Hackers exploited Windows 0-day for 6 months after Microsoft knew of it

WHEN IS A VULNERABILITY NOT A VULNERABILITY? —

Technically, Microsoft doesn’t consider such bugs vulnerabilities. It patched it anyway.

The word ZERO-DAY is hidden amidst a screen filled with ones and zeroes.

Hackers backed by the North Korean government gained a major win when Microsoft left a Windows zero-day unpatched for six months after learning it was under active exploitation.

Even after Microsoft patched the vulnerability last month, the company made no mention that the North Korean threat group Lazarus had been using the vulnerability since at least August to install a stealthy rootkit on vulnerable computers. The vulnerability provided an easy and stealthy means for malware that had already gained administrative system rights to interact with the Windows kernel. Lazarus used the vulnerability for just that. Even so, Microsoft has long said that such admin-to-kernel elevations don’t represent the crossing of a security boundary, a possible explanation for the time Microsoft took to fix the vulnerability.

A rootkit “holy grail”

“When it comes to Windows security, there is a thin line between admin and kernel,” Jan Vojtěšek, a researcher with security firm Avast, explained last week. “Microsoft’s security servicing criteria have long asserted that ‘[a]dministrator-to-kernel is not a security boundary,’ meaning that Microsoft reserves the right to patch admin-to-kernel vulnerabilities at its own discretion. As a result, the Windows security model does not guarantee that it will prevent an admin-level attacker from directly accessing the kernel.”

The Microsoft policy proved to be a boon to Lazarus in installing “FudModule,” a custom rootkit that Avast said was exceptionally stealthy and advanced. Rootkits are pieces of malware that have the ability to hide their files, processes, and other inner workings from the operating system itself and at the same time control the deepest levels of the operating system. To work, they must first gain administrative privileges—a major accomplishment for any malware infecting a modern OS. Then, they must clear yet another hurdle: directly interacting with the kernel, the innermost recess of an OS reserved for the most sensitive functions.

In years past, Lazarus and other threat groups have reached this last threshold mainly by exploiting third-party system drivers, which by definition already have kernel access. To work with supported versions of Windows, third-party drivers must first be digitally signed by Microsoft to certify that they are trustworthy and meet security requirements. In the event Lazarus or another threat actor has already cleared the admin hurdle and has identified a vulnerability in an approved driver, they can install it and exploit the vulnerability to gain access to the Windows kernel. This technique—known as BYOVD (bring your own vulnerable driver)—comes at a cost, however, because it provides ample opportunity for defenders to detect an attack in progress.

The vulnerability Lazarus exploited, tracked as CVE-2024-21338, offered considerably more stealth than BYOVD because it exploited appid.sys, a driver enabling the Windows AppLocker service, which comes preinstalled in the Microsoft OS. Avast said such vulnerabilities represent the “holy grail,” as compared to BYOVD.

In August, Avast researchers sent Microsoft a description of the zero-day, along with proof-of-concept code that demonstrated what it did when exploited. Microsoft didn’t patch the vulnerability until last month. Even then, the disclosure of the active exploitation of CVE-2024-21338 and details of the Lazarus rootkit came not from Microsoft in February but from Avast 15 days later. A day later, Microsoft updated its patch bulletin to note the exploitation.

Dan Goodin
Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene.

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
شركة سويدية تقاضي جوجل وتطالبها بدفع 2.4 مليار دولار thumbnail

شركة سويدية تقاضي جوجل وتطالبها بدفع 2.4 مليار دولار

بعد إقرار الاتحاد الأوروبي باختراق شركة جوجل قوانين المنافسة، قررت شركة سويدية تُدعى PriceRunner باستغلال هذا الإقرار ورفع قضية ضد الشركة الأمريكية في محكمة المنافسة في العاصمة السويدية ستوكهولم.وتطالب الشركة السويدية نظيرتها الأمريكية بدفع 2.1 مليار يورو أي ما يعادل 2.4 مليار دولار أمريكي كتعويضات عما سببته لها في الفترة الماضية بسبب عدم تطبيقها سياسة…
Read More
Thumby is a keychain that you can play games on thumbnail

Thumby is a keychain that you can play games on

Auteur: RubenPriest, gepost 1 oktober 2021 om 13:44 – Reageer Even niets te doen? Laat de smartphone in je broekzak en ga eens aan de slag met de Thumby. Met onze smartphones kunnen we prima de tijd doden. Je kunt er van alles op doen. Van Netflix streamen tot games spelen. Misschien is deze grappige…
Read More
Microsoft Finally Completes Activision Blizzard Deal thumbnail

Microsoft Finally Completes Activision Blizzard Deal

2 weeks ago October 14, 2023 at 9:05 am Microsoft finalized its purchase of Activision Blizzard Inc. for $US69 billion after it received approval from UK regulators on Friday. The Xbox maker’s acquisition of the gaming company known for its Call of Duty franchise marks the end of a nearly two-year fight with regulators who
Read More
Scientists Capture Airborne Animal DNA for the First Time thumbnail

Scientists Capture Airborne Animal DNA for the First Time

But for many biologists, tracking mammals that move miles each day and are wary of humans can be nearly impossible. Enter eDNA. “If we want to restore ecosystems, we need to understand how our conservation actions influence threatened and endangered species. But to do that we need to be able to detect even the rarest,…
Read More
Lil Nas X, Bella Poarch, Grimes, and more are releasing TikTok NFTs thumbnail

Lil Nas X, Bella Poarch, Grimes, and more are releasing TikTok NFTs

Because no peace can be found in the age of man, TikTok has decided to partner with select creators, celebrities, and online entities like Lil Nas X, Bella Poarch, and Grimes to release a collection of non-fungible tokens. These TikTok Top Moments, as the company is calling them, are inspired by six “culturally significant” TikTok…
Read More
Index Of News