Breaking News: BlueKeep Worm Poses A Threat to Microsoft Users

Listen Now

Table of Contents

On Monday, June 17th, the Cybersecurity and Infrastructure Security Agency (CISA), a sub agency of the Department of Homeland Security, released a critical warning targeted towards Microsoft Windows users. This alert, which is only the third alert to be issued by the CISA in 2019, warns users of a potential malware threat, referred to as BlueKeep.  


BlueKeep, also known as CVE-2019-0708, is a computer worm that was discovered in May 2019. Its origins are either unknown or have yet to be publicly released. However, the situation mirrors the WannaCry attacks that occurred in mid-May 2017, which have since been linked to North Korea.

 

Breaking News Blog Graphic02

 

Although the word “virus” is often used an all-encompassing term for malware, computer worms are equally, if not more, dangerous. A worm does not attach itself to a specific location or file, but instead, it enters many computers through a vulnerability on a shared network or operating system.

 

Unlike viruses, worms do not require human initiation to infect a device. Because of this, worms have the ability to replicate themselves and quickly spread to other computers. In the case of the BlueKeep worm, which affects international Microsoft systems, this worm has the potential to disrupt users worldwide.

Breaking News Pull Out Quote

 

According to the CISA alert, the BlueKeep worm has the potential ability to take control of an infected system by sending “specially crafted packets” to one of the previously listed operating systems. After successfully sending the packets, the worm would have the capacity to add “accounts with full user rights,” edit or delete data, and install programs.

 

If left untreated, we expect the attackers to begin exploiting the hacked data within the next few weeks. Luckily, Microsoft has issued a patch, that if installed, should protect systems from being infected. However, if left unpatched, upwards of a million machines are left vulnerable to the BlueKeep worm.

 

Unfortunately, the threat does not stop there. BlueKeep’s wormlike traits enable it to replicate itself and slither onto other devices via internal networks. A BlueKeep attack could use older Windows systems as a gateway to infiltrate many more computers. A breach of this scale would cause global devastation, similar to the WannaCry crisis.

 

To protect your business, it is imperative that you install the Microsoft patches. You can also protect your business by properly configuring your Remote Desktop Protocol by avoiding access to public internet, or disabling your RDP until the patches are installed.

Categories: Security, Cyber Security, Network Security

blogs related to this

Automated Malware Analysis: What is it?

Automated Malware Analysis: What is it?

There’s one thing that every business, irrespective of size, sector, or geography, would have noticed in the last couple of years: Cyber threats are...

AI Model Poisoning: What It Is, How It Works, and How to Prevent It

AI Model Poisoning: What It Is, How It Works, and How to Prevent It

Artificial intelligence (AI) is becoming indispensable to organizations. We’ve seen the best of AI capabilities unlocked across the most diverse...

Top 10 Generative AI Security Risks and How to Protect Your Business

Top 10 Generative AI Security Risks and How to Protect Your Business

Even in the exciting field of artificial intelligence (AI) and automation, generative AI or GenAI stands out as particularly fascinating. Across...

Top 7 AI Security Threats and How to Protect Your Business

Top 7 AI Security Threats and How to Protect Your Business

Artificial Intelligence (AI) is creating an attack surface that's evolving rapidly. As AI technologies create new vulnerabilities, organizations need...

AI-Driven Malware and Attacks and How to Respond to Them

AI-Driven Malware and Attacks and How to Respond to Them

Artificial Intelligence (AI) is evolving incredibly quickly, and many businesses are struggling to keep up. When it comes to cybersecurity, failure...

How to Develop a Cybersecurity Strategy

How to Develop a Cybersecurity Strategy

In 2025 and beyond, cybersecurity shouldn’t be seen as just another challenge. It’s a core pillar of every successful business (both in the public...

Shadow AI Risks: What Are They?

Shadow AI Risks: What Are They?

The widespread adoption of artificial intelligence (AI) tools and technologies can provide companies with a bouquet of exciting benefits, like...