All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "65396",
"signature": "Article:65396",
"url": "https://staging.dailymaverick.co.za/article/2016-11-02-hackers-pounce-on-windows-crack-exposed-by-google/",
"shorturl": "https://staging.dailymaverick.co.za/article/65396",
"slug": "hackers-pounce-on-windows-crack-exposed-by-google",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Hackers pounce on Windows crack exposed by Google",
"firstPublished": "2016-11-02 05:25:21",
"lastUpdate": "2016-11-02 05:25:21",
"categories": [
{
"id": "1855",
"name": "Newsdeck",
"signature": "Category:1855",
"slug": "newsdeck",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/newsdeck/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 2595,
"contents": "\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">Hackers that Microsoft researchers call \"Strontium\" launched a low-volume spear-phishing campaign aimed at a specific set of people, Windows and Devices Group executive vice president Terry Myerson said in a blog post.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">Spear phishing involves tricking people with personally crafted email messages that get them to click on links or files booby-trapped with malicious code that infects machines, letting hackers steal information or take control.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">The vulnerability exposed this week let hackers slip into computers through web browsing software, eventually installing \"back doors\" through which they could enter as they please.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">Strontium, given an array of names by cyber security researchers, has been described as a sophisticated hacking operation with ties to Russia.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">The group has also been suspected of involvement in hacks of political parties in the US presidential race.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">In a threat report, Microsoft described Strontium as having the markings of being backed by a nation state, but did not conclude which one.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">However, the US technology titan did take aim at Google, saying that a \"responsible\" member of the industry would have put users first and waited for a patch to be ready before making the vulnerability public.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">\"Google's decision to disclose these vulnerabilities before patches are broadly available and tested is disappointing, and puts customers at increased risk,\" Myerson said.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">Google countered that it gave Microsoft seven days to fix the flaw, as per its policy regarding critical flaws, before making it public on Monday.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">\"This vulnerability is particularly serious because we know it is being actively exploited,\" Neel Mehta and Billy Leonard of the Google threat analysis group said in an online post.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">Google said it told Microsoft and Adobe about the vulnerabilities on October 21, and an update to Flash addressing the weakness was released five days later.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">Microsoft said people using the Edge browser on fully updated Windows 10 operating systems should be protected from the attack.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">\"We have coordinated with Google and Adobe to investigate this malicious campaign and to create a patch for down-level versions of Windows,\" Myerson said.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">Adobe Patches for Windows are being tested and Microsoft planned to released them on November 8.</span></p>\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">A Microsoft threat report described Strontium as a group that usually targets government agencies, diplomatic institutions and military organizations, as well as affiliated private sector organizations such as defense contractors and public policy research institutes.</span></p>\r\n<p><g class=\"gr_ gr_34 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace\" id=\"34\" data-gr-id=\"34\">gc</g><span style=\"font-family: georgia, palatino; font-size: 12pt;\">/oh</span></p>\r\n\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">© 1994-2016 Agence France-Presse</span></p>",
"teaser": "Hackers pounce on Windows crack exposed by Google",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "504",
"name": "AFP",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/afp/",
"editorialName": "afp",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "3711",
"name": "Microsoft",
"url": "https://staging.dailymaverick.co.za/keyword/microsoft/",
"slug": "microsoft",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Microsoft",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "5371",
"name": "Cyberspace",
"url": "https://staging.dailymaverick.co.za/keyword/cyberspace/",
"slug": "cyberspace",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cyberspace",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "9081",
"name": "Computer security",
"url": "https://staging.dailymaverick.co.za/keyword/computer-security/",
"slug": "computer-security",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Computer security",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10244",
"name": "Cybercrime",
"url": "https://staging.dailymaverick.co.za/keyword/cybercrime/",
"slug": "cybercrime",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybercrime",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10246",
"name": "Cyberwarfare",
"url": "https://staging.dailymaverick.co.za/keyword/cyberwarfare/",
"slug": "cyberwarfare",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cyberwarfare",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "51252",
"name": "Information technology",
"url": "https://staging.dailymaverick.co.za/keyword/information-technology/",
"slug": "information-technology",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Information technology",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "54172",
"name": "Fancy Bear",
"url": "https://staging.dailymaverick.co.za/keyword/fancy-bear/",
"slug": "fancy-bear",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Fancy Bear",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "54792",
"name": "Advanced persistent threat",
"url": "https://staging.dailymaverick.co.za/keyword/advanced-persistent-threat/",
"slug": "advanced-persistent-threat",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Advanced persistent threat",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "54793",
"name": "Information technology in Russia",
"url": "https://staging.dailymaverick.co.za/keyword/information-technology-in-russia/",
"slug": "information-technology-in-russia",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Information technology in Russia",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "54794",
"name": "Phishing",
"url": "https://staging.dailymaverick.co.za/keyword/phishing/",
"slug": "phishing",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Phishing",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "54795",
"name": "Vulnerability",
"url": "https://staging.dailymaverick.co.za/keyword/vulnerability/",
"slug": "vulnerability",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Vulnerability",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"summary": "Microsoft on Tuesday warned that a Windows vulnerability exposed by rival Google was being exploited by a hacking group suspected of cyber attacks on US political institutions.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Hackers pounce on Windows crack exposed by Google",
"search_description": "\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">Hackers that Microsoft researchers call \"Strontium\" launched a low-volume spear-phishing campaign aimed at a specific set of people,",
"social_title": "Hackers pounce on Windows crack exposed by Google",
"social_description": "\r\n<p><span style=\"font-family: georgia, palatino; font-size: 12pt;\">Hackers that Microsoft researchers call \"Strontium\" launched a low-volume spear-phishing campaign aimed at a specific set of people,",
"social_image": ""
},
"cached": true,
"access_allowed": true
}