A cybersecurity rule sitting in Microsoft’s antivirus program will soon run by default, in a bid to prevent threat actors from stealing Windows credentials.
Cybersecurity researcher Kostas (opens in new tab) first spotted the change in an update to Microsoft’s Attack Surface Reduction (ASR) rules.
Threat actors usually steal credentials or use various exploits in order to move laterally through an already compromised network. One way to go about this business is to get admin access, then dump the memory of the Local Security Authority Server Service (LSASS) process, as it holds NTLM hashes of Windows credentials.
These can later be brute-forced, but in order to keep LSASS memory dumps away from prying eyes, Microsoft prevents access to it, through the Credential Guard, which isolates the process in a virtualized container.
However, as BleepingComputer notes, the feature sometimes results in driver conflicts on the endpoints, which is why many organizations choose not to enable it.
Now, to work around this issue, Microsoft will enable an ASR rule, called “Block credential stealing from the Windows local security authority subsystem,” by default.
It prevents processes from opening the LSASS process, even with admin privileges.
"The default state for the Attack Surface Reduction (ASR) rule “Block credential stealing from the Windows local security authority subsystem (lsass.exe)” will change from Not Configured to Configured and the default mode set to Block. All other ASR rules will remain in their default state: Not Configured.," the updated document reads.
"Additional filtering logic has already been incorporated in the rule to reduce end user notifications. Customers can configure the rule to Audit, Warn or Disabled modes, which will override the default mode. The functionality of this rule is the same, whether the rule is configured in the on-by-default mode, or if you enable Block mode manually. "
- You might also want to check out our list of the best identity theft protection right now
Via: BleepingComputer (opens in new tab)