A few days ago , Microsoft issuedVulnerability-related.PatchVulnerabilityan emergency patch for Internet Explorer to fixVulnerability-related.PatchVulnerabilitya zero-day vulnerability in the web browser . The problem affectsVulnerability-related.DiscoverVulnerabilityversions of Internet Explorer from 9 to 11 across multiple versions of Windows , but it seems that the patch has been causing problems for many people . Specifically , people with some Lenovo laptops have found that after installingVulnerability-related.PatchVulnerabilitythe KB4467691 patch they are unable to start Windows . When the patch was releasedVulnerability-related.PatchVulnerability, it was known that there were a few issues with older versions of Windows 10 -- for example , problems with the .NET framework , and with web links in the Start menu . But since the initial release , Microsoft has updatedVulnerability-related.PatchVulnerabilitythe patch page to indicateVulnerability-related.DiscoverVulnerabilitya further potential problem with some Lenovo laptops : After installing KB4467691 , Windows may fail to startup on certain Lenovo laptops that have less than 8 GB of RAM . The company goes on to suggest a couple of possible workarounds for those running into issues : Restart the affected machine using the Unified Extensible Firmware Interface ( UEFI ) . Disable Secure Boot and then restart . If BitLocker is enabled on your machine , you may have to go through BitLocker recovery after Secure Boot has been disabled . Microsoft says that it is `` working with Lenovo and will provideVulnerability-related.PatchVulnerabilityan update in an upcoming release '' .
A bug in the way that Mobile Safari handles pop-up dialogs has been abused to scare iOS users into paying a “fine”Attack.Ransomin the form of an iTunes pre-paid card . “ This attack was initially reported to Lookout ’ s Support desk by one of our users running iOS 10.2 . “ The user provided a screenshot showing a ransomware message from pay-police [ . ] com , with an overlaid ‘ Can not Open Page ’ dialog from Safari . Each time he tapped ‘ OK ’ he would be prompted to tap ‘ OK ’ again , effectively putting the browser into an infinite loop of dialog prompts that prevented him from using the browser ” . The scammers have purchased a large number of different domains , and equipped them with obfuscated JavaScript code that would trigger the bug in Mobile Safari . The intended targets were mostly from English-speaking countries : the US , the UK , Ireland , Australia and New Zealand . The attack was contained within Safari ’ s sandbox , so the victims ’ devices were not actually compromised.The attackers banked on users ’ fear and shame to pull the scam off . Lookout notified Apple of the attack , and the iThings manufacturer fixedVulnerability-related.PatchVulnerabilitythe abused flaw in iOS 10.3 , which was releasedVulnerability-related.PatchVulnerabilityon Monday . “ The pop-up window error dialog on newer versions of iOS is actually the result of Mobile Safari not being able to find a local URL lookup , so it fails , but keeps presenting the dialog message due to the infinite loop in the code , ” the researchers explained . “ The attack , based on its code , seems to have been developed for older versions of iOS , such as iOS 8 . However , the abuse of pop-ups in Mobile Safari was still possible until iOS 10.3 ” . With the new iOS version , these pop-ups won ’ t be locking the entire browser , but just that one tab , which can be simply closed and the user can continue using the browser like nothing happened . Users are advised to update their iOS-running iThings to version 10.3 to close up this particular attack vector
In a string of attacks that have escalated over the past 48 hours , hackers are actively exploiting a critical vulnerability that allows them to take almost complete control of Web servers used by banks , government agencies , and large Internet companies . The code-execution bug resides inVulnerability-related.DiscoverVulnerabilitythe Apache Struts 2 Web application framework and is trivial to exploit . Although maintainers of the open source project patchedVulnerability-related.PatchVulnerabilitythe vulnerability on Monday , it remains under attack by hackers who are exploiting it to inject commands of their choice into Struts servers that have yet to install the update , researchers are warningVulnerability-related.DiscoverVulnerability. Making matters worse , at least two working exploits are publicly available . `` We have dedicated hours to reporting to companies , governments , manufacturers , and even individuals to patchVulnerability-related.PatchVulnerabilityand correct the vulnerability as soon as possible , but the exploit has already jumped to the big pages of 'advisories , ' and massive attempts to exploit the Internet have already been observed . '' Researchers at Cisco Systems said they are seeing a `` high number of exploitation events '' by hackers attempting to carry out a variety of malicious acts . One series of commands that attackers are injecting into webpages stops the firewall protecting the server and then downloads and executes malware of the attacker 's choice . The payloads include `` IRC bouncers , '' which allow the attackers to hide their real IP address during Internet chats ; denial-of-service bots ; and various other packages that conscript a server into a botnet . `` These are several of the many examples of attacks we are currently observing and blocking , '' Cisco 's Nick Biasini wrote . `` They fall into two broad categories : probing and malware distribution . The payloads being delivered vary considerably , and to their credit , many of the sites have already been taken down and the payloads are no longer available . '' The vulnerability resides inVulnerability-related.DiscoverVulnerabilitywhat 's known as the Jakarta file upload multipart parser , which according to official Apache Struts 2 documentation is a standard part of the framework and needs only a supporting library to function . Apache Struts versions affected byVulnerability-related.DiscoverVulnerabilitythe vulnerability include Struts 2.3.5 through 2.3.31 , and 2.5 through 2.5.10 . Servers running any of these versions should upgrade toVulnerability-related.PatchVulnerability2.3.32 or 2.5.10.1 immediately . It 's not clear why the vulnerability is being exploitedVulnerability-related.DiscoverVulnerabilityso widely 48 hours after a patch was releasedVulnerability-related.PatchVulnerability. One possibility is that the Apache Struts maintainers did n't adequately communicate the risk . Although they categorizeVulnerability-related.DiscoverVulnerabilitythe vulnerability security rating as high , they also describeVulnerability-related.DiscoverVulnerabilityit as posing a `` possible remote code execution '' risk . Outside researchers , meanwhile , have said the exploits are trivial to carry out , are highly reliable , and require no authentication . It 's also easy to scan the Internet for vulnerable servers . It 's also possible to exploit the bug even if a Web application does n't implement file upload functionality . Update 3/9/2017 10:07 California time : In a comment to this post , Ars Technology Editor Peter Bright providesVulnerability-related.PatchVulnerabilitya much more plausible explanation for the delay in patchingVulnerability-related.PatchVulnerabilitythis highly critical vulnerability . Most bug fixesVulnerability-related.PatchVulnerability, he pointed out , require downloading and installing a patch , possibly rebooting a machine , and being done with it .