Critical Security Flaw Hits Windows 7 and 8 Hardest
Microsoft has warned users of a significant unpatched security flaw in Windows. It's offered some key steps to take while the problem is being fixed.
The problem affects all currently supported versions of Windows, though Windows 7 and 8 machines are affected 'critically' according to the Microsoft advisory bulletin. Attacks on Windows 10 machines are considerably more constrained due to its enhanced security features.
Microsoft says its currently only aware of targeted attacks on Windows 7 machines, though that could change now the bug has been made public. (Source: microsoft.com)
Adobe Type Manager is the Problem
The problem is with the Windows Adobe Type Manager Library, which handles typefaces. The vulnerability could allow attackers to remotely execute code on the machine, which constitutes a "critical security risk."
In this case, the malicious document can be programmed to download a malicious program onto the system, then execute it with the highest privileges. In turn, this can grant cyber criminals unrestricted access to the system using remote access.
Once a remote connection is enabled, cyber criminals (or "bots") will infiltrate the system and network, where a payload (typically ransomware) is delivered. Once ransomware is on the system, all files are encrypted and the only way to get it back is by paying cyber criminals thousands of dollars or by using a backup to restore data, if available.
Windows 7 Users: Read Carefully
Since Windows 7 has officially reached its end of life in January 2020, this exploit is particularly worrying for those who continue to use the operating system despite it being no longer supported by Microsoft. This means that Windows 7 will no longer receiving security updates to patch bugs, as what's mentioned in this article.
It is for this reason that anyone who uses Windows 7 should upgrade their systems (preferably to Windows 10). If you need help with the upgrade, contact Dennis as he can do it for you using his remote desktop support service.
Related:
- Windows 7 No Longer Safe to Use in 2020 - Here's Why
- Explained: Is Ransomware a Real Threat? Should I worry?
- How to Prevent Ransomware in 2018 - 10 Steps
How the Attack Works
The attack works in two ways: by the victim opening a specially crafted document, or by the victim viewing the document in the Preview Pane feature of Windows Explorer or File Explorer.
Fortunately such attacks are more limited in Windows 10 thanks to its sandboxing feature, which means the attacker could only run code in a restricted "area" of the computer, rather than accessing other resources as with Windows 7 machines, for example.
Temporary Workaround: How to Protect Against Attacks
One option for users of older systems is to find and rename a file called ATMFD.DLL, though
this solution is for particularly confident users only. Instead, Microsoft recommends the best option is to disable the Preview feature.
To disable the Preview feature for Windows 10:
- Open Windows Explorer, then click the View tab.
- Clear both the Details pane and Preview pane menu options.
- Click Options, and then click Change folder and search options.
- Next, click the View tab.
- Under Advanced settings, check the Always show icons, never thumbnails box.
- Close all open instances of Windows Explorer for the change to take effect or reboot the machine.
For earlier versions of Windows, the Preview feature can be disabled using the following method:
- Open Windows Explorer, click Organize, and then click Layout.
- Clear both the Details pane and Preview pane menu options.
- Next, click Organize, and then click Folder and search options.
- Click the View tab. Under Advanced settings, check the Always show icons, never thumbnails box.
- Close all open instances of Windows Explorer for the change to take effect, or reboot the machine.
Another protective measure is to disable the Windows WebClient service:
- Click Start, click Run (or press the Windows Key and R on the keyboard), type Services.msc and then click OK.
- Right-click WebClient service and select Properties.
- Change the Startup type to Disabled. If the service is running, click Stop.
- Click OK and exit the management application.
As well as making these changes, Microsoft recommends taking particular care at this to be wary of downloading or opening unexpected or suspicious file attachments.
What's Your Opinion?
Had you heard of this risk before reading this article? Should Microsoft have a way to directly contact Windows users when such a threat appears? Should Microsoft remotely disable the Preview feature if that were technically possible?
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.
Comments
you need permition from trusted installer
to rename ATMFD.DLL