You may have seen in the media recently that a new cyber nasty has been discovered by the NSA (National Security Agency in the US). It was discovered in January 2020 and the media are calling it CryptoAPI, Microsoft officially call it “Windows CryptoAPI Spoofing Vulnerability”.
The vulnerability is all to do with website certificates and how they prove the website can be trusted by the means of the small padlock you get in the address bar. The padlock means the website has been independently trusted.
Without the security update from Microsoft affecting Windows 10 and Windows Server 2016 means an attacker could use a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted and legitimate source. You or your staff would have no way of knowing the file was malicious as the digital signature would appear to be from a trusted provider tricking them potentially to enter confidential information such as passwords or credit card information.
We use advanced tools to manage and update systems as standard in our service and the team here monitor technical news feeds for information that could potentially impact our clients. We have already rolled out the security patch over the weekend of the 18th January 2020.