.jpg)
Avast reported that threat actors had previously established the administrative-to-kernel primitive through BYOVD (Bring Your Own Vulnerable Driver) techniques, which are noisy. However, there seems to be no doubt that this new zero-day exploit has made it easier for kernel-level read/write primitives to be established.
Since “administrator-to-kernel vulnerabilities are not a security boundary”, Microsoft still retains the right to patch them. Furthermore, it is also important to remember that threat actors with administrative privileges have access to the Windows kernel.
The threat actors will gain kernel-level access to the OS once they have managed to disrupt the software, conceal infection indicators, and disable kernel-mode telemetry, among other malicious activities once they have gained kernel-level access to the OS.
The researchers report that the malicious packages have been downloaded hundreds of times, according to their findings.
Source: Original Post
“An interesting youtube video that may be related to the article above”
Views: 0