Special Features

Malware Month

Ransomware crew may have exploited Windows make-me-admin bug as a zero-day

Symantec suggests Black Basta crew beat Microsoft to the patch


The Black Basta ransomware gang may have exploited a now-patched Windows privilege escalation bug as a zero-day, according to Symantec's threat hunters.

Microsoft plugged the hole in the Windows Error Reporting Service in the March Patch Tuesdsay, and warned orgs that the vulnerability, tracked as CVE-2024-26169, could allow an attacker to elevate privileges to the all-powerful SYSTEM level during an attack. An intruder could use that flaw to go from compromising an individual user account to taking over the whole box as an administrator, for instance.

Also at the time, Redmond said there was no evidence that the flaw had been exploited prior to its Patch Tuesday fix. According to Symantec, however, that might not be the case.

In a Wednesday write-up, Symantec's threat intel team said its analysis of an exploit used by the Black Basta ransomware crew to compromise victims indicates that the malicious code may have been compiled before Microsoft issued the patch.

Which would mean "at least one group may have been exploiting the vulnerability as a zero-day" to achieve total control of targeted Windows machines.

This particular exploit was used in a recent attempted ransomware infection, we're told. And while that attack wasn't successful, Symantec noted similarities between that failed infection its team investigated and a Black Basta ransomware campaign Microsoft documented in May.

Redmond said the campaign it observed had been carried out by a cybercrime gang it tracks as Storm-1811 (others call the crew Cardinal or UNC4393) and that the crew's social engineering attacks – basically, tricking folks within organizations to grant the crooks access to systems to infect with ransomware – had been ongoing since mid-April. Storm-1811 abused Microsoft's Quick Assist application and used batch scripts disguised as software updates to deploy Black Basta ransomware within target IT environments. 

These particular tactics, according to Symantec, are "highly similar" to those its investigators observed in their own probe, making it "highly likely" what Team Symantec had observed "was a failed Black Basta attack."

The team's analysis of the exploit found it abuses the fact that Windows' werkernel.sys uses a null security descriptor when creating registry keys:

Because the parent key has a "Creator Owner" access control entry (ACE) for subkeys, all subkeys will be owned by users of the current process. The exploit takes advantage of this to create a "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WerFault.exe" registry key where it sets the "Debugger" value as its own executable pathname. This allows the exploit to start a shell with administrative privileges. 

The Symantec crew also noted that the variant of the exploit was time-stamped February 27, and the vulnerability wasn't patched until nearly a month later. 

Additionally, a second variant of the exploit that turned up on Virustotal had an even earlier time stamp of December 18, 2023.

While Symantec admits this is not "conclusive evidence," because time stamps can be modified, "in this case there appears to be little motivation for the attackers to change the time stamp to an earlier date."

Microsoft did not immediately respond to The Register's inquiries about whether its malware hunters had seen anything to indicate that CVE-2024-26169 was exploited by this same group of miscreants as a zero-day. We will update this story if we receive a response. ®

Send us news
2 Comments

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

Microsoft security tools questioned for treating employees as threats

Cracked Labs examines how workplace surveillance turns workers into suspects

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Microsoft patches scary wormable hijack-my-box-via-IPv6 security bug and others

Plus more pain for Intel which fixed 43 bugs, SAP and Adobe also in on the action

Microsoft's Patch Tuesday borks dual-boot Linux-Windows PCs

Plus: Three-year-old ProxyOracle flaw added to CISA's exploited bugs list

From Copilot to Copirate: How data thieves could hijack Microsoft's chatbot

Prompt injection, ASCII smuggling, and other swashbuckling attacks on the horizon

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

House to grill CrowdStrike exec on epic IT meltdown... no, not the CEO

VP Adam Meyers to testify about that faulty software update which ruined July and some of August

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials