Skip to main content

Oops: Microsoft’s “Super-secure” Windows 10 S Hacked In 3 Hours


windows 10 s hacked
Image: ZDNet
With the launch of Windows 10 S, Microsoft claimed that it’s an extra-secure operating system that’s protected against all kinds of ransomware. To test the claims, folks at ZDNet hired a security firm. As a result, the hackers were able to breach Windows 10 S within 3
hours by using Microsoft Word’s handling of macros.
At its Build 2017 Developer Conference, Microsoft unveiled a new version of Windows 10, which was called Windows 10 S (here’s how it’s different from Windows 10). Aimed primarily at schools and education sector, this operating system doesn’t allow one to install applications other than those from Windows Store. Microsoft said that it was an additional step taken to enhance the security.
While this inability to install foreign applications on Windows 10 S was bashed by many, Microsoft further declared that Windows 10 S can’t be targetted by any kind of ransomware. That’s a bold claim.
So, to check the validity of this claim, the folks at ZDNet hired the security firm Hacker House. They put a simple question in front of Matthew Hickey, a security researcher and co-founder of Hacker House: “Will ransomware install on this operating system?”

Macros tricked Microsoft once again

Windows 10 S did present some hurdles. Apart from the only-Windows-Store-apps limitation, there isn’t any Command Prompt or PowerShell. The hacker expected more restrictions on trying to run processes with escalated privileges, but he was surprised to realize how easy it was to hack Windows 10 S.
He made use of a longtime foe — macros. Hickey was able to exploit how Word handles and processes macros. He created a notorious, macro-based Word file. Upon opening, the file allowed him to launch a reflective DLL injection attack. This way he bypassed the Windows Store restriction put by Microsoft because Word is itself available in Windows Store.
macros windows 10 s hack
Image: ZDNet
Please note that Word’s protected view feature blocks the macros in files which are downloaded from the internet or email. That’s why Hickey downloaded the file via a network share. Windows considers it a trusted source and gives full access.
By running the code, he was able to download a payload using Metasploit (here are some more hacking tools) and connect the OS to his C&C server. This way, he was able to remotely control the computer. “If I wanted to install ransomware, that could be loaded on,” he said. “It’s game over.”
You can read the complete story on Windows 10 S hack here on ZDNet.

Comments

Follow Us

WHAT'S HOT

Virtual and Augmented Reality: Transforming The Way We Look At The Internet and Data Security

Virtual and Augmented Reality have redefined every aspect of our modern world ranging from gaming, music, and pop culture, to business, human interaction, and development. However, ‘with great power comes great responsibility’. When it comes to a technology slowly becoming a part of some of our most sensitive aspects in our lives (finances, identity, and health), ensuring its safety is highly important. Despite this, many companies have certainly not done their part to ensure the better virtual reality security and, in turn,

Twin sisters CONJOINED at abdomen, liver and umbilical cord die soon after birth (photo)

> The Siamese twins who were born in Zambia a few days ago passed away > They were joined at the chest > The babies shared one abdomen, liver and umbilical cord The conjoined twins who had been born at KITWE Central Hospital in Zambia a few days ago, have passed away. The Siamese girls were delivered by a 19-year-old woman. They were joined by the chest, sharing one abdomen, liver and umbilical cord.

Which Is The Best Linux Distro For Beginners? — 2017 Edition

Are you looking for  a Linux distro that’s suitable for new users who are willing to start   an exciting Linux journey? Well, you’re at the right place. These days, Linux Mint is giving a tough competition to Ubuntu as it’s very beginner-friendly. Our other top recommendations are Zorin OS (which looks a lot like Windows operating system) and lightweight Linux Lite.

Google’s Open Source DIY Kit Turns Your Raspberry Pi Into An AI Assistant

The latest edition of the MagPi magazine includes a DIY kit created by Google that can be used to create a custom Google Home device powered by Raspberry Pi. A user can take advantage of the Google Assistant SDK and Google Cloud Speech API to enable voice control in their projects.