{"id":4380,"date":"2021-08-09T08:17:00","date_gmt":"2021-08-09T06:17:00","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=4380"},"modified":"2024-05-15T11:36:07","modified_gmt":"2024-05-15T09:36:07","slug":"critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/","title":{"rendered":"Critical VMware vulnerabilities \/ LockBit 2.0. recruits insiders \/ Super Duper Secure Mode in Microsoft Edge"},"content":{"rendered":"\n<p>Critical VMware vulnerabilities are not the only problem faced by this virtualization software vendor last week. Do you remember the <a href=\"https:\/\/xopero.com\/blog\/en\/blackmatter-haron-newborns-or-rebirths-apple-urgent-update-ubel-is-the-new-oscorp-2\/#paragraph-1\" target=\"_blank\" rel=\"noreferrer noopener\">BlackMatter group <\/a>that proclaimed itself to be the successor of REvil we warned you against in the last issue? It already has an encryption program targeting VMware ESXi. Today we also describe a unique business model of the new LockBit 2.0. and a cyberespionage campaign targeting the largest telecoms. For the sake of balance, we are describing a new project from Microsoft &#8211; with &#8222;Super Duper Secure Mode&#8221; the company wants to change the landscape of exploits and increase the cost of attacks.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"critical-vmware-vulnerabilities-affecting-multiple-products-now-patched\"><strong>Critical VMware vulnerabilities<\/strong> <strong>affecting multiple products now patched!<\/strong><\/h2>\n\n\n<p>VMware has released security updates for multiple products to address a critical vulnerability. It could be exploited to gain access to confidential information.<\/p>\n\n\n\n<p>Tracked as CVE-2021-22002 (CVSS score: 8.6) and CVE-2021-22003 (CVSS score: 3.7), the flaws affect VMware Workspace One Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation, and vRealize Suite Lifecycle Manager.<\/p>\n\n\n\n<p>CVE-2021-22002 concerns an issue with how VMware Workspace One Access and Identity Manager allow the &#8222;\/cfg&#8221; web app and diagnostic endpoints to be accessed via port 443 by tampering with a host header, resulting in a server-side request.<\/p>\n\n\n\n<p>Also addressed by VMware is an information disclosure vulnerability impacting VMware Workspace One Access and Identity Manager through an inadvertently exposed login interface on port 7443. An attacker with network access to this port could potentially stage a brute-force attack, which the firm noted: &#8222;may or may not be practical based on lockout policy configuration and password complexity for the target account.&#8221;<\/p>\n\n\n\n<p>For customers who cannot upgrade to the latest version, VMware is offering a <a href=\"https:\/\/kb.vmware.com\/s\/article\/85255\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">workaround script <\/a>for CVE-2021-22002. It can be deployed independently without taking the vRA appliances offline.<\/p>\n\n\n\n<p><strong>It\u2019s not the only problem VMware had last week. <\/strong>Do you remember the <a href=\"https:\/\/xopero.com\/blog\/en\/blackmatter-haron-newborns-or-rebirths-apple-urgent-update-ubel-is-the-new-oscorp-2\/#paragraph-1\" target=\"_blank\" rel=\"noreferrer noopener\">BlackMatter ransomware group<\/a> we warned you against in the previous Security Center issue? Well, last week, researchers from MalwareHunterTeam spotted a Linux ELF64 encryptor for the BlackMatter ransomware gang that was designed to target VMware ESXi servers. So, as we can see, they act pretty fast.\u00a0<\/p>\n\n\n\n<p>Sources <a href=\"https:\/\/thehackernews.com\/2021\/08\/vmware-issues-patches-to-fix-critical.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">1<\/a> | <a href=\"https:\/\/securityaffairs.co\/wordpress\/120862\/cyber-crime\/blackmatter-ransomware-linux-version.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2<\/a><a href=\"https:\/\/thehackernews.com\/2021\/08\/vmware-issues-patches-to-fix-critical.html\" target=\"_blank\" rel=\"noreferrer noopener\">&nbsp;<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"lockbit-ransomware-recruiting-corporate-insiders-to-breach-networks\"><strong>LockBit ransomware recruiting corporate insiders to breach networks<\/strong><\/h2>\n\n\n<p>The LockBit 2.0 ransomware gang is actively recruiting corporate insiders who can help them breach and encrypt networks. In return, they promise million-dollar payouts.<\/p>\n\n\n\n<p><strong>RaaS in a nutshell:<\/strong> Many ransomware gangs operate as a Ransomware-as-a-Service (RaaS), which consists of a core crew of developers, who maintain the ransomware and payment sites, and recruited affiliates who breach victims&#8217; networks and encrypt devices. Then they split ransom payment between the core group and the affiliate, while the affiliate gets usually 70-80%. There is a third side of the coin &#8211; in many cases, the affiliates purchase access to networks from pentesters rather than breaching the company themselves.&nbsp;<\/p>\n\n\n\n<p>With LockBit 2.0, the ransomware gang is trying to remove the middle-man and instead recruit insiders to provide them access to a corporate network.&nbsp;<\/p>\n\n\n\n<p>Let us remind you &#8211; in June LockBit ransomware operation announced the launch of the new LockBit 2.0. ransomware-as-a-service project. It includes redesigned Tor sites and multiple advanced features, together with automatic encrypting of devices on a network via group policies.<\/p>\n\n\n\n<p>They have also changed the Windows wallpaper that is placed on encrypted devices. Now it offers &#8222;millions of dollars&#8221; for corporate insiders who provide access to networks where they have an account.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2021\/08\/Lockbit-wallpaper-1.jpg\"><img decoding=\"async\" width=\"1600\" height=\"780\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2021\/08\/Lockbit-wallpaper-1.jpg\" alt=\"\" class=\"wp-image-4381\"\/><\/a><figcaption>Source: Bleeping Computer<\/figcaption><\/figure>\n\n\n\n<p>The full text explains that LockBit is looking for RDP, VPN, corporate email credentials that they can then use to gain access to the network. They also say they will send the insider a &#8222;virus&#8221; that should be executed on a computer, likely to give the ransomware gang remote access to the network.<\/p>\n\n\n\n<p>While this tactic may sound far-fetched, it is not the first time threat actors attempted to recruit an employee to encrypt their company&#8217;s network (it happened to Tesla before). So please control what data and privileges your employees have.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lockbit-ransomware-recruiting-insiders-to-breach-corporate-networks\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-edge-super-duper-secure-mode-new-security-feature\"><strong>Microsoft Edge &#8211; 'Super Duper Secure Mode&#8217; new security feature<\/strong><\/h2>\n\n\n<p>Microsoft has announced that the Edge Vulnerability Research team is experimenting with a new feature dubbed &#8222;Super Duper Secure Mode&#8221; and designed to bring security improvements without significant performance losses.<\/p>\n\n\n\n<p>When enabled, the mode will remove Just-In-Time Compilation (JIT) from the V8 processing pipeline, reducing the attack surface threat actors can use to hack into Edge users&#8217; systems.<\/p>\n\n\n\n<p>According to CVE data collected since 2019, around 45% of vulnerabilities found in the V8 JavaScript and WebAssembly engine were related to the JIT engine, More than half of all 'in the wild&#8217; Chrome exploits abusing JIT bugs.<\/p>\n\n\n\n<p>While JIT compiler is designed to increase performance by compiling computers during program execution (at run time), Microsoft claims that disabling it does not always have negative impacts.<\/p>\n\n\n\n<p>With the JIT engine turned off, it was possible for Edge to turn on protections &#8212; such as the hardware-based Control-flow Enforcement Technology (CET) from Intel &#8212; that was previously incompatible with JIT.<\/p>\n\n\n\n<p>In the future, Microsoft also wants to add support for Arbitrary Code Guard (ACG) that would prevent loading malicious code into memory, a technique used by most web browser exploits.<\/p>\n\n\n\n<p>While still in the experimental stage, Super Duper Secure Mode is currently available via <span style=\"background-color:#f0f0f0\" class=\"tadv-background-color\">edge:\/\/flags\/#edge-enable-super-duper-secure-mode<\/span> for users of canary, dev, and beta release channels of the browser.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-edge-just-got-a-super-duper-secure-mode-upgrade\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"deadringer-targeted-exchange-servers-via-proxylogon-years-before-the-discovery\"><strong>\u2018DeadRinger\u2019 targeted Exchange Servers via ProxyLogon years before the discovery<\/strong><\/h2>\n\n\n<p>Threat actors linked to China exploited the notorious Microsoft Exchange <a href=\"https:\/\/xopero.com\/blog\/en\/ms-exchange-got-emergency-patches-for-four-critical-zero-day-flaws\/#paragraph-1\" target=\"_blank\" rel=\"noreferrer noopener\">ProxyLogon <\/a>vulnerabilities long before they were publicly disclosed. They attacked major telecommunications companies aimed at stealing sensitive customer data and maintaining network persistence.<\/p>\n\n\n\n<p>Researchers from Cybereason have been tracking multiple cyberespionage campaigns \u2013 collectively dubbed \u201cDeadRinger\u201d \u2013 since 2017. According to the initial report, a Chinese threat group dubbed SoftCell was targeting billing servers to steal call records from telecoms in Africa, the Middle East, Europe, and Asia in 2019.<\/p>\n\n\n\n<p>They also identified two groups &#8211; Naikon APT and Group-3390 \u2013 that also appear to be working for China\u2019s regime to compromise billing servers to steal telco call records as well as maintain persistent access to their networks through other core components.<\/p>\n\n\n\n<p>While these attacks were separate, were also all adaptive, persistent, and evasive, with the attackers dynamically responding to mitigation attempts after having evaded security efforts since at least 2017. They all occurred in the same time frame, attacked the same victims, and were even found on the same endpoints.<\/p>\n\n\n\n<p>Overall, overlaps throughout the three groups \u201care evidence of a likely connection between the threat actors\u201d indicating that \u201ceach group was tasked with parallel objectives in monitoring the communications of specific high-value targets\u201d by central command \u201caligned with Chinese state interests,\u201d researchers concluded.<\/p>\n\n\n\n<p>Cellular networks are a prime target for nation-states because they provide an excellent steppingstone to many other types of attacks and different targets. Cybereason\u2019s prevailing assessment is that the operations were intended for espionage purposes only. It is true, however, that had the attackers decided to change their objectives from espionage to interference, they would have had the ability to disrupt communications for any \u2013 or all \u2013 of the affected telecoms\u2019 customers.<\/p>\n\n\n\n<p>Source <a href=\"https:\/\/www.zdnet.com\/article\/deadringer-chinese-apts-strike-major-telecommunications-companies\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">1<\/a> | <a href=\"https:\/\/www.securityweek.com\/deadringer-three-pronged-attack-chinese-military-actors-against-major-telcos\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<ol class=\"wp-block-list\"><li>Decade-old router bug could affect millions of devices (<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/decade-old-router-bug-affect\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Infosecurity Magazine<\/a>)<\/li><li>Microsoft halts Windows 365 trials after running out of servers (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-halts-windows-365-trials-after-running-out-of-servers\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<\/li><li>Raccoon stealer bundles malware, propagates via Google SEO (<a href=\"https:\/\/threatpost.com\/raccoon-stealer-google-seo\/168301\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Threat Post<\/a>)<\/li><li>Potential RCE flaw patched in PyPI\u2019s GitHub repository (<a href=\"https:\/\/www.securityweek.com\/potential-rce-flaw-patched-pypi%E2%80%99s-github-repository\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Week<\/a>)<\/li><li>Unpatched security flaws expose Mitsubishi safety PLCs to remote attacks (<a href=\"https:\/\/thehackernews.com\/2021\/08\/unpatched-security-flaws-expose.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Hacker News<\/a>)<\/li><li>Serious flaws in widespread embedded TCP\/IP stack endanger industrial control devices (<a href=\"https:\/\/www.csoonline.com\/article\/3627595\/serious-flaws-in-widespread-embedded-tcp-ip-stack-endanger-industrial-control-devices.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CSO<\/a>)<\/li><li>Google Patches High-Risk Android Security Flaws (<a href=\"https:\/\/www.securityweek.com\/google-patches-high-risk-android-security-flaws\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Week<\/a>)<\/li><li>Windows PetitPotam attacks can be blocked using new method (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-petitpotam-attacks-can-be-blocked-using-new-method\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<\/li><li>Solar market infostealer malware once again making its way into the wild (<a href=\"https:\/\/thehackernews.com\/2021\/08\/solarmarker-infostealer-malware-once.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Hacker News<\/a>)<\/li><li>Over 60 Million Americans Exposed Through Misconfigured Database (<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/over-60-million-americans\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Infosecurity Magazine<\/a>)<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Critical VMware vulnerabilities are not the only problem faced by this virtualization software vendor last week. Do you remember the BlackMatter group that proclaimed itself to be the successor of REvil we warned you against in the last issue? It already has an encryption program targeting VMware ESXi. Today we also describe a unique business model of the new LockBit 2.0. and a cyberespionage campaign targeting the largest telecoms. For the sake of balance, we are describing a new project from Microsoft &#8211; with &#8222;Super Duper Secure Mode&#8221; the company wants to change the landscape of exploits and increase the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-4380","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Critical VMware vulnerabilities \/ LockBit 2.0. recruits insiders \/ Super Duper Secure Mode in Microsoft Edge - Xopero Blog<\/title>\n<meta name=\"description\" content=\"Critical VMware vulnerabilities are not the only problem VMware had last week. BlackMatter ransomware group now targets VMware ESXi...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical VMware vulnerabilities \/ LockBit 2.0. recruits insiders \/ Super Duper Secure Mode in Microsoft Edge - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"Critical VMware vulnerabilities are not the only problem VMware had last week. BlackMatter ransomware group now targets VMware ESXi...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-09T06:17:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-15T09:36:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"Critical VMware vulnerabilities \\\/ LockBit 2.0. recruits insiders \\\/ Super Duper Secure Mode in Microsoft Edge\",\"datePublished\":\"2021-08-09T06:17:00+00:00\",\"dateModified\":\"2024-05-15T09:36:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\\\/\"},\"wordCount\":1318,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\\\/\",\"name\":\"Critical VMware vulnerabilities \\\/ LockBit 2.0. recruits insiders \\\/ Super Duper Secure Mode in Microsoft Edge - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2021-08-09T06:17:00+00:00\",\"dateModified\":\"2024-05-15T09:36:07+00:00\",\"description\":\"Critical VMware vulnerabilities are not the only problem VMware had last week. BlackMatter ransomware group now targets VMware ESXi...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical VMware vulnerabilities \\\/ LockBit 2.0. recruits insiders \\\/ Super Duper Secure Mode in Microsoft Edge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical VMware vulnerabilities \/ LockBit 2.0. recruits insiders \/ Super Duper Secure Mode in Microsoft Edge - Xopero Blog","description":"Critical VMware vulnerabilities are not the only problem VMware had last week. BlackMatter ransomware group now targets VMware ESXi...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/","og_locale":"pl_PL","og_type":"article","og_title":"Critical VMware vulnerabilities \/ LockBit 2.0. recruits insiders \/ Super Duper Secure Mode in Microsoft Edge - Xopero Blog","og_description":"Critical VMware vulnerabilities are not the only problem VMware had last week. BlackMatter ransomware group now targets VMware ESXi...","og_url":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2021-08-09T06:17:00+00:00","article_modified_time":"2024-05-15T09:36:07+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"Critical VMware vulnerabilities \/ LockBit 2.0. recruits insiders \/ Super Duper Secure Mode in Microsoft Edge","datePublished":"2021-08-09T06:17:00+00:00","dateModified":"2024-05-15T09:36:07+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/"},"wordCount":1318,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/","url":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/","name":"Critical VMware vulnerabilities \/ LockBit 2.0. recruits insiders \/ Super Duper Secure Mode in Microsoft Edge - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2021-08-09T06:17:00+00:00","dateModified":"2024-05-15T09:36:07+00:00","description":"Critical VMware vulnerabilities are not the only problem VMware had last week. BlackMatter ransomware group now targets VMware ESXi...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/critical-vmware-vulnerabilities-lockbit-2-0-recruits-insiders-super-duper-secure-mode-in-microsoft-edge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Critical VMware vulnerabilities \/ LockBit 2.0. recruits insiders \/ Super Duper Secure Mode in Microsoft Edge"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=4380"}],"version-history":[{"count":4,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4380\/revisions"}],"predecessor-version":[{"id":5822,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4380\/revisions\/5822"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=4380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=4380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=4380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}