Cybercriminals are using a security vulnerability called BlueKeep to install malicious software on devices using older versions of Windows

Cybercriminals are using a security vulnerability called BlueKeep. To install malicious software on devices using older versions of Windows. The Australian Cyber Security Centre has received numerous reports regarding this threat. Devices that don’t have the latest software updates. Once the hackers have access to your system through the BlueKeep exploit. Cybercriminals can install malicious software that mines virtual currency. Install ransomware that locks up your data or steal your personal or financial information.

Does it affect me?

If you are using older versions of Microsoft software, you might be at risk. Microsoft has provided free patches for vulnerable software versions. For instance: Windows 7, Windows Server 2008 R2, and Windows Server 2008. Out-of-support systems including Windows 2003 and Windows XP.

How do I stay safe?

If your system is running Window’s software that is older than Windows 10. Kindly download the free updates to fix the also BlueKeep vulnerability (“patches”) available from Microsoft. Little time spent patching your Windows now could save you or your business weeks or months repairing the damage caused by a cybercriminal. If you’re a business and you are required to use Remote Desktop Protocol (RDP) such as for remote administration or any other task, it is necessary that you install the relevant patches and implement the other mitigation advice provided by the ACSC:

Bluekeep Advisory – CVE-2019-0708. For security reasons, Window’s users shouldn’t access RDP directly from the internet. It is also better to use Virtual Private Network with two-factor authentication if RDP is required, whichever version of Window’s you are running. You can also reach us at 1300 660 368 and one of our team members can help you in staying safe from the BlueKeep vulnerability.

Leave a Reply

Your email address will not be published. Required fields are marked *

*
*