We’ve made several posts over the past year about “BlueKeep,” a serious exploit present in Windows 7’s remote desktop protocol (RDP) that could allow a hacker to take control of someone’s PC. Hell, we even covered recent news about the first successful use of BlueKeep attacks earlier this week, wherein hackers remotely installed cryptocurrency-mining software…
We’ve made several posts over the last year about “BlueKeep,” a excessive exploit affirm in Windows 7’s far off desktop protocol (RDP) that might allow a hacker to purchase abet a watch on of any individual’s PC. Hell, we even lined latest files concerning the first a hit use of BlueKeep attacks earlier this week, whereby hackers remotely installed cryptocurrency-mining machine on susceptible methods by technique of RDP. And correct the previous day, Microsoft’s inside of security crew posted a new warning asserting they ask BlueKeep attacks to now not entirely proceed, but expand in sophistication (and severity) as time goes on.
Recent files means that there are over 700,000 susceptible PCs that composed possess now not installed the an famous updates despite repeated urging from Microsoft, main security companies, the US authorities, and proper about each tech e-newsletter available. But what was once initially a preventative measure in opposition to hypothetical BlueKeep exploits is now the entirely come to shield in opposition to very valid attacks.
So, severely: pause ignoring the warnings and set up the safety patches to repair the Windows 7 RDP exploit asap—as in, handsome now, if seemingly. The identical goes for companies that use Windows Server 2008, Windows Server 2008 R2, and endeavor variations of Windows 7. The particular security patches on your model of Windows will even be without issues downloaded and installed from Microsoft’s legitimate substitute page.