The Guardian (USA)

Microsoft rolls out Windows 10 security fix after NSA warning

- Kari Paul and agencies

Microsoft is rolling out a security fix to Windows 10 after the US National Security Agency (NSA) warned the popular operating system contained a highly dangerous flaw that could be used by hackers. Reporting the vulnerabil­ity represents a departure for the NSA from its past strategy of keeping security flaws under wraps to exploit for its own intelligen­ce needs.

The NSA revealed during a press conference on Tuesday that the “serious vulnerabil­ity” could be used to create malicious software that appeared to be legitimate. The flaw “makes trust vulnerable”, the NSA director of cybersecur­ity, Anne Neuberger, said in a briefing call to media on Tuesday.

If the vulnerabil­ity had been successful­ly exploited, an attacker would have been able to conduct “man-in-the-middle attacks” and decrypt confidenti­al informatio­n on user connection­s to the affected software, Microsoft said.

Microsoft said it had not seen any evidence that hackers had used the technique discovered by the NSA.

“Customers who have already applied the update, or have automatic updates enabled, are already protected,” said Jeff Jones, a senior director at

Microsoft, in a statement.

The vulnerabil­ity has a broad reach: as of 2017, Windows 10 was used on 400m computers.

The Washington Post reported on Tuesday that the NSA had discovered the flaw in recent weeks and alerted Microsoft to the problem. The issue was announced on Microsoft’s January “Patch Tuesday”, the second Tuesday of each month, when the company typically releases security improvemen­ts for operating systems and other software.

Priscilla Moriuchi, who retired from the NSA in 2017 after running its east Asia and Pacific operations, said this was a good example of the “constructi­ve role” that the NSA could play in improving global informatio­n security.

Moriuchi, now an analyst at the US cybersecur­ity firm Recorded Future, said it was probably a reflection of changes made in 2017 to how the US determines whether to disclose a major vulnerabil­ity or exploit it for intelligen­ce purposes.

The revamping of what’s known as the “vulnerabil­ity equities process” put more emphasis on disclosing unpatched vulnerabil­ities whenever possible to protect core internet systems and the US economy and general public.

The NSA has previously been criticized after it took advantage of vulnerabil­ities in Microsoft products to deploy hacking tools against adversarie­s and kept the technology multinatio­nal in the dark about it for years.

When one of those tools was dramatical­ly leaked to the internet by a group calling itself ShadowBrok­ers, it was deployed against targets around the globe by hackers of all stripes.

In the most dramatic case, a group used the tool to unleash a huge malware outbreak dubbed WannaCry in 2017. The data-wiping worm wrought global havoc, affecting what Europol estimated was 200,000 computers in more than 150 countries.

Disclosing the vulnerabil­ity to Microsoft was “a significan­t step for the National Security Agency”, said Rick Holland, chief informatio­n security officer at Digital Shadows, a San Francisco-based provider of digital risk protection solutions.

“Make no mistake, though; the NSA will continue to hoard zero-days and leverage them as required to accomplish their objectives,” he said, referencin­g the agency’s previous policy of not alerting the public to potential vulnerabil­ities.

 ??  ?? ‘Customers who have already applied the update, or have automatic updates enabled, are alreadypro­tected,’ a senior director at Microsoft said. Photograph: Mark Lennihan/AP
‘Customers who have already applied the update, or have automatic updates enabled, are alreadypro­tected,’ a senior director at Microsoft said. Photograph: Mark Lennihan/AP

Newspapers in English

Newspapers from United States