In an unprecedented move that is unprecedented, the US National Security Agency (NSA) has publicly revealed that it has found a serious security breach in Microsoft’s Windows 10 operating system, which could be exploited by hackers or other malicious agents.
Normally, one would expect – after the revelations of Edward Snowden – the NSA to silence the “back door” and use it properly for its own benefit.
After all, she has previously been accused of exploiting various “holes” in Microsoft products to “hack” target computers without ever notifying the company. And unfortunately, later some of these “tools” of cyber-espionage fell into the hands of regular hackers.
Microsoft has already rushed to release a “patch” for the problem, and earlier sent the security upgrade to the US military and other “sensitive” users with a rating. The NSA revealed the security breach during a press conference but did not specify how long it had known about it before revealing it to Microsoft. The Service claimed that it had warned companies in the past about similar problems, but in a discreet manner.
The problem, which also affects Windows Server 2016 and 2019, but not older versions of Windows, is present in Windows 10’s crypt32.dll program, which allows developers to access various functions, such as the digital certificates used for certification of software programs. Theoretically, the security gap allows a hacker to camouflage malicious software as legal and reliable.
NSA cybersecurity director Ann Newberger said the secret service had decided to report her involvement in the matter at Microsoft’s request, according to the BBC and Reuters. So far, according to the NSA and Microsoft, there is no evidence that a hacker has taken advantage of the security vacuum (for the NSA itself, no one can ever be sure.).
“The NSA may already have other methods of violating a Windows system, so it simply didn’t need the new security vacuum,” Chris Morales, chief analyst at cybersecurity company Vectra, told the Financial Times.
Source: RES-EIA