+49 (0) 821 / 80 99 46 - 0
+49 (0) 821 / 80 99 46 - 0
Request call-back
Contact us
Report a claim
exali.com My business. My insurance.
My exali login
exali.com
  • Insurance

    Professional Indemnity

    Professional Indemnity Insurance for Digital Professions

    General

    Professional Indemnity Insurance
    General Liability Insurance
    Financial Losses Insurance

    More Information

    Selected Professions
    Glossary
  • News & Stories
  • Blog
  • Product finder
    Product finder
  • My exali login
  • Report a claim
"Insurance protection tailored to your needs in Latvia"
Alberto Solorzano Kraemer
Software-/Webdevelopment & Projectassistence
Alberto Solorzano Kraemer,Software-/Webdevelopment & Projectassistence
My business. My insurance.
Alberto Solorzano Kraemer
Software-/Webdevelopment & Projectassistence
Alberto Solorzano Kraemer,Software-/Webdevelopment & Projectassistence

Already in?

With our Newsflash, you benefit from the latest news and topics relating to your business every month:

  • Tips, information and expert interviews
  • Real damage events
  • Legal matters and dangers of warnings
The perfect support for your success.

Home / News&Stories /
How you Can Protect your Business against Critical Vulnerabilities in Operating Systems or Software
Hacking attacks from Within

How you Can Protect your Business against Critical Vulnerabilities in Operating Systems or Software

Post by Daniela Reichert Post by Daniela Reichert Author
Post by Daniela Reichert Post by Daniela Reichert Author
Monday, 10 January 2022
Monday, 10 January 2022
Back to the overview

A successful cyberattack is always a nightmare for those affected - regardless of whether it’s an IT service provider or company. This is especially true if the attack did not take place via an email virus or a system attack, but through a weak point in the operating system or software used. This isn’t an outlandish scenario, as the security holes for which Microsoft released patches at the beginning of May 2021 show.

Vulnerabilities in Operating Systems or Software

Microsoft regularly provides patches to close security gaps in programs, applications and operating systems. However, some of these gaps can be so critical that they open up opportunities for cyber criminals to attack an operating system and even infect an entire network. In the worst case scenario, an exploit code may even be circulating before Microsoft provides a corresponding patch to fix the vulnerability. The latest Windows security gaps show that such a case is not that far-fetched.

A Malicious Code Gap in Windows Threatens Entire Networks

In July 2021, there was an exploit code in circulation that exploited a vulnerability in many versions of Windows. Various security researchers were able to attack fully patched systems with Windows Server 2019 and execute malicious code with system rights. In the worst case, such an attack could happen on a domain server, which would then allow attackers to spread across the network and infect other computers. The vulnerability is in the RpcAddPrinterDriverEx () function of the Windows printer spooler service and affects all versions from Windows 7 SP1 to Server 2019.

The good news for administrators: Systems can protect themselves against an attack by deactivating the print spooler service. This current example shows very well that not only external attacks, but also attacks via security gaps in operating systems, software or protocols can become a major problem. Such security gaps also existed in May 2021.

When a Trojan virus sneaks in through a hole in the system

A month before that there was another critical vulnerability (CVE-2021-31166) in the http protocol stack (http-sys). It could be used by attackers to remotely execute malicious code with kernel rights - i.e. the central component of the operating system. All that is required is to send a special package to the affected server. The Trojan could then spread like a worm in the networks and infect several computers. Windows 10 can also be affected by the vulnerability if the operating system is configured as a web server.

The second critical vulnerability (CVE-2021-28476), on the other hand, concerns Hyper-V. Hyper-V which is used, among other things, to virtualize environments. It can virtualize smaller environments as well as entire data centres and also carry out the complete network configuration without third-party tools. The security gap could cause attackers to crash the host, which in turn leads to a “Denial-of-Service” (DoS). When an attack like this occurs, requested services are no longer available or only available to a very limited extent.

Well Protected Against Cyber Damage with Professional Indemnity Add-On

But what happens if such an attack occurs in one of your customers’ networks? Who pays for such incalculable risks if the weak point that made the hacker attack or DoS attack possible in the first place came from the operating system itself? exali.com offers First-Party Cyber and Data Risks Insurance (FPC) for its Professional Indemnity Insurance for precisely such cases.  The insurance covers first-party claims related to hacker attacks, DoS attacks, cyber extortion, computer abuse through malware and ransomware, theft of data carriers and any other data infringement.

In the event of a successful attack through a Microsoft vulnerability, the resulting damage would be insured. The special thing about the add-on is that it assumes the costs and crisis management, including, for example, hiring of computer forensics specialist teams and consultants to inform data owners, reimbursement of damages and rewards in the event of extortion or fees when specialised lawyers need to be hired.

 
Calculate your premium now
 
Daniela Reichert
Author profile
Daniela Reichert
Online Editor

Daniela has been working in the areas of (online) editing, social media and online marketing since 2008. At exali, she is particularly concerned with the following topics: Risks through digital platforms and social media, cyber dangers for freelancers and IT risk coverage.
In addition to her work as an online editor at exali, she works as a freelance editor and therefore knows the challenges of self-employment from her own experience.

Author profile
Daniela Reichert
Daniela Reichert

Online Editor

Daniela has been working in the areas of (online) editing, social media and online marketing since 2008. At exali, she is particularly concerned with the following topics: Risks through digital platforms and social media, cyber dangers for freelancers and IT risk coverage.
In addition to her work as an online editor at exali, she works as a freelance editor and therefore knows the challenges of self-employment from her own experience.

Previous article
 
Back
 
Next article
These articles might also interest you
A Software Error at Pharmacies Resulted in Incorrect Information on Medications
A Software Error at Pharmacies Resulted in Incorrect Information on Medications
Customer Acquisation, Start-ups, Covid-19: An Interview with a Specialist about the Daily Work of Freelancers
Customer Acquisation, Start-ups, Covid-19: An Interview with a Specialist about the Daily Work of Freelancers
How Faulty Software Resulted in Hundreds of Innocent Employees Ending Up in Jail
How Faulty Software Resulted in Hundreds of Innocent Employees Ending Up in Jail
Lawsuits Against Game Developers: 5 Real Cases from the Video Game Industry
Lawsuits Against Game Developers: 5 Real Cases from the Video Game Industry
These articles might also interest you
A Software Error at Pharmacies Resulted in Incorrect Information on Medications
A Software Error at Pharmacies Resulted in Incorrect Information on Medications
Customer Acquisation, Start-ups, Covid-19: An Interview with a Specialist about the Daily Work of Freelancers
Customer Acquisation, Start-ups, Covid-19: An Interview with a Specialist about the Daily Work of Freelancers
How Faulty Software Resulted in Hundreds of Innocent Employees Ending Up in Jail
How Faulty Software Resulted in Hundreds of Innocent Employees Ending Up in Jail
Lawsuits Against Game Developers: 5 Real Cases from the Video Game Industry
Lawsuits Against Game Developers: 5 Real Cases from the Video Game Industry
0 Comments
Write a comment
Please fill in all areas marked as * required fields.

By clicking the ‘Send’ button, the data entered in the above form will be collected and processed for the purpose of processing your request. All data is transmitted in encrypted form and only processed within the scope of the information in the data protection information. You have a right of objection with effect for the future.

Insurance

  • Professional Indemnity for Digital Professions
  • Selected Professions
  • Report damage event

News & Stories

  • Articles
  • Videos
  • Glossary
  • Subscribe to Newsletter

About us

  • About exali
  • Jobs
  • Contact us
  • Imprint
  • Data Protection Declaration
  • Right of withdrawal
© exali AG, all rights reserved
Unfortunately, your web browser is out of date! Please update your browser in order to be able to use all functions in the premium calculator.
Choose the location of your headquarter
Depending on your country, the insurance offered by exali may vary slightly. Please select the country where you have your headquarter to get the offer that suits you best.