The Nigerian Communications Commission has warned of a Zero-Day Vulnerability, can load a malicious QBot malware on the compromised device without triggering any Windows security alerts.
The commissin revealed this through its Computer Security Incident Response Team (NCC-CSIRT) at the weekend.
In a new advisory disclosed in a statement by its spokesperson Reuben Muoka, the NCC-CSIRT indicated that the vulnerability, which is present in all versions of Windows-based products, presents as Phishing Attacks and Malware threats.
NCC-CSIRT reports that ProxyLife security researcher discovered the new phishing exploit on Windows zero-day vulnerability to drop a Qbot malware without displaying Mark of the Web (MoTW) security warnings.
“When the link is clicked, a password-protected ZIP folder that includes another zip file and an IMG file is downloaded. Normally, launching the JS file in Windows would result in a Mark of the Web security warning because it is an Internet-based file. However, the forged signature permits the JS script to function and load the malicious QBot program without triggering any Windows security alerts,” the advisory said.