Microsoft’s product vulnerabilities are hackers’ favorite targets

3 minute read
microsoft software vulnerability

Recorded Future’s latest cyber attacks and exploit-related reports show interesting facts. The company aims to organize and analyze known and unknown threat data in advanced ways for faster and enhanced security.

According to the company, most flaws that cybercriminals have been using during the course of 2017 in their exploit kits and phishing attacks were found in products made by Microsoft. Recorded Future also reported that some of these vulnerabilities were a few years old.

What’s new in the 2017 reports

The security vendor analyzed thousands of deep forum postings, code repositories, and dark web onion sites back in 2016 and with their latest 2017 report, they continued the work in order to find more known software vulnerabilities.

In the 2015 and 2016 reports, the company found that Adobe Flash had the highest rankings, and now Microsoft seems to be the leader with 7 out of ten top flaws.

Recorded Future explains that:

[…] analysis identified a shift in preference from Adobe to Microsoft consumer product exploits. This is in stark contrast to our previous rankings. Analysis of these sources from January 1, 2017, to December 31, 2017, shows that Adobe is still somewhat popular among cybercriminals but quickly declining.
Some of this change is due to evolving criminal use of exploited vulnerabilities. Overall, exploit kits are declining as criminal efforts have adapted — cryptocurrency mining malware popularity has risen in the past year, for example.

Most common flaws found in Microsoft’s products

windows 10 security

One of the vulnerabilities that were mostly observed in 2017 was CVE-2017-0199, and it was lurking in a few Microsoft Office products.

This allowed hackers to download then execute a Visual Basic script that included Powershell commands from malicious files. This flaw was found in various phishing attacks and exploit builders for this vulnerability were spotted on the dark web being sold for about $400 to $800.

Another significant and frequent vulnerability was CVE-2016-0189 which was listed in the ranking from 2016. The flaw was related to Internet Explorer and offers an easy way for exploit kits used in 2017.

There’s a stringent need to patch all known vulnerabilities

The data released in Recorded Future’s reports should remind everyone the strong need to patch all known issues and flaws. Their reports have also shown a drop in exploit kit activity which stemmed from the decline in Flash Player usage. Users have shifted to more secure browsers, but cybercriminals, as well.

Advice for increased security

Recorded Future advises users to follow a few essential steps in order to enhance security:

  • Choose Google Chrome as the primary browser
  • Enhance user training
  • Backup your system as frequently as possible
  • Use ad blockers
  • Remove affected software
  • Be aware of social media that uses Flash and exposes users to cyber risks.

We highly recommend CyberGhost, a leading VPN provider. It protects your PC from attacks while browsing, masks your IP address and blocks all unwanted access to your computer.


You can learn more about the complete set of known flaws on Recorded Future’s 2017 Vulnerability Report.

RELATED STORIES TO CHECK OUT:

Next up

Windows 10 April Update will probably land on April, 30

By: Costea Lestoc
2 minute read

The next feature update targeting Windows 10 might be called Windows 10 April Update. This information originates in Microsoft Edge’s welcome page. In a server-side […]

Continue Reading

Windows 10 Lean/CloudE is a smaller version of Redstone 5

By: Costea Lestoc
2 minute read

There’s a new version of Windows in the works these days, and it may target low-specs devices. Microsoft is currently working on a cut down […]

Continue Reading

How to Schedule Automatic Shutdown in Windows 10

By: Ivan Jenic
3 minute read

Sometimes you might want to schedule certain tasks, especially if you don’t have enough time to do them manually. If you want to learn more […]

Continue Reading

Discussions