Malware exploits decade old Windows bug, which has an opt-in fix
#1
Information 
Quote:[Image: windows-oVAzLDIdqic-unsplash-1.jpg]

A decade old Windows bug, for which a fix is available, is used by malware currently in attacks against Windows devices. Malware actors may exploit the vulnerability to add malicious code to signed Windows files without them losing their signed status.

Digital signatures are used on Windows to determine the authenticity of files. Most security solutions check for signatures when they check files on Windows machines.

What makes this exploit even more problematic is the fact that a fix is available, but that it is opt-in. If that was not enough, it appears that upgrades to Windows 11 may drop the fix, if applied in the Windows Registry.

Bleeping Computer reported this week that the VOIP communications company 3CX was compromised. The attackers managed to include malware into the company's desktop application for Windows. Two DLL files used by the desktop application were modified by the threat actors to include malware, more precisely, an information-stealing trojan.

What makes the attack special is that the attackers are exploiting CVE-2013-3900, WinVerifyTrust Signature Validation Vulnerability, which Microsoft confirmed in 2013 for the first time and has updated in early 2022 with additional information.

How to protect Windows devices against the attacks

[Image: windows-cert-padding-check.png]

Microsoft published an opt-in fix to address the issue in 2013, and it has been valid ever since.

Windows 64-bit versions may be protected with the following Registry code:

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Wintrust\Config]
"EnableCertPaddingCheck"="1"
[HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Cryptography\Wintrust\Config]
"EnableCertPaddingCheck"="1"

Note: you need to paste the code into a plain text file and rename its file extension, so that it is .reg. We have uploaded a Zip archive with Registry files for 32-bit and 64-bit versions of Windows: windows-registry-fix

All you need to do is double-click on the file to add the information to the Registry (a verification prompt is displayed, which you need to allow).
A restart of the system is required. Delete the listed Registry values to undo the change at any time.

Enabling the changes will make non-confirming binaries "appear unsigned" and be rendered untrusted as a consequence.

Why opt-in?

Why did Microsoft release the patch this way, and did not integrate it directly into Windows? The extensive FAQ on the support page provides an answer.

According to Microsoft, enabling the stricter verification behavior may "impact some installers" and also certain AppLocker behavior and Software Restriction Policies.

Closing Words

Windows administrators may check the listed Registry values above to verify if the devices are protected against the vulnerability. Windows devices that were upgraded to Windows 11 need to be rechecked, as the Registry values are likely no longer there after the upgrade. Note that applying the changes using policies should keep them enabled after the upgrade.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
WinRAR 7.20
WinRAR 7.20 (stabl...harlan4096 — 10:27
Vivaldi 7.8 Build 3925.62
Vivaldi 7.8 Build ...harlan4096 — 09:56
New Windows 11 Preview Adds Sysmon, Fixe...
Microsoft has rele...harlan4096 — 09:30
Android 16 February 2026 Security Update...
Google has begun t...harlan4096 — 08:59
Mozilla Firefox Browser 147.0.3
Mozilla Firefox Br...harlan4096 — 07:44

[-]
Birthdays
Today's Birthdays
avatar (48)Michaelecozy
Upcoming Birthdays
avatar (47)hapedDow
avatar (46)komriwat
avatar (38)showercurtains
avatar (49)PeterWhink
avatar (50)neuthrusBub
avatar (30)script6027529171
avatar (46)delsreehRob
avatar (44)pyotrded
avatar (41)oecmecodo
avatar (40)ShakitaSmobe
avatar (49)tsorenHievy
avatar (46)myhotseeve
avatar (46)Edwinmub
avatar (46)dimaWeami
avatar (41)svoyaEnuct
avatar (39)TranoTymn
avatar (39)MezirLal
avatar (50)listfquoto
avatar (46)dima6sarPrave
avatar (38)Michaelaburi
avatar (46)dpascoal
avatar (51)Ronaldduh
avatar (39)legalgauch
avatar (41)yposegij
avatar (44)Baihu
avatar (27)RaseinsLikes

[-]
Online Staff
There are no staff members currently online.

>