Quantcast
Channel: Daily Dark Web
Viewing all articles
Browse latest Browse all 868

A Threat Actor Claims Sale of Outlook RCE Exploit 0-Day for $1,700,000

$
0
0

In a concerning development, a threat actor known as “Cvsp” has announced the sale of an alleged Outlook Remote Code Execution (RCE) exploit 0-day. This alleged exploit, designed to target various versions of Microsoft Office across both x86 and x64 architectures, poses a significant security threat to users worldwide.

According to Cvsp’s claims, the Outlook RCE Exploit 0-day has undergone rigorous testing on multiple versions of Microsoft Office software, including Office 2016, 2019, LTSC 2021, and Microsoft 365 Apps for Enterprise. The threat actor claims an alarming success rate of 100%, indicating the exploit’s reliability and effectiveness in compromising vulnerable systems.

The threat actor emphasizes that specific information regarding the exploit will only be disclosed privately. Additionally, all transactions related to the sale of the exploit are to be conducted exclusively through escrow services provided by ShinyHunters, underscoring the clandestine nature of the transaction and the illicit activities associated with the sale of such high-level vulnerabilities in the cyber underground.

The price for the Outlook RCE exploit 0-day is $1,700,000, as claimed by the threat actor, Cvsp. This substantial sum reflects the severity and potency of the exploit, which poses a significant threat to users.

The post A Threat Actor Claims Sale of Outlook RCE Exploit 0-Day for $1,700,000 appeared first on Daily Dark Web.


Viewing all articles
Browse latest Browse all 868

Trending Articles