Share this article

Latest news

With KB5043178 to Release Preview Channel, Microsoft advises Windows 11 users to plug in when the battery is low

Copilot in Outlook will generate personalized themes for you to customize the app

Microsoft will raise the price of its 365 Suite to include AI capabilities

Death Stranding Director’s Cut is now Xbox X|S at a huge discount

Outlook will let users create custom account icons so they can tell their accounts apart easier

Microsoft’s cybersecurity defenses were easily broken by Black Basta on zero-day

The gang exploited the CVE-2024-26169 which allows system privilege.

2 min. read

Published onJune 13, 2024

published onJune 13, 2024

Share this article

Read our disclosure page to find out how can you help Windows Report sustain the editorial teamRead more

In the cybersecurity realm, it sometimes appears like a game of cat and mouse is being played. The Black Basta ransomware gang seems to have cleverly outwitted Microsoft using an uncorrected weakness in the Windows Error Reporting Service (CVE-2024-26169).

This flaw provided an opportunity for attackers to enhance their privileges up to the SYSTEM level, meaning they could potentially obtain control over everything within this system. Microsoft put a stopper on this gap during March, but not before Black Basta enjoyed themselves with it.

The Symantec huntershave assembled clues that imply the exploit was utilized in nature as a zero-day, which means it is a weakness that was exploited prior to the vendor releasing a patch.

The exploit takes advantage of an oddity in how Windows manages registry keys, which gives attackers full administrative rights. The interesting part is the timing: Symantec discovered versions of this exploit that have timestamps prior to Microsoft’s patch – one even going back to December 2023.

While times can change, the absence of will to adjust in this situation supports the idea that Black Basta was early on with it.

It’s not a single vulnerability story. This is just the beginning, an introduction to modern ransomware gangs’ clever strategies. Black Basta may have a connection with the well-known Conti group, and their skill in using zero days shows how the danger continues to change.

Windows encourages organizations to apply the most recent security updates and follow the guidance of cybersecurity agencies like CISA to protect against these types of threats.

But what does this mean for us users? It’s a clear message that we need to keep our systems updated. Sometimes, it’s tempting to ignore those annoying notifications about updates, but as the Black Basta campaign shows us, being too relaxed can come with a high price.

Therefore, when you encounter this update notification in the future, perhaps reconsider before choosing “remind me later.” Ultimately, during this era of technological advancement and digital life, we all must fulfill the duty of avoiding harmful entities.

In other news, Microsoftfixed 51 CVEswith this month’s Patch Tuesday updates, so you should update your Windows 11 to the latest version as soon as possible.

More about the topics:Cybersecurity,microsoft

Flavius Floare

Tech Journalist

Flavius is a writer and a media content producer with a particular interest in technology, gaming, media, film and storytelling.

He’s always curious and ready to take on everything new in the tech world, covering Microsoft’s products on a daily basis. The passion for gaming and hardware feeds his journalistic approach, making him a great researcher and news writer that’s always ready to bring you the bleeding edge!

User forum

0 messages

Sort by:LatestOldestMost Votes

Comment*

Name*

Email*

Commenting as.Not you?

Save information for future comments

Comment

Δ

Flavius Floare

Tech Journalist

Flavius is a writer and a media content producer with a particular interest in technology, gaming, media, film and storytelling.