«The various lengths to which President Buhari has gone to end the spate of killings, such
as mobilising state resources against the
attackers, approving the setting up of new police and army formations in the
affected areas, and the recruitment of thousands into the police and other arms of the military, are a few of the several steps taken which a more reasonable opposition will acknowledge.
The flaw has actively been exploited in the wild since at least March 2017 by
attackers who tricked victims into downloading malicious software onto their PCs that used their CPU power to mine cryptocurrencies or serve
as a backdoor for
attackers to remotely control the
affected machine, according to a blogpost on Securelist.