Windows 10: Security researcher discovered attack to downgrade Windows permanently

Discus and support Security researcher discovered attack to downgrade Windows permanently in Windows 10 News to solve the problem; One of the most important advices when it comes to the security of electronic devices is to make sure that they are up to date. A security researcher... Discussion in 'Windows 10 News' started by GHacks, Aug 8, 2024.

  1. GHacks
    GHacks New Member

    Security researcher discovered attack to downgrade Windows permanently


    One of the most important advices when it comes to the security of electronic devices is to make sure that they are up to date.

    A security researcher discovered a new attack that downgrades Windows devices permanently. Information on the attack are available on the SafeBreach website.

    Microsoft releases monthly security updates for Windows. It may also release out-of-bounds security updates; these are released when new vulnerabilities are actively exploited.

    Good to known: Downgrading refers to uninstalling certain updates from a device. This may refer to uninstalling newer feature updates, but also to uninstalling a newer version of Windows.

    While it is sometimes necessary to downgrade a PC, for instance when a new version is causing issues that cannot be fixed at the time, the process may also be used to remove certain security updates or protections from the operating system.

    The Windows Downgrade Attack


    Security researcher Alon Leviev developed the tool Windows Downdate to demonstrate that downgrade attacks are possible, even on fully patched versions of Windows.

    He describes the tool in the following way: "a tool to take over the Windows Update process to craft fully undetectable, invisible, persistent, and irreversible downgrades on critical OS components—that allowed me to elevate privileges and bypass security features".

    With the help of the tool, Leviev was able to turn fully patched and secured Windows devices to outdated Windows devices that were "susceptible to thousands of past vulnerabilities".

    Leviev unveiled the research project at Black Hat USA 2024 and Def Con 32. He managed to downgrade a fully patched Windows system successfully during demonstrations and prepared the systems in a special way, so that Windows Update would not find new updates.

    To make matters worse, the downgrade attack is both undetectable by endpoint detection and response solutions and invisible in regards to the operating system's components. In other words, the operating system appears up-to-date, when in fact it is not.

    The downgrade is also persistent and irreversible. The latter means that scan and repair tools to not detect issues or may repair the downgrade.

    You may check out the blog post on the SafeBreach website for technical details.

    Microsoft's response


    Microsoft was informed about the vulnerability in advance. It is tracking the issues here:

    • CVE-2024-21302 -- Windows Secure Kernel Mode Elevation of Privilege Vulnerability
    • CVE-2024-38202 -- Windows Update Stack Elevation of Privilege Vulnerability

    The maximum severity of both issues was set to important by Microsoft.

    Microsoft has already added a detection to Microsoft Defender for Endpoint. This is designed to alert customers of exploit attempts.

    The company is recommending several actions next to this. While they do not "mitigate the vulnerability", they "reduce the risk of exploitation".

    In a nutshell:

    • Configure “Audit Object Access” settings to monitor attempts to access files, such as handle creation, read / write operations, or modifications to security descriptors.
    • KAuditing sensitive privileges used to identify access, modification, or replacement of VBS related files could help indicacte attempts to exploit this vulnerability.
    • Protect your Azure tenant by investigating administrators and users flagged for risky sign-ins and rotating their credentials.
    • Enabling Multi-Factor Authentication can also help alleviate concerns about compromised accounts or exposure.
    Closing Words


    The attack does require administrative privileges. A good precaution is to use a regular user account for day-to-day activities on Windows PCs. Microsoft will release a fix for the issue in the future.

    What is your take on this? Feel free to leave a comment down below.

    Thank you for being a Ghacks reader. The post Security researcher discovered attack to downgrade Windows permanently appeared first on gHacks Technology News.

    read more...
     
    GHacks, Aug 8, 2024
    #1
  2. Brink Win User

    Researchers discover seven new Meltdown and Spectre attacks

    Read more: Researchers discover seven new Meltdown and Spectre attacks | ZDNet
     
    Brink, Aug 8, 2024
    #2
  3. Brink Win User
    Researchers discover seven new Meltdown and Spectre attacks


    Read more: Researchers discover seven new Meltdown and Spectre attacks | ZDNet
     
    Brink, Aug 8, 2024
    #3
  4. DaveM121 Win User

    Security researcher discovered attack to downgrade Windows permanently

    About Ransomware attack

    Here is Microsoft's Customer Guidance on the Ransomware Attack:

    • In March, we released a security update which addresses the vulnerability that these attacks are exploiting. Those who have Windows Update enabled are protected against attacks on this vulnerability. For those organizations who have not yet applied the
      security update, we suggest you immediately deploy Microsoft Security Bulletin MS17-010.

    • For customers using Windows Defender, we released an update earlier today which detects this threat as Ransom:Win32/WannaCrypt.
      As an additional “defense-in-depth” measure, keep up-to-date anti-malware software installed on your machines. Customers running anti-malware software from any number of security companies can confirm with their provider, that they are protected.

    • This attack type may evolve over time, so any additional defense-in-depth strategies will provide additional protections. (For example, to further protect against SMBv1 attacks, customers
      should consider blocking legacy protocols on their networks).

    For the full article,
    Click HERE
     
    DaveM121, Aug 8, 2024
    #4
Thema:

Security researcher discovered attack to downgrade Windows permanently

Loading...
  1. Security researcher discovered attack to downgrade Windows permanently - Similar Threads - Security researcher discovered

  2. Security researchers bypass Windows Hello fingerprint authentication

    in Windows 10 News
    Security researchers bypass Windows Hello fingerprint authentication: Security researchers at Blackwing Intelligence managed to bypass Windows Hello fingerprint authentication on devices with the three most used fingerprint sensors on Windows. The researchers were asked by Microsoft's Offensive Research and Security Engineering to evaluate...
  3. Windows Research

    in Windows 10 Gaming
    Windows Research: Hello Everyone,For a while now, the Windows search indexing feature has not been working on my laptop running Windows 11. I've tried rebuilding it, and the system indicates that it may take some time, but despite multiple attempts, it still doesn't function properly.I'm...
  4. Windows Research

    in Windows 10 Software and Apps
    Windows Research: Hello Everyone,For a while now, the Windows search indexing feature has not been working on my laptop running Windows 11. I've tried rebuilding it, and the system indicates that it may take some time, but despite multiple attempts, it still doesn't function properly.I'm...
  5. Remote access downgrade attack keeps attacking any new windows devices I set up

    in AntiVirus, Firewalls and System Security
    Remote access downgrade attack keeps attacking any new windows devices I set up: My windows devices become full of processes and remote users that slowly uninstall any security protocols and replace programs with false versions that further spread the virus when I launch them. It happens before I can set up any strict firewall policies, not that I’m super...
  6. MSRC Recognizing Security Researchers in 2020

    in Windows 10 News
    MSRC Recognizing Security Researchers in 2020: Is it too early to talk about the 2020 MSRC Most Valuable Security Researchers? Five months from now, at the end of June, the program period closes for researchers to be considered for inclusion in the Most Valuable Researchers list. The top researcher list will be revealed...
  7. Researchers discover seven new Meltdown and Spectre attacks

    in Windows 10 News
    Researchers discover seven new Meltdown and Spectre attacks: A team of nine academics has revealed today seven new CPU attacks. The seven impact AMD, ARM, and Intel CPUs to various degrees. Two of the seven new attacks are variations of the Meltdown attack, while the other five are variations on the original Spectre attack --two...
  8. Windows Defender Research

    in AntiVirus, Firewalls and System Security
    Windows Defender Research: FYI I may be over reacting, but, I uninstalled "No Coin" app after reading the MS Defender Research article. I'll let you folks draw your own conclusions. https://cloudblogs.microsoft.com/mic...ses-new-risks/ 115709
  9. Research shows antivirus products vulnerable to attack

    in Windows 10 News
    Research shows antivirus products vulnerable to attack: A Google researcher has been reporting severe vulnerabilities in security suites from Kaspersky, Trend Micro, MalwareBytes, FireEye, AVG, ESET and now Comodo. Google security researcher Tavis Ormandy has long been a pain to vendors of commercial software with significant...
  10. Blame it on your brain: Researchers discover why we ignore PC security

    in Windows 10 News
    Blame it on your brain: Researchers discover why we ignore PC security: Here's a twist for the thought processes! Blame it on your brain: Researchers discover why we ignore PC security warnings [img] A new study by BYU researchers find that most users consistenly ignore pop-ups when they're busy doing something else. Credit: MIT News...