered,” Kaspersky claimed.

Sunaina
Sunaina
A tech enthusiast, with a mission to report data breaches, fraudulent practices, dark pattern practices, and updates. She is also frequently fascinated by fintech and unicorns.
- Advertisment -

Must Read

edge-ai

Challenges and Opportunities in Deploying AI Solutions in Edge Computing Environments

0
Edge AI is a ground-breaking new paradigm that has the potential to completely change how companies run. Organizations can seize new chances for creativity,...