<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Vulnerabilities &#8211; Tech AI Connect</title>
	<atom:link href="https://techaiconnect.com/tag/security-vulnerabilities/feed/" rel="self" type="application/rss+xml" />
	<link>https://techaiconnect.com</link>
	<description>All Tek Information for You</description>
	<lastBuildDate>Mon, 25 Nov 2024 02:16:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>Hackers Exploit Vulnerable Avast Driver in New Malicious Campaign</title>
		<link>https://techaiconnect.com/hackers-exploit-vulnerable-avast-driver-in-new-malicious-campaign/</link>
					<comments>https://techaiconnect.com/hackers-exploit-vulnerable-avast-driver-in-new-malicious-campaign/#respond</comments>
		
		<dc:creator><![CDATA[techai]]></dc:creator>
		<pubDate>Mon, 25 Nov 2024 02:16:00 +0000</pubDate>
				<category><![CDATA[AMOS malware]]></category>
		<category><![CDATA[Avast]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Security Processes]]></category>
		<category><![CDATA[Security Vulnerabilities]]></category>
		<guid isPermaLink="false">https://techaiconnect.com/hackers-exploit-vulnerable-avast-driver-in-new-malicious-campaign/</guid>

					<description><![CDATA[A recent discovery by cybersecurity experts reveals a dangerous new trend in cyber attacks — the use of a legitimate but outdated Avast Anti-Rootkit d]]></description>
										<content:encoded><![CDATA[<p>A recent discovery by cybersecurity experts reveals a dangerous new trend in cyber attacks — the use of a legitimate but outdated Avast Anti-Rootkit driver to bypass security measures and take control of targeted systems. This campaign, identified by researchers at Trellix, focuses on a variant of malware known as AV Killer, unlinked to any specific virus family, indicating a sophisticated approach by cybercriminals to evade detection. </p>
<p>The malware associated with this attack, known as kill-floor.exe, deploys the vulnerable driver, named ntfs.bin, into a standard Windows user folder. By utilizing a method referred to as ‘bring-your-own-vulnerable-driver’ (BYOVD), it exploits the driver’s kernel-level capabilities, granting the malicious software substantial access to critical operating system functions. This access allows the malware to identify and terminate a wide array of security processes. </p>
<p>The alarming aspect of this malware is its hardcoded list of 142 specific security processes from various well-known vendors, which it uses to identify targets on a compromised system. According to Trellix researcher Trishaan Kalra, when the malware recognizes a match within the active processes, it “creates a handle to reference the installed Avast driver,” enabling it to issue commands to disable security measures through the ‘DeviceIoControl’ API. </p>
<p>The potential victims are primarily solutions from leading cybersecurity vendors including McAfee, Symantec (Broadcom), Sophos, Avast, Trend Micro, Microsoft Defender, SentinelOne, ESET, and BlackBerry. With the targeted defenses disarmed, the malware can carry out its malicious objectives in stealth mode, effectively avoiding user alerts or detection by security systems.</p>
<p>Notably, similar tactics utilizing the Avast Anti-Rootkit driver were observed as early as 2022, when researchers investigated the AvosLocker ransomware attacks. Further back, in December 2021, the Incident Response Services team from Stroz Friedberg uncovered that Cuba ransomware also relied on this same abuse of the Avast driver to neutralize security solutions on targeted systems. Around the same time, SentinelLabs revealed the existence of two critical vulnerabilities (CVE-2022-26522 and CVE-2022-26523) that had lingered since 2016, both capable of being exploited to elevate privileges and disable security products. Despite being reported to Avast in late 2021, fixes for these issues were implemented quietly via security updates. </p>
<p>To mitigate the risks of similar attacks that leverage such vulnerable drivers, cybersecurity experts advise employing rules that can detect and prevent unauthorized components based on their unique signatures or hashes. Solutions like the vulnerable driver blocklist policy file, provided by Microsoft, can also be instrumental in thwarting these types of attacks. This blocklist is routinely updated with each major Windows release, and since the rollout of Windows 11 in 2022, it has been automatically activated on all devices, providing an additional layer of security.  </p>
<p>As cyber threats evolve, users are urged to remain vigilant and utilize effective security measures to protect against increasingly sophisticated tactics employed by cybercriminals. This alarming development in the world of hacking serves as a crucial reminder of the need for continuous improvements in cybersecurity protocols and solutions.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techaiconnect.com/hackers-exploit-vulnerable-avast-driver-in-new-malicious-campaign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Nvidia Issues Urgent Security Warning for All GeForce GPU Owners</title>
		<link>https://techaiconnect.com/nvidia-issues-urgent-security-warning-for-all-geforce-gpu-owners/</link>
					<comments>https://techaiconnect.com/nvidia-issues-urgent-security-warning-for-all-geforce-gpu-owners/#respond</comments>
		
		<dc:creator><![CDATA[techai]]></dc:creator>
		<pubDate>Tue, 29 Oct 2024 14:45:02 +0000</pubDate>
				<category><![CDATA[Driver Updates]]></category>
		<category><![CDATA[GeForce GPUs]]></category>
		<category><![CDATA[Nvidia]]></category>
		<category><![CDATA[RTX Quadro]]></category>
		<category><![CDATA[Security Vulnerabilities]]></category>
		<guid isPermaLink="false">https://techaiconnect.com/nvidia-issues-urgent-security-warning-for-all-geforce-gpu-owners/</guid>

					<description><![CDATA[Nvidia, a leading graphics card manufacturer, has issued an urgent warning to all GeForce GPU users about several critical security vulnerabilities th]]></description>
										<content:encoded><![CDATA[<p>Nvidia, a leading graphics card manufacturer, has issued an urgent warning to all GeForce GPU users about several critical security vulnerabilities that have been detected in its display drivers and related software. The company has identified a total of eight distinct vulnerabilities, each categorized with a “High” severity rating, signaling the need for immediate action by users.</p>
<p>According to an alert released by Nvidia, these vulnerabilities could potentially allow attackers to gain complete access to a victim&#8217;s system. If successfully exploited, hackers may infiltrate the system to execute malicious code, posing significant threats to the integrity and confidentiality of personal data stored on the device. This level of access means that sensitive information could be read and stolen without the user&#8217;s knowledge.</p>
<p>The vulnerabilities are not limited to specific models but instead affect a wide array of Nvidia’s software, including systems powered by GeForce, Nvidia RTX, Quadro, NVS, and Tesla GPUs, across both Windows and Linux platforms. Although Nvidia has not confirmed whether any of these vulnerabilities are being actively exploited by malicious actors, the broad impact across all GeForce graphics cards suggests a serious and widespread issue that users need to prioritize.</p>
<p>To remediate these vulnerabilities, Nvidia has released updated drivers that users are encouraged to install immediately. For Windows users, the latest driver version is 566.03, while Linux users should upgrade their systems to versions 565.57.01, 550.127.05, or 535.216.01. Additionally, some Nvidia distributors may have provided security updates under alternate version numbers such as 565.92, 561.03, 556.35, and 553.05.</p>
<p>For those utilizing Nvidia RTX, Quadro, or NVS graphics cards, the corresponding update versions to address these issues are 566.03, 553.24, and 538.95. Users can obtain the necessary updates through Nvidia&#8217;s Manual Driver Search tool; updated drivers are also conveniently available via the Nvidia App and GeForce Experience app. Given the scale of potential risks, federating these updates as soon as possible is crucial for safeguarding user systems from possible attacks.</p>
<p>In light of these developments, it serves as a stark reminder for all GeForce GPU users to maintain not only the best performance of their graphics cards but also to prioritize their security by ensuring their driver software is up to date. Staying informed and vigilant about software updates is essential in mitigating security risks in today&#8217;s increasingly digital environment. Understanding the importance of these updates can help users protect their data and systems from harmful intrusions.  </p>
<p>With the tech landscape continuously evolving, it is vital for users to adapt and ensure that they are protected against ongoing vulnerabilities in hardware and software alike.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techaiconnect.com/nvidia-issues-urgent-security-warning-for-all-geforce-gpu-owners/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
