Article 6K3BQ Hackers exploited Windows 0-day for 6 months after Microsoft knew of it

Hackers exploited Windows 0-day for 6 months after Microsoft knew of it

by
Dan Goodin
from Ars Technica - All content on (#6K3BQ)
zeroday-800x534.jpg

Enlarge (credit: Getty Images)

Hackers backed by the North Korean government gained a major win when Microsoft left a Windows zero-day unpatched for six months after learning it was under active exploitation.

Even after Microsoft patched the vulnerability last month, the company made no mention that the North Korean threat group Lazarus had been using the vulnerability since at least August to install a stealthy rootkit on vulnerable computers. The vulnerability provided an easy and stealthy means for malware that had already gained administrative system rights to interact with the Windows kernel. Lazarus used the vulnerability for just that. Even so, Microsoft has long said that such admin-to-kernel elevations don't represent the crossing of a security boundary, a possible explanation for the time Microsoft took to fix the vulnerability.

A rootkit holy grail"

When it comes to Windows security, there is a thin line between admin and kernel," Jan Vojtek, a researcher with security firm Avast, explained last week. Microsoft's security servicing criteria have long asserted that [a]dministrator-to-kernel is not a security boundary,' meaning that Microsoft reserves the right to patch admin-to-kernel vulnerabilities at its own discretion. As a result, the Windows security model does not guarantee that it will prevent an admin-level attacker from directly accessing the kernel."

Read 11 remaining paragraphs | Comments

External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments