Proof-of-concept RDP vulnerability code discovered. Patch Windows now

Alert. Image from ShutterstockSophosLabs has seen proof-of-concept code on Chinese websites which tries to exploit the recently announced Microsoft RDP vulnerability, causing computers to crash.

The critical vulnerability exists in Windows, and could be exploited to spread a worm automatically between vulnerable computers.

The advice from Microsoft and Sophos is to patch your copies of Windows as soon as possible, and Microsoft warned earlier this week that it expected malicious hackers to exploit the flaw within 30 days.

Well, that’s already happening. The code we’ve seen – in the form of Python scripts – attempts to exploit the MS12-020 RDP vulnerability and causes Windows computers to blue screen. It wouldn’t be a surprise if whoever is writing this code to further develop the attacks to produce a fast-spreading internet worm.

As a result, Windows users should consider themselves on high alert and harden their defences. Microsoft has discussed the patch, and other ways to mitigate the threat, in a blog post.

Sophos is adding detection of the script we have seen as Troj/PyRDP-A.

Fake exploits for the Microsoft RDP vulnerability

Meanwhile, we have also seen what claims to be the Python script of a worm that exploits the RDP exploit.

Fake worm for exploiting Microsoft RDP flaw

The script, however, appears to be a hoax. It references a Python module that doesn’t exist (FreeRDP), and claims to be written by sabu@fbi.gov, an obvious reference to the high profile Anonymous hacker who was recently revealed to have been secretly working for the FBI for months.

The code doesn’t exploit the MS12-020 vulnerability.

[Source]

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s