<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>windows &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/malware/windows/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Fri, 03 Apr 2026 09:50:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>windows &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>ClickFix Variant Bypasses Detection Using Rundll32 &#038; WebDAV</title>
		<link>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/</link>
					<comments>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 19:09:57 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[#ClickFix]]></category>
		<category><![CDATA[#ClickFixVariant]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DetectionBypass]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#Rundll32]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatDetection]]></category>
		<category><![CDATA[#WebDAV]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11539</guid>

					<description><![CDATA[<p>A newer and more dangerous version of the ClickFix attack is now targeting Windows users, and it’s taking</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/">ClickFix Variant Bypasses Detection Using Rundll32 &amp; WebDAV</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newer and more dangerous version of the ClickFix attack is now targeting Windows users, and it’s taking a smarter route than before. Earlier variants relied heavily on PowerShell or mshta, which many security tools already watch closely. This time, attackers are using built-in Windows tools like rundll32.exe and WebDAV to stay under the radar and avoid early detection.</p>



<p>Instead of obvious scripting activity, the attack blends into normal system behavior. This makes it harder for security teams to notice anything suspicious during the initial stages.</p>



<h2 class="wp-block-heading"><strong>How the Attack Tricks Users</strong></h2>



<p>ClickFix still depends on social engineering. The attacker lures users to a fake website that looks like a CAPTCHA verification page. One such example is “healthybyhillary[.]com.”</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="903" height="534" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image.png" alt="" class="wp-image-11540" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-300x177.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-768x454.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image.png 903w" sizes="(max-width: 903px) 100vw, 903px" /><figcaption class="wp-element-caption">Phishing Website (Source – CyberProof)</figcaption></figure>



<p>The page guides the user through a simple-looking process:</p>



<ul class="wp-block-list">
<li>Press <strong>Win + R</strong> to open the Run dialog</li>



<li>Paste a pre-copied command using <strong>Ctrl + V</strong></li>



<li>Hit <strong>Enter</strong> to execute it</li>
</ul>



<p>To an average user, this feels like a normal verification step. But in reality, it triggers a malicious command that starts the infection process.</p>



<h2 class="wp-block-heading"><strong>How It Evades Detection</strong></h2>



<p>Once executed, the attack uses rundll32.exe along with WebDAV to pull a malicious DLL from a remote server. Since rundll32.exe is a trusted Windows tool, this activity often appears legitimate.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="825" height="858" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-1.png" alt="" class="wp-image-11541" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-1-288x300.png 288w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-1-768x799.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-1.png 825w" sizes="(max-width: 825px) 100vw, 825px" /><figcaption class="wp-element-caption">Attack Chain  (Source – CyberProof)<br></figcaption></figure>



<p>A few key techniques make this variant harder to detect:</p>



<ul class="wp-block-list">
<li>Uses <strong>WebDAV</strong> to fetch remote files like a network share</li>



<li>Executes DLL functions using <strong>ordinal numbers (#1)</strong> instead of readable names</li>



<li>Avoids early use of PowerShell to bypass common detection rules</li>



<li>Runs most of the attack <strong>in memory</strong>, leaving minimal traces on disk</li>
</ul>



<p>After the initial stage, PowerShell is used quietly with flags like <strong>-NoP</strong> and <strong>-NonI</strong>, along with <strong>IEX (Invoke-Expression)</strong> to load additional payloads.</p>



<p>The final payload, known as <strong>SkimokKeep</strong>, includes advanced evasion methods:</p>



<ul class="wp-block-list">
<li>Resolves system functions using <strong>hashing instead of direct imports</strong></li>



<li>Checks for sandbox or VM environments before running</li>



<li>Uses anti-debugging tricks like timing checks</li>



<li>Injects code into legitimate processes such as browsers</li>
</ul>



<h2 class="wp-block-heading"><strong>Why This Matters</strong></h2>



<p>This shift is significant because many defenses are still focused on detecting script-based attacks. By abusing trusted Windows components and reducing visible activity, attackers get a much quieter entry point.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>What Security Teams Should Watch</strong></h2>



<p>To detect or prevent this attack, organizations should focus on unusual system behavior rather than just scripts:</p>



<ul class="wp-block-list">
<li>Monitor suspicious use of <strong>rundll32.exe</strong>, especially with WebDAV-related arguments</li>



<li>Enable <strong>command-line logging</strong> for system binaries (LOLBins)</li>



<li>Restrict or monitor <strong>WebDAV traffic over port 80</strong></li>



<li>Block known malicious IPs and domains linked to the campaign</li>



<li>Educate users about <strong>fake CAPTCHA pages and ClickFix tricks</strong></li>
</ul>



<p>This variant shows how attackers continue to adapt. The real risk isn’t just the malware itself—it’s how easily users can be convinced to launch it.</p>



<h2 class="wp-block-heading"><strong>Block Known Malicious Infrastructure</strong></h2>



<p>Security teams should proactively block known indicators linked to this campaign to reduce exposure:</p>



<ul class="wp-block-list">
<li><strong>178.16.53[.]137</strong></li>



<li><strong>141.98.234[.]27</strong></li>



<li><strong>46.149.73[.]60</strong></li>



<li><strong>91.219.23[.]245</strong></li>
</ul>



<p>Suspicious domains to watch or block:</p>



<ul class="wp-block-list">
<li><strong>mer-forgea.sightup[.]in[.]net</strong></li>



<li><strong>data-x7-sync.neurosync[.]in[.]net</strong></li>
</ul>



<p>You can place this section right after the “What Security Teams Should Watch” section so it flows naturally as an action step.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/">ClickFix Variant Bypasses Detection Using Rundll32 &amp; WebDAV</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows 11 Blocks Untrusted Kernel Drivers to Improve Security</title>
		<link>https://firsthackersnews.com/windows-kernel-driver-security-update/</link>
					<comments>https://firsthackersnews.com/windows-kernel-driver-security-update/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 29 Mar 2026 05:22:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DriverSecurity]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#KernelSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#Microsoft]]></category>
		<category><![CDATA[#Rootkit]]></category>
		<category><![CDATA[#SecureBoot]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#ThreatProtection]]></category>
		<category><![CDATA[#Windows11]]></category>
		<category><![CDATA[#WindowsServer2025]]></category>
		<category><![CDATA[#WindowsUpdate]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11518</guid>

					<description><![CDATA[<p>Microsoft is introducing a major security improvement in Windows 11 and Windows Server 2025 by changing how kernel</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-kernel-driver-security-update/">Windows 11 Blocks Untrusted Kernel Drivers to Improve Security</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft is introducing a major security improvement in Windows 11 and Windows Server 2025 by changing how kernel drivers are trusted and loaded, significantly enhancing Windows kernel driver security. Starting with the April 2026 update, the operating system will block untrusted cross-signed kernel drivers by default.</p>



<p>This update ensures that only drivers verified through Microsoft’s Windows Hardware Compatibility Program (WHCP) are allowed to run automatically. By enforcing stricter validation, Microsoft is reducing the risk of attackers using malicious drivers to gain deep, kernel-level access to systems.</p>



<p>This enhancement is crucial for maintaining high standards of Windows kernel driver security across all devices.</p>



<p>Kernel drivers operate at the core of the operating system, so any weakness in how they are signed or validated can be exploited. By removing support for legacy signing methods, Microsoft is closing a long-standing security gap.</p>



<h2 class="wp-block-heading"><strong>Removal of Cross-Signed Drivers and Security Impact</strong></h2>



<p>The older cross-signing model allowed third-party certificate authorities to approve drivers without strict validation from Microsoft. While this approach helped with compatibility in the past, it also introduced security risks.</p>



<p>Attackers have historically abused this model by stealing signing keys and using them to install rootkits and other advanced malware. Even though Microsoft deprecated cross-signing in 2021, older certificates were still trusted by Windows systems until now.</p>



<p>With this update, that trust is fully removed. Drivers must now go through a stricter approval process that includes:</p>



<ul class="wp-block-list">
<li>Identity verification of the vendor</li>



<li>Security and compatibility testing</li>



<li>Malware scanning before certification</li>
</ul>



<p>This significantly reduces the chances of malicious drivers being loaded into the Windows kernel.</p>



<h2 class="wp-block-heading"><strong>Deployment Approach and Enterprise Considerations</strong></h2>



<p>To avoid disruptions, Microsoft is rolling out this change in stages. Initially, the system will monitor and evaluate driver activity before enforcing the block. This allows organizations to identify compatibility issues early.</p>



<p>Additionally, Microsoft will maintain an allow list for widely used legacy drivers to prevent system failures. If unsupported drivers are detected, enforcement may be delayed until the system is stable.</p>



<p>For enterprise environments, there is still controlled flexibility. Organizations that rely on custom kernel drivers can allow them using Application Control for Business policies. These policies must be securely signed and tied to UEFI Secure Boot, ensuring only trusted internal drivers are permitted.</p>



<p>Overall, this update marks a significant step toward strengthening Windows security by limiting kernel-level attack vectors and enforcing modern driver validation standards.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-kernel-driver-security-update/">Windows 11 Blocks Untrusted Kernel Drivers to Improve Security</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/windows-kernel-driver-security-update/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Using Windows Minifilters to Identify Ransomware Activity</title>
		<link>https://firsthackersnews.com/windows-minifilter-ransomware-detection/</link>
					<comments>https://firsthackersnews.com/windows-minifilter-ransomware-detection/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 09 Feb 2026 10:32:47 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[#BlueTeam]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DetectionEngineering]]></category>
		<category><![CDATA[#DFIR]]></category>
		<category><![CDATA[#EDR]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#IncidentResponse]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#KernelSecurity]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#MalwareDetection]]></category>
		<category><![CDATA[#ransomware]]></category>
		<category><![CDATA[#SecurityOperations]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#SOC]]></category>
		<category><![CDATA[#ThreatDetection]]></category>
		<category><![CDATA[#ThreatHunting]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11133</guid>

					<description><![CDATA[<p>A security researcher has published a proof-of-concept tool on GitHub aimed at stopping ransomware from inside the operating</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-minifilter-ransomware-detection/">Using Windows Minifilters to Identify Ransomware Activity</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A security researcher has published a proof-of-concept tool on <strong>GitHub</strong> aimed at stopping ransomware from inside the operating system itself.</p>



<p>The project is part of a wider Endpoint Detection and Response effort called <strong>Sanctum</strong>. It shows how defenders can use <strong>Windows Minifilters</strong> to spot and interrupt malicious file encryption before user data is damaged.</p>



<h3 class="wp-block-heading">How the Detection Method Works</h3>



<p>At the center of this approach is a Windows feature known as a <strong>file system filter driver</strong>. This driver operates between user applications and the storage system, meaning every file operation — creating, modifying, or renaming files — passes through it.</p>



<p>Researcher <strong>0xflux</strong> describes this layer as a control point. Because all file activity flows through it, the system can monitor behavior in real time and step in when something suspicious happens.</p>



<p>Although the developer initially planned to build the driver in Rust, the lack of proper filter driver support led to the project being written in C instead.</p>



<h3 class="wp-block-heading">What Signals Indicate Ransomware</h3>



<p>The Sanctum driver registers system callbacks so it gets notified when certain file actions occur. The proof-of-concept focuses on two important Windows file events.</p>



<p>One event tracks when programs request access to files with write or delete permissions. A process rapidly opening many files with these permissions can signal the start of mass encryption.</p>



<p>The second event is more central to this PoC. It triggers when file information changes, such as when a file is renamed. Ransomware often renames files after encryption, adding a new extension to mark them as locked.</p>



<p>In this demo, the driver watches for a specific extension tied to a known <strong>LockBit</strong> variant.</p>



<h3 class="wp-block-heading">How the System Identifies the Attacker</h3>



<p>When a rename event occurs, the driver uses Windows APIs to read the full file name and compare the new extension with known ransomware patterns.</p>



<p>If a match appears, the system does more than log the event. It also determines which process made the change. Using internal functions, it retrieves the process ID and the program name responsible. This gives defenders precise visibility into which application is behaving maliciously.</p>



<p>Right now, the tool mainly records suspicious activity, acting as a detailed monitoring system. However, future versions could go further.</p>



<p>The researcher suggests adding real-time entropy analysis to detect encryption as it happens. Another potential feature is freezing or terminating the threads of a malicious process immediately after detection.</p>



<p>This project shows how moving defenses deeper into the Windows kernel can provide faster response and greater visibility than traditional antivirus solutions that operate at higher system levels.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-minifilter-ransomware-detection/">Using Windows Minifilters to Identify Ransomware Activity</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/windows-minifilter-ransomware-detection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows 11 Strengthens Protection of System Files</title>
		<link>https://firsthackersnews.com/windows-11-kb5074105-system-file-protection-update/</link>
					<comments>https://firsthackersnews.com/windows-11-kb5074105-system-file-protection-update/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 03 Feb 2026 06:12:11 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[AI components Windows]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[endpoint security]]></category>
		<category><![CDATA[enterprise patching]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[KB5074105]]></category>
		<category><![CDATA[Microsoft security update]]></category>
		<category><![CDATA[OS security]]></category>
		<category><![CDATA[privilege escalation prevention]]></category>
		<category><![CDATA[servicing stack update]]></category>
		<category><![CDATA[system file protection]]></category>
		<category><![CDATA[system hardening]]></category>
		<category><![CDATA[update management]]></category>
		<category><![CDATA[Windows 11]]></category>
		<category><![CDATA[windows security]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11092</guid>

					<description><![CDATA[<p>Microsoft has issued KB5074105, an important preview update for Windows 11 versions 24H2 and 25H2, aimed at strengthening</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-11-kb5074105-system-file-protection-update/">Windows 11 Strengthens Protection of System Files</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft has issued <strong>KB5074105</strong>, an important preview update for Windows 11 versions 24H2 and 25H2, aimed at strengthening the operating system’s defense against unauthorized access to sensitive system files.</p>



<p>Although classified as a preview update, it brings major improvements to how Windows safeguards core file structures. The changes address increasing security concerns related to privilege escalation and direct manipulation of protected system resources.</p>



<h2 class="wp-block-heading"><strong>Improved System File Security</strong></h2>



<p>The update introduces tighter controls over Windows system directories and essential files. Access validation has been reinforced so that only properly authorized processes can read or modify protected areas of the operating system.</p>



<p>This improvement targets a common technique used in both advanced and widespread attacks, where adversaries attempt to alter system files to gain higher privileges or establish hidden persistence.</p>



<p>Researchers have observed a rise in attacks involving direct file system abuse. The new mechanisms in <strong>KB5074105</strong> apply layered permission checks, ensuring that interactions with critical files are limited to trusted system components. This layered validation reduces the likelihood of successful privilege escalation attempts.</p>



<h2 class="wp-block-heading"><strong>Servicing Stack Enhancement</strong></h2>



<p>Alongside these protections, Microsoft also released <strong>KB5074104</strong>, which updates the Windows servicing stack. Since this component handles how updates are installed, strengthening it improves the reliability and security of future patch deployments.</p>



<p>For organizations managing large numbers of devices, this means more stable update cycles and a lower risk of systems missing critical patches due to installation failures.</p>



<h2 class="wp-block-heading"><strong>AI Component Improvements</strong></h2>



<p>The update also refreshes several AI-powered modules that support intelligent features within Windows 11. These enhancements focus on better performance and improved security for on-device AI processing.</p>



<p>Updated AI components include:</p>



<ul class="wp-block-list">
<li>Image Search</li>



<li>Content Extraction</li>



<li>Semantic Analysis</li>



<li>Settings Model</li>
</ul>



<p>These modules now operate more efficiently while maintaining strong data protection standards.</p>



<h2 class="wp-block-heading"><strong>Deployment Approach and Recommendations</strong></h2>



<p>Microsoft is releasing <strong>KB5074105</strong> in stages to reduce compatibility risks. Devices receive the update gradually before wider availability.</p>



<p>Security and IT teams are advised to test the update in controlled environments before organization-wide rollout, particularly in sensitive networks. Monitoring update health and coordinating patch management strategies will help ensure smooth adoption.</p>



<p>With attackers increasingly targeting the operating system core, the enhanced file protection features in <strong>KB5074105</strong> provide an important defense layer against evolving threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-11-kb5074105-system-file-protection-update/">Windows 11 Strengthens Protection of System Files</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/windows-11-kb5074105-system-file-protection-update/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows 11 January Update Triggers Serious Boot Issues</title>
		<link>https://firsthackersnews.com/windows-11/</link>
					<comments>https://firsthackersnews.com/windows-11/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 26 Jan 2026 07:29:11 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#BootFailure]]></category>
		<category><![CDATA[#ITAdmin]]></category>
		<category><![CDATA[#Microsoft]]></category>
		<category><![CDATA[#PatchTuesday]]></category>
		<category><![CDATA[#SystemStability]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#Windows11]]></category>
		<category><![CDATA[#WindowsUpdate]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11043</guid>

					<description><![CDATA[<p>Microsoft investigates startup and stability issues affecting recent Windows 11 versions Microsoft is investigating serious problems linked to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-11/">Windows 11 January Update Triggers Serious Boot Issues</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Microsoft investigates startup and stability issues affecting recent Windows 11 versions</strong></p>



<p>Microsoft is investigating serious problems linked to its January 2026 security update for Windows 11 after reports of systems failing to start correctly. The update, which was meant to strengthen security, has instead left some users unable to boot their devices.</p>



<p>The issue is tied to update KB5074109, released for Windows 11 versions 25H2 and 24H2. Shortly after installation, affected systems began showing critical startup errors, including boot loops and black screens. In some cases, devices display an <em>UNMOUNTABLE_BOOT_VOLUME</em> error and never reach the login screen.</p>



<p>Microsoft has acknowledged the problem and confirmed receiving a limited number of reports where devices cannot complete startup. So far, the issue appears to affect physical machines only, with virtual environments remaining unaffected. For impacted users, access to the operating system is often lost entirely, requiring recovery tools to remove the update.</p>



<p>Even on systems that manage to boot, the update has caused widespread stability concerns. Users report random freezes, display issues, and conflicts with graphics drivers, particularly during GPU-intensive tasks. Some applications become unresponsive without triggering a crash or error message, leaving systems stuck until a forced restart.</p>



<p>The update has also disrupted productivity and enterprise services. Microsoft confirmed that credential prompts for certain cloud and remote desktop services were broken, temporarily preventing users from connecting. Outlook Classic users have also reported freezes and sync problems after startup.</p>



<h3 class="wp-block-heading">What users should do now</h3>



<ul class="wp-block-list">
<li>Uninstall the latest update using the Windows Recovery Environment if the system won’t boot</li>



<li>Roll back KB5074109 or pause updates on unstable systems</li>



<li>Delay installing the update until Microsoft releases a permanent fix</li>
</ul>



<p>Microsoft continues to investigate the root cause of these failures. Until a comprehensive resolution is available, users and administrators are advised to approach the January update with caution, especially on production systems.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-11/">Windows 11 January Update Triggers Serious Boot Issues</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/windows-11/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Security Bypass Issue Found in Windows Remote Assistance</title>
		<link>https://firsthackersnews.com/windows-remote-assistance-security-bypass/</link>
					<comments>https://firsthackersnews.com/windows-remote-assistance-security-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 02:27:44 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#MicrosoftSecurity]]></category>
		<category><![CDATA[#PatchTuesday]]></category>
		<category><![CDATA[#RemoteAssistance]]></category>
		<category><![CDATA[#SecurityUpdates]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10996</guid>

					<description><![CDATA[<p>Microsoft has addressed a security weakness in Windows Remote Assistance that could allow attackers to bypass built-in protection</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-remote-assistance-security-bypass/">Security Bypass Issue Found in Windows Remote Assistance</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft has addressed a security weakness in Windows Remote Assistance that could allow attackers to bypass built-in protection mechanisms and access sensitive data under certain conditions. The vulnerability, tracked as CVE-2026-20824, has been rated <em>Important</em> and mainly impacts how Windows applies trust checks to files involved in Remote Assistance sessions.</p>



<p>While the issue does not enable full system takeover, it weakens safeguards designed to protect users from untrusted content, making it particularly relevant in post-compromise or insider attack scenarios.</p>



<h2 class="wp-block-heading"><strong>How the Vulnerability Works</strong></h2>



<p>The flaw lies in how Windows Remote Assistance handles specially crafted files used to start or manage assistance sessions. In some cases, these files are processed in a way that skips normal security checks, allowing them to appear more trusted than they actually are.</p>



<p>As a result, protections tied to <strong>Mark of the Web (MOTW)</strong>—such as warning prompts, SmartScreen checks, and certain script or macro restrictions—may not be enforced. </p>



<p>This means content that originated from the internet could be opened locally without the usual defenses, increasing the risk of stealthy data access or follow-on attacks.</p>



<p>Exploitation requires user interaction, typically by convincing a victim to open a malicious file delivered through email, messaging platforms, or a web download.</p>



<h2 class="wp-block-heading"><strong>Impact, Affected Systems, and Mitigation</strong></h2>



<ul class="wp-block-list">
<li><strong>Impact:</strong> Enables attackers to bypass Mark of the Web protections, potentially allowing sensitive data access or stealthy follow-on attacks without triggering expected security warnings.</li>



<li><strong>Affected Systems:</strong> Supported versions of <strong>Windows 10</strong>, <strong>Windows 11</strong>, and <strong>Windows Server</strong>, including both client and enterprise deployments.</li>



<li><strong>Mitigation:</strong> Microsoft has addressed the issue in the <strong>January 2026 Patch Tuesday</strong> updates. Organizations should apply the updates as soon as possible. Until patching is complete, administrators are advised to restrict Windows Remote Assistance usage, enhance email and web filtering controls, and remind users to avoid opening unsolicited assistance files or attachments.</li>
</ul>



<p>Applying the latest security updates restores proper protection checks and significantly reduces the risk of this bypass technique being exploited.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-remote-assistance-security-bypass/">Security Bypass Issue Found in Windows Remote Assistance</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/windows-remote-assistance-security-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows Graphics Vulnerability Opens the Door to System Hijack with a Single Image</title>
		<link>https://firsthackersnews.com/windows-graphics-vulnerability/</link>
					<comments>https://firsthackersnews.com/windows-graphics-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 20 Nov 2025 17:19:47 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<category><![CDATA[windows graphics]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10668</guid>

					<description><![CDATA[<p>A serious remote code execution flaw in Microsoft’s Windows Graphics Component allows attackers to take control of a</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-graphics-vulnerability/">Windows Graphics Vulnerability Opens the Door to System Hijack with a Single Image</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A serious remote code execution flaw in Microsoft’s Windows Graphics Component allows attackers to take control of a device using a specially crafted JPEG image.</p>



<p>Rated <strong>9.8 on the CVSS scale</strong>, this vulnerability is extremely dangerous because it can be exploited <strong>without any user interaction</strong>.</p>



<h2 class="wp-block-heading"><strong>All about the vulnerability</strong></h2>



<p>The flaw was discovered in May 2025 and patched by Microsoft on August 12, 2025. It comes from an untrusted pointer dereference in the <strong>windowscodecs.dll</strong> file, which is responsible for core image processing.</p>



<p>Attackers can hide a malicious JPEG inside common files such as Microsoft Office documents. When the file is opened or even previewed, the system can be silently compromised.</p>



<p>This issue shows the risks that still exist in older graphics-handling components, where something as simple as decoding an image can lead to a full system takeover. Since Windows is used on billions of devices, unpatched machines remain highly vulnerable to phishing attacks and drive-by downloads.</p>



<p>Zscaler ThreatLabz discovered the vulnerability through targeted fuzzing of the Windows Imaging Component, focusing on how JPEG images are encoded and decoded within windowscodecs.dll.</p>



<p>The entry point for exploitation is in the <strong>GpReadOnlyMemoryStream::InitFile</strong> function. By manipulating buffer sizes, attackers can take control of memory snapshots during file mapping.</p>



<p>Fuzzing tests uncovered a crash caused by an uninitialized pointer at <strong>jpeg_finish_compress+0xcc</strong>, allowing user-controlled data to be accessed through heap spraying.</p>



<p>Debugging with WinDbg showed stack traces involving functions like <strong>CJpegTurboFrameEncode::HrWriteSource</strong> and <strong>CFrameEncodeBase::WriteSource</strong>, confirming that the flaw lies in JPEG metadata handling.</p>



<p>This uninitialized resource bug allows attackers to run code remotely without needing special permissions. Microsoft confirmed that the issue affects automatic image rendering in applications that rely on the Windows Graphics Component.</p>



<h2 class="wp-block-heading">Affected Versions and Patch Information</h2>



<figure class="wp-block-table"><table><thead><tr><th>Product</th><th>Impacted Version</th><th>Patched Version</th></tr></thead><tbody><tr><td>Windows Server 2025</td><td>10.0.26100.4851</td><td>10.0.26100.4946</td></tr><tr><td>Windows 11 Version 24H2 (x64)</td><td>10.0.26100.4851</td><td>10.0.26100.4946</td></tr><tr><td>Windows 11 Version 24H2 (ARM64)</td><td>10.0.26100.4851</td><td>10.0.26100.4946</td></tr><tr><td>Windows Server 2025 (Core)</td><td>10.0.26100.4851</td><td>10.0.26100.4946</td></tr></tbody></table></figure>



<p>Zscaler’s proof-of-concept shows how attackers can manipulate memory by using an app that allocates, frees, and processes Base64-encoded JPEG files, eventually gaining control over the instruction pointer.</p>



<p>There are no known real-world attacks yet, but the low skill needed and the broad attack surface make this vulnerability attractive to ransomware groups and espionage actors. On 32-bit systems, the risk is even higher because Control Flow Guard is disabled by default.</p>



<p>Users should install the August 2025 Patch Tuesday updates as soon as possible, especially on critical systems. It also helps to disable automatic image previews in email clients and restrict untrusted files to sandboxed environments. Zscaler has already deployed cloud-level defenses to detect and block any exploit attempts.</p>



<p>This case highlights the risks of outdated graphics libraries in enterprise environments, where JPEG files are used everywhere. Although no active exploitation has been observed, quick patching and cautious file handling remain the best protection against these image-based attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-graphics-vulnerability/">Windows Graphics Vulnerability Opens the Door to System Hijack with a Single Image</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/windows-graphics-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Boosts Windows 10 Security with Updates Until 2026</title>
		<link>https://firsthackersnews.com/microsoft-windows-10-security-updates-2026/</link>
					<comments>https://firsthackersnews.com/microsoft-windows-10-security-updates-2026/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 25 Jun 2025 07:30:07 +0000</pubDate>
				<category><![CDATA[Security Update]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[#ExtendedSecurity]]></category>
		<category><![CDATA[#Microsoft]]></category>
		<category><![CDATA[#Updates]]></category>
		<category><![CDATA[#Windows 10]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10336</guid>

					<description><![CDATA[<p>Microsoft has unveiled plans to extend security updates for Windows 10 until October 13, 2026, offering critical protection</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-windows-10-security-updates-2026/">Microsoft Boosts Windows 10 Security with Updates Until 2026</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft has unveiled plans to extend security updates for Windows 10 until October 13, 2026, offering critical protection beyond the operating system’s end-of-support date on October 14, 2025. This initiative ensures millions of users stay safeguarded against escalating cyber threats like ransomware while planning their transition to Windows 11.</p>



<h2 class="wp-block-heading"><strong>Flexible Enrollment Options for Windows 10 Users</strong></h2>



<p>The Extended Security Update (ESU) program, starting October 15, 2025, introduces a Settings app wizard to deliver essential security patches for an additional year. With Windows 10 powering 53% of Windows PCs as of May 2025, the program supports users facing Windows 11’s stringent hardware requirements, such as TPM chips or modern CPUs.</p>



<p>Users can choose from three enrollment options:</p>



<ul class="wp-block-list">
<li><strong>Free Cloud Sync</strong>: Sync settings via Windows Backup at no cost.</li>



<li><strong>Microsoft Rewards</strong>: Redeem 1,000 points for a free ESU license.</li>



<li><strong>Paid Subscription</strong>: Pay $30 per PC for a one-year license.</li>
</ul>



<p>The wizard, now in preview through the Windows Insider Program, will be available to all by mid-August 2025, requiring a Microsoft account. The ESU focuses solely on security updates, excluding new features or non-security patches.</p>



<h2 class="wp-block-heading"><strong>Tackling Growing Cybersecurity Risks</strong></h2>



<p>This extension addresses a surge in cyber threats, including ransomware exploiting vulnerabilities like the Windows Common Log File System Driver flaw (CVE-2025-29824). Recent zero-day exploits, such as the WebDAV vulnerability (CVE-2025-33053), underscore the need for continued updates. Microsoft’s move ensures Windows 10 users remain protected during the transition to Windows 11, which holds a 43% market share.</p>



<p>“Microsoft’s ESU program is a critical step to secure legacy systems,” said a CloudSEK cybersecurity expert. “It buys time for users to upgrade while maintaining robust defenses.”</p>



<p>Microsoft’s extended support reinforces its commitment to user security while encouraging Windows 11 adoption. As cyber threats evolve, this program provides Windows 10 users with vital protection, ensuring a safer computing experience.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-windows-10-security-updates-2026/">Microsoft Boosts Windows 10 Security with Updates Until 2026</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-windows-10-security-updates-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Enhanced Admin Security for Windows 11</title>
		<link>https://firsthackersnews.com/administrator-protection/</link>
					<comments>https://firsthackersnews.com/administrator-protection/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 21 May 2025 16:50:22 +0000</pubDate>
				<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[admin security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[Windows 11]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10222</guid>

					<description><![CDATA[<p>Microsoft is rolling out a major security upgrade in Windows 11 called Administrator Protection, aimed at stopping privilege</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/administrator-protection/">Enhanced Admin Security for Windows 11</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft is rolling out a major security upgrade in Windows 11 called <em>Administrator Protection</em>, aimed at stopping privilege escalation attacks and making admin rights more secure. This new feature is part of a broader push to reduce risks from stolen admin tokens and misused permissions.</p>



<p>According to Microsoft’s Digital Defense Report 2024, there are around 39,000 token theft attacks every day, showing how urgent this problem has become.</p>



<h2 class="wp-block-heading"><strong>What Is Administrator Protection?</strong></h2>



<p>The feature changes how admin access works on Windows systems. Instead of giving users full-time admin rights, Windows now uses a hidden, system-generated profile called the System Managed Administrator Account (SMAA). This account creates a temporary admin token only when needed for specific tasks.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="624" height="275" src="https://firsthackersnews.com/wp-content/uploads/2025/05/image-4.png" alt="" class="wp-image-10223" srcset="https://firsthackersnews.com/wp-content/uploads/2025/05/image-4-200x88.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-4-300x132.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-4-400x176.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-4-600x264.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-4.png 624w" sizes="(max-width: 624px) 100vw, 624px" /><figcaption class="wp-element-caption">Example</figcaption></figure>



<p>When a task requires admin permissions, users will be prompted to verify their identity using Windows Hello (such as PIN, fingerprint, or face). After the task is done, the token disappears—reducing the risk of abuse by malware or threat actors.</p>



<h2 class="wp-block-heading"><strong>Key Benefits</strong></h2>



<ul class="wp-block-list">
<li><strong>No more silent auto-elevation:</strong> Every admin action now needs user approval.</li>



<li><strong>Improved UAC prompts:</strong> Color-coded warnings now highlight risky app behaviors.</li>



<li><strong>Stronger isolation:</strong> Elevated and non-elevated apps no longer share settings or themes.</li>



<li><strong>Harder to bypass:</strong> This blocks old techniques like registry or environment variable hacks.</li>
</ul>



<p>Microsoft emphasizes that unlike traditional User Account Control (UAC), which was more of a soft warning system, Administrator Protection creates a real security boundary that attackers will have a harder time crossing.</p>



<p>You can check if it’s working by running an elevated Command Prompt and typing <code>whoami</code>. If you see <code>ADMIN_</code>, the feature is active.</p>



<p>This is a big step forward in making Windows safer for both regular users and IT admins managing large environments.</p>



<p>Administrator Protection will be available in all editions of Windows 11—Home, Pro, Enterprise, and Education. Users can turn it on from Windows Security &gt; Account Protection, while IT teams can manage it through Group Policy or Intune.</p>



<p>The feature separates standard and admin user profiles. Files and settings created in admin mode stay in the admin profile, so changes don’t carry over to regular mode.</p>



<p>Microsoft recommends using apps with the least privileges needed, and only allowing admin access for specific tasks.</p>



<p>Starting May 2025, apps running with admin rights will have restricted access to sensitive features like the camera, microphone, and location unless users give permission.</p>



<p>David Weston from Microsoft called this “the most significant security upgrade in a generation,” reinforcing Microsoft’s push to make Windows more secure.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/administrator-protection/">Enhanced Admin Security for Windows 11</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/administrator-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>RVTools Exploited to Deliver Bumblebee Malware to Windows Users</title>
		<link>https://firsthackersnews.com/rvtools/</link>
					<comments>https://firsthackersnews.com/rvtools/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 20 May 2025 02:37:37 +0000</pubDate>
				<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[Bumblebee malware]]></category>
		<category><![CDATA[exploitation]]></category>
		<category><![CDATA[RVTools]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Windows Users]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10216</guid>

					<description><![CDATA[<p>On May 13, 2025, a sophisticated supply chain attack compromised the trusted VMware administration tool RVTools, turning it</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/rvtools/">RVTools Exploited to Deliver Bumblebee Malware to Windows Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>On May 13, 2025, a sophisticated supply chain attack compromised the trusted VMware administration tool RVTools, turning it into a malware delivery platform. </p>



<p>The attackers managed to replace the legitimate RVTools installer on the official website with a malicious version that silently deployed Bumblebee—a highly dangerous malware loader known for enabling ransomware attacks and post-exploitation activities.</p>



<p>Security experts first detected the breach when Microsoft Defender for Endpoint flagged suspicious behavior coming from a file named “version.dll” executing in the same directory as the RVTools installer. </p>



<p>While the installer appeared legitimate at first glance, it contained hidden malicious code that activated immediately after installation.</p>



<p>Further analysis revealed a mismatch in hash values between the compromised installer and the official version published on the RVTools website, confirming the tampering. </p>



<p>Malware analysts at ZERODAY LABS identified the payload as a custom variant of the Bumblebee loader, widely used by threat actors for initial access to corporate networks in preparation for ransomware campaigns.</p>



<p>VirusTotal scans showed that 33 out of 71 antivirus engines detected the file as malicious, highlighting the serious threat posed by this attack and the potential for widespread distribution.</p>



<p>This incident underscores the growing complexity of software supply chain compromises, especially targeting tools frequently used in enterprise environments. </p>



<p>The trojanized installer was available on the RVTools website for about an hour before the breach was discovered, the infected files were removed, and the legitimate installer restored.</p>



<p>Interestingly, the malware authors employed unusual obfuscation tactics within the file metadata to confuse security researchers. </p>



<p>For example, the original filename was listed as “Hydrarthrus,” and the company description was given as “Enlargers pharmakos submatrix,” clearly designed to mislead and delay investigation efforts.</p>



<h2 class="wp-block-heading"><strong>Infection Process</strong></h2>



<p>The infection began when users downloaded the seemingly official RVTools installer from the compromised website. Upon running the installer, it deployed the expected RVTools files but also silently dropped a malicious “version.dll” file into the installation directory.</p>



<p>This method exploits a Windows feature called DLL search order hijacking. Since Windows tries to load DLLs from the application’s folder before system directories, the malware’s version.dll was loaded instead of the legitimate system file, allowing the attacker’s code to run with the same privileges as the application.</p>



<p>Once executed, the malware established persistence on the system and attempted to connect to command-and-control (C2) servers to receive further instructions. This communication channel could enable attackers to download additional malicious payloads, increasing the risk of further compromise.</p>



<h2 class="wp-block-heading"><strong>Recommendations</strong></h2>



<p>Organizations and users who downloaded RVTools during the affected period should immediately verify the integrity of their installer files by checking hash values against official sources. </p>



<p>It is also crucial to scan for unauthorized “version.dll” files in user directories and remove any suspicious files.</p>



<p>This incident serves as a powerful reminder of the evolving threat landscape, where even trusted enterprise tools can be weaponized through supply chain attacks. </p>



<p>Vigilance, rapid incident response, and strict validation of software sources remain key to defending against these sophisticated threats.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/rvtools/">RVTools Exploited to Deliver Bumblebee Malware to Windows Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/rvtools/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
