{"id":993,"date":"2024-03-15T13:48:21","date_gmt":"2024-03-15T11:48:21","guid":{"rendered":"https:\/\/techlance.ddns.net\/?p=993"},"modified":"2024-03-15T13:49:02","modified_gmt":"2024-03-15T11:49:02","slug":"hakkerit-hyodyntavat-windows-smartscreen-haavoittuvuutta","status":"publish","type":"post","link":"https:\/\/techlance.ddns.net\/en\/hakkerit-hyodyntavat-windows-smartscreen-haavoittuvuutta\/","title":{"rendered":"Hakkerit hy\u00f6dynt\u00e4v\u00e4t Windows SmartScreen -haavoittuvuutta"},"content":{"rendered":"<p>Uusi DarkGate-haittaohjelmaoperaation hy\u00f6kk\u00e4ysten aalto k\u00e4ytt\u00e4\u00e4 hyv\u00e4ksi nyt korjattua Windows Defender SmartScreen -haavoittuvuutta ohittaakseen turvatarkastukset ja asentaakseen automaattisesti v\u00e4\u00e4rennettyj\u00e4 ohjelmistoasentajia.<\/p>\n\n\n\n<p>SmartScreen on Windowsin turvaominaisuus, joka n\u00e4ytt\u00e4\u00e4 varoituksen, kun k\u00e4ytt\u00e4j\u00e4t yritt\u00e4v\u00e4t suorittaa tunnistamattomia tai ep\u00e4ilytt\u00e4vi\u00e4 tiedostoja, jotka on ladattu internetist\u00e4.<\/p>\n\n\n\n<p>Haavoittuvuus, joka on merkitty tunnisteella CVE-2024-21412, on Windows Defender SmartScreen -haavoittuvuus, joka sallii erityisesti muotoiltujen ladattujen tiedostojen ohittaa n\u00e4m\u00e4 turvavaroitukset. Hy\u00f6kk\u00e4\u00e4j\u00e4t voivat k\u00e4ytt\u00e4\u00e4 haavoittuvuutta hyv\u00e4ksi luomalla Windowsin Internet-pikakuvakkeen (.url-tiedosto), joka osoittaa toiseen .url-tiedostoon, joka on is\u00e4nn\u00f6ity et\u00e4iselle SMB-jaolle. T\u00e4m\u00e4 aiheuttaa sen, ett\u00e4 lopullisessa sijainnissa oleva tiedosto suoritetaan automaattisesti.<\/p>\n\n\n\n<p>A new wave of attacks by the DarkGate malware operation exploits a now-fixed Windows Defender SmartScreen vulnerability to bypass security checks and automatically install fake software installers. SmartScreen is a Windows security feature that displays a warning when users attempt to run unrecognized or suspicious files downloaded from the internet. The flaw tracked as CVE-2024-21412 is a Windows Defender SmartScreen flaw that allows specially crafted downloaded files to bypass these security warnings. Attackers can exploit the flaw by creating a Windows Internet shortcut (.url file) that points to another .url file hosted on a remote SMB share, which would cause the file at the final location to be executed automatically.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-exploit-windows-smartscreen-flaw-to-drop-darkgate-malware\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-exploit-windows-smartscreen-flaw-to-drop-darkgate-malware\/<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Uusi DarkGate-haittaohjelmaoperaation hy\u00f6kk\u00e4ysten aalto k\u00e4ytt\u00e4\u00e4 hyv\u00e4ksi nyt korjattua Windows Defender SmartScreen -haavoittuvuutta ohittaakseen turvatarkastukset ja asentaakseen automaattisesti v\u00e4\u00e4rennettyj\u00e4 ohjelmistoasentajia. SmartScreen [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[9],"tags":[15],"class_list":["post-993","post","type-post","status-publish","format-standard","hentry","category-security","tag-tietoturva"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/posts\/993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/comments?post=993"}],"version-history":[{"count":0,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/posts\/993\/revisions"}],"wp:attachment":[{"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/media?parent=993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/categories?post=993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techlance.ddns.net\/en\/wp-json\/wp\/v2\/tags?post=993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}