05/11/2024
๐จ New Hack Can Bypass Windows Security! ๐ต๏ธโโ๏ธ
Whatโs Going On? ๐ป A fresh hack has been uncovered that can bypass Microsoftโs Driver Signature Enforcement (DSE) on fully updated Windows systems. This new trick allows attackers to load unsigned kernel drivers, which could help them sneak in dangerous rootkits. These rootkits could hide malicious activity, disable security, and stay hidden on your system! ๐จ
How It Works ๐
Researchers found that this method exploits a tool called โWindows Downdate,โ which lets attackers downgrade parts of the Windows OS to older, unpatched versions. Essentially, they trick Windows Update into using vulnerable files, opening the door to exploit older security flaws.
Key Exploits Discovered ๐จ
Two key vulnerabilities, CVE-2024-21302 and CVE-2024-38202, were previously addressed by Microsoft but can be exploited by this new method to reintroduce old vulnerabilities! Once attackers downgrade Windows to an older version, they can bypass the DSE, load unapproved drivers, and gain kernel-level control.
Why This is Dangerous โ ๏ธ
Unlike past techniques like โBring Your Own Vulnerable Driverโ (BYOVD) attacks, this downgrade method directly targets core Windows components. This allows attackers to achieve a high level of control without being detected.
Can It Be Stopped? ๐
Virtualization-Based Security (VBS) can help stop these attacks, but only if itโs fully enabled with UEFI lock and a โMandatoryโ setting. In default settings, VBS might be disabled, letting attackers tamper with registry keys to turn it off and proceed with the exploit. Microsoft recommends careful setup of VBS to prevent this.
Final Thoughts ๐ก
To stay safe, Microsoft urges users to fully enable VBS and set the UEFI lock. And security tools should be designed to detect and stop downgrades like this before they cause harm.
๐ To read more phishy articles, please visit www.gonephishing.xyz - and sign up to our newsletter to never miss a story!