Close Menu
    Facebook X (Twitter) Instagram
    Saturday, November 15
    Facebook X (Twitter) Instagram
    SecurNerd
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    SecurNerd
    Home»Vulnerabilities»Endpoint Security Vulnerability Detected in Windows Container Framework
    Vulnerabilities

    Endpoint Security Vulnerability Detected in Windows Container Framework

    securnerdBy securnerdAugust 31, 2023No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Recent investigations have highlighted a potential method that cyber attackers might employ to skilfully dodge malware detection, focusing on exploiting the Windows Container Isolation Framework.

    This revelation was unveiled by Daniel Avinoam, a security researcher from Deep Instinct, during the DEF CON security summit earlier this month.

    Central to Microsoft’s container design, inclusive of its Windows Sandbox, is the employment of a dynamically created image. This image acts to distinguish the file system of each container from its host while also circumventing the redundancy of system files.

    Described as an “OS image that retains pristine file versions that can be altered but is linked to those that remain constant in the existing Windows image on the host,” this approach significantly reduces the need for extensive OS space.

    This is where the Windows Container Isolation FS (wcifs.sys) minifilter driver becomes essential. This driver’s primary role is to maintain the filesystem demarcation between Windows containers and the main host.

    The underlying concept suggests running the ongoing process within a virtual container and capitalizing on the minifilter driver to manage I/O tasks. This arrangement would allow operations like file creation, reading, writing, and deletion, all without ringing any alarms in the security software.

    It’s vital to understand that a minifilter connects to the file system in a roundabout manner. It registers with the filter manager and specifies the I/O operations it intends to screen. Every minifilter is then assigned an “altitude value” by Microsoft based on its filter prerequisites and load sequence.

    With an altitude range of 180000-189999 (precisely 189900), the wcifs driver operates distinctly from antivirus filters. Most of these antivirus filters operate at altitudes ranging from 320000-329999. This altitude difference means certain file operations can occur without activating their respective callbacks.

    Avinoam clarified, “Thanks to our ability to modify files utilizing the IO_REPARSE_TAG_WCI_1 reparse tag without antivirus drivers detecting them, their detection process won’t get the full context, preventing any alarms from being raised.”

    However, it’s important to note that this attack method demands admin rights to engage with the wcifs driver. Moreover, it doesn’t provide the leverage to modify files on the host system directly.

    The revelation emerged simultaneously as the cybersecurity firm showcased a covert method named NoFilter. This strategy misuses the Windows Filtering Platform (WFP) to amplify user rights to SYSTEM levels, paving the way for potential malicious code execution.

    This method enables the harnessing of WFP to clone access tokens for varied processes, stimulate an IPSec link, and exploit the Print Spooler service to embed a SYSTEM token, facilitating unauthorized system access.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 57
    Trending
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleKali Linux 2023.3 Unleashed: Enhanced NetHunter App, Fresh Tools, and More Power for Penetration Testers!
    Next Article Where’s all the money gone? Even AI startups struggling to find investors
    securnerd
    • Website
    • Facebook
    • X (Twitter)
    • Instagram

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Related Posts

    AI July 22, 2024

    Complete HTML Handwritten Notes

    July 22, 2024
    AI July 21, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024
    Python June 23, 2024

    PyQt Mastery: From Beginner to Advanced

    June 23, 2024
    Add A Comment
    Leave A Reply Cancel Reply

    Join the Community
    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    For Good Results Must Be Make Good Plan

    September 6, 20230 Views

    Ukrainian Authorities Detect Russian Hacker Campaign Seeking Evidence of War Crimes

    September 25, 20232 Views

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    December 1, 20231 Views

    What is generative AI? Explaining how to use it, its types, how it works, and examples of its use

    June 5, 202465 Views

    Debian Project Launches Debian 12.1 “Bookworm” Featuring 89 Bug Remediations and 26 Security Enhancements

    July 24, 202310 Views

    Unpatched Citrix Servers Remain Vulnerable to CVE-2023-3519 RCE Attacks: Over 15,000 at Risk

    July 25, 202316 Views

    Independent Lab Validates Nubeva’s Innovative Ransomware Key Interception and Decryption Technology

    July 26, 202316 Views

    Vulnerabilities in WordPress Ninja Forms Plugin Expose User Data to Theft

    July 28, 202332 Views

    Microsoft Edge Deepens Dark Mode Experience with Enhanced Theme

    July 31, 202312 Views

    Patchwork Cyber Group Targets Chinese Academic and Research Institutions with EyeShell Backdoor

    July 31, 202342 Views
    Facebook X (Twitter) Instagram Pinterest
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.