Home Security Microsoft claims Shadow Brokers' NSA exploits fixed in March updates
Microsoft claims Shadow Brokers' NSA exploits fixed in March updates Featured

Reacting to the release of Windows exploits by the hacker group Shadow Brokers, Microsoft has issued a statement that its March patches fixed all critical vulnerabilities that affect currently supported products.

The company did not specify how it had come to know of these vulnerabilities. It is common for those who provide knowledge of critical bugs to be acknowledged in security bulletins.

March was the last month for which such bulletins were issued in the same style as they have been for more than a decade; from this month, Microsoft changed the style of issuing details of its monthly security updates.

On Friday, the Shadow Brokers released a number of what it said were NSA exploits for many versions of Windows and also details of what were said to be NSA intrusions into the SWIFT banking system.

The statement, issued by Phillip Misner, principal security group manager at the Microsoft Security Group Manager, said most of the Shadow Brokers exploits in supported products had been fixed as depicted in the table below.

ms fixed

But three exploits — going by the names EnglishmanDentist, EsteemAudit, and ExplodingCan — were not reproducible in supported products, Misner said. Hence they had not been patched.

This meant that "customers running Windows 7 and more recent versions of Windows or Exchange 2010 and newer versions of Exchange are not at risk. Customers still running prior versions of these products are encouraged to upgrade to a supported offering".

While home and small business users, who generally patch as soon as possible, may be protected against these exploits, bigger businesses generally take a while to patch because they have extensive testing to be done, and may still be vulnerable. Two months is generally about the standard time taken for testing by bigger firms before patching.

The Microsoft statement has led to security researchers speculating how the company came to be aware of these exploits and whether the NSA was the informant. There has also been speculation that Microsoft may have paid the Shadow Brokers to obtain knowledge of the exploits.

The abrupt cancellation of security updates in February is suspected of being linked to Microsoft's becoming aware of these exploits, with the theory being that the issue of patches was delayed until March to ensure that all the exploits against supported products were fixed.

Security researchers, who had claimed that the release of the exploits created a dangerous situation for Windows users, said they had tested without the patches from March, as there was no indication that these patches had fixed the Shadow Brokers' exploits.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

10 SIMPLE TIPS TO PROTECT YOUR ORGANISATION FROM RANSOMWARE

Ransomware attacks on businesses and institutions are now the most common type of malware breach, accounting for 39% of all IT security incidents, and they are still growing.

Criminal ransomware revenues are projected to reach $11.5B by 2019.

With a few simple policies and procedures, plus some cutting-edge endpoint countermeasures, you can effectively protect your business from the ransomware menace.

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect