Home » Technology » Report: Microsoft has failed to protect Windows computers for years

Report: Microsoft has failed to protect Windows computers for years

A new report from Ars Technica claims that Microsoft has failed to protect Windows PCs from malicious drives for nearly three years.

Although the company claims that periodically released Windows updates prevent malicious drives from being downloaded into the system, Ars Technica found that those updates did not do as they should.

Due to this deficiency in preventing malicious drives from accessing Windows PCs, users are vulnerable to a specific type of attack called BYOVD, which stands for Bring Your Vulnerable Drive.

It is indicated that drives are the files that personal computer operating systems use to communicate with hardware, external or internal, such as: printers, graphics cards, webcams, and so on.

Since drives require the ability to access a device’s operating system kernel, Microsoft also requires, before allowing this, that all drives be approved, to ensure they are safe for use.

Related Topics What are you reading right now:

But if an approved drive exists and contains a vulnerability, hackers can exploit it and gain access to the Windows kernel.

This has happened many times: last August, hackers installed BlackByte ransomware on a vulnerable drive used to improve the performance of MSI AfterBurner software for MSI graphics cards.

North Korean hacker group Lazarus also launched a BYOVD attack against a Dutch aerospace industry employee and political journalist in Belgium in 2021, but the matter was not revealed until late last month by information security firm ESET.

Microsoft confirms the security of Windows computers

According to a report from Ars Technica, Microsoft is using a special feature called HVCI, which stands for Hypervisor-Protected Code Integrity, to protect devices from malicious drives. It says this feature is enabled by default on some Windows devices.

But Ars Technica and Will Dorman, a senior security analyst at information security firm Analygence, confirmed that this feature doesn’t provide enough protection against malicious drives.

Dorman released it last September

On Twitter he explains how he was able to download a malicious drive to an HVCI-enabled machine, even though the malicious drive was blacklisted by Microsoft. Then he later found out that Microsoft’s blacklist hadn’t been updated since 2019.

Microsoft did not respond to Dorman’s statement except in

He claimed to have fixed the problem and also posted instructions on how to manually update the blacklist.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.