What’s new

  • Microsoft patched six zero-days targeting Windows, Word, and other products [2].
  • A Mastodon summary reports 58 total Microsoft vulnerabilities fixed this month, including six actively exploited zero-days; some were publicly disclosed prior to patch release (degree and details unconfirmed) [1].
  • Black Basta ransomware actors are reported to embed a BYOVD (bring-your-own-vulnerable-driver) defense-evasion component within the ransomware payload itself (independent verification required) [3].

Operational risk (as supported by sources)

  • Elevated risk window from actively exploited Microsoft zero-days until patches are fully deployed [1][2].
  • Ransomware defense-evasion via BYOVD can degrade endpoint protections during intrusion and encryption phases [3].
  • The sources do not specify ICS/OT platform targeting or impacts.

Actions now

  • Expedite deployment of Microsoft’s February updates across Windows and Office estates; confirm coverage against the six zero-days noted by ITPro [2] and the broader set reported on Mastodon [1].
  • Monitor for ransomware activity that includes embedded driver components consistent with BYOVD techniques (as reported for Black Basta) [3].
  • Retrieve the full ITPro write-up and Microsoft advisories for CVE IDs, affected versions, and exploitation details to refine patch prioritization [2].

Intelligence gaps

  • CVE identifiers, affected versions, and exploitation telemetry for the six zero-days are not included in the provided sources [2].
  • The extent of active exploitation and which vulnerabilities were publicly disclosed pre-patch remain partially unconfirmed due to truncated reporting [1].
  • Technical specifics of Black Basta’s embedded BYOVD component (driver identity, load mechanism, IOCs) require the underlying analysis referenced in the Mastodon post [3].