Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day

Discussion in 'other security issues & news' started by FanJ, Feb 28, 2024.

  1. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,920
    Avast - February 28, 2024
    Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day
    https://decoded.avast.io/janvojtese...eyond-byovd-with-an-admin-to-kernel-zero-day/

    Long article, read there more.
     
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Yes, very interesting, I'm surprised no one has responded to this thread. But seems to be a very nasty and super advanced rootkit for Win 10/11. But it's not clear to me if the malicious .exe (process) has to first load the vulnerable AppLocker driver (appid.sys) or if it can simply interact with it directly. In the first scenario, a behavior blocker could block the driver. But I'm afraid in the second scenario, the only solution would be to resdesign Windows, because a malicious process shouldn't be able to interact with any loaded driver on the system. Or perhaps I misunderstand?

    https://www.bleepingcomputer.com/ne...d-windows-zero-day-to-gain-kernel-privileges/
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Also, check out Erik Loman bragging about the FudModule rootkit trying to disable HMPA. :p

    https://twitter.com/erikloman/status/1762847300542497181
     
  4. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,648
    Location:
    U.S.A.
    The vulnerability has been patched;
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,648
    Location:
    U.S.A.
    There is a little known Windows utility which I will not name that can load any Windows kernel mode driver on the fly.
     
  6. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,920
    Why didn't you give some quote(s)? Not everyone uses twitter!
    And, BTW, Erik is a member here. He could also post his comment(s).
     
  7. Freki123

    Freki123 Registered Member

    Joined:
    Jan 20, 2015
    Posts:
    337
    I think MS dodged the outcry and rage by forgetting to mention that they knew about it for six month and then sweeping it under the rug in the patchnotes.
    Quote from bleeping: Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day.

    https://www.bleepingcomputer.com/ne...ast-month-exploited-as-zero-day-since-august/
     
  8. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Hist post on Twitter should be visible for everyone, you don't have to be logged in, can't you see it? And to clarify, I thought it was funny, and he has every right to brag about it, seems like HMPA is really pretty good in blocking advanced attacks. Of course when the OS itself is vulnerable like Windows, then there is not much you can do.
     
  9. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Yes correct, but the technical aspects are quite interesting. But wasn't PatchGuard designed to block this stuff? Now that I think of it, I'm guessing that PatchGuard was designed to protect certain parts of the Windows OS kernel, but apparently it can't do anything against legitimate drivers being abused to disable or evade security software.

    But any .exe can do this? Or you probably mean that this utility is most likely trusted by security software? Then it might indeed be a problem.

    Yes good point, M$ should be ashamed of themselves for waiting so long to patch this.
     
  10. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,920
    No, I can't see it. But it is your choice to post a link without some quotes ... ough ... :thumbd: :thumbd:
     
  11. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    Very weird that you can't see it. I can see it without being logged in on Edge, Firefox and Vivaldi. Must be your adblocker or something, perhaps you should allow cookies. But anyway, this is what he said:

     
  12. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    BTW, what I forgot to mention is that M$ claims that it can only be exploited locally, but I don't understand this. I mean I assume you can also either trick someone into running this malicious app which then will trigger the exploit, or you can perhaps even use an automatic exploit via browser? So I assume this can also be triggered from remote?

    Actually, I assumed right, it is cleared up in the security bulletin:

     
  13. Guest 931

    Guest 931 Guest

    DAN GOODIN - 8/19/2024, 7:37 PM

    https://arstechnica.com/security/20...d-by-north-korea-to-install-advanced-rootkit/
     
    Last edited by a moderator: Aug 20, 2024
  14. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    And once again, it's still not clear to me, if they actually have to load such a vulnerable driver, or can malware exploit an already installed (system) driver? Is it just me, or isn't this clearly explained in all of these articles? The reason why it matters, is because behavior blockers should be able to block driver loading.
     
  15. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    BTW, to answer my own question. I just read this article again, and it's worse than I thought. You don't even need to load a vulnerable driver, you can simply exploit a driver that's already installed. In other words, Windows could really use a complete redesign.
     
  16. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    And here is some more technical information.

    https://www.elastic.co/security-labs/forget-vulnerable-drivers-admin-is-all-you-need
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.