Ransomware operators have changed their tactics (TTP) to adopt recently disclosed Microsoft #Printernightmare vulnerabilities. Cisco Talos and Crowdstrike independently have confirmed the exploitation of these vulnerabilities in the wild by multiple threat actors. Researchers have publicly confirmed the exploitation of #PrinterNightmare vulnerabilities by Magniber and Vice Society. Magniber has so far focused on targets in South Korea, while Vice Society has focused on public school districts and other educational organizations. The exploited vulnerabilities, previously commented on within Threat Watch, include:
CVE-2021-1675 – Windows Print Spooler Remote Code Execution Vuln (Patched on June 8)
CVE-2021-34527 – Windows Print Spooler Remote Code Execution Vuln (Patched on July 6-7)
CVE-2021-34481 – Windows Print Spooler Remote Code Execution Vuln (Patched on August 10)
CVE-2021-36936 – Windows Print Spooler Remote Code Execution Vuln (Patched on August 10)
CVE-2021-36947 – Windows Print Spooler Remote Code Execution Vuln (Patched on August 10)
CVE-2021-34483 – Windows Print Spooler Elevation of Privilege Vuln (Patched on August 10)
CVE-2021-36958 – Windows Print Spooler Remote Code Execution Vuln (Unpatched)