Microsoft is hoping to make it tougher to steal Windows passwords

passwords
(Image credit: Shutterstock / vladwel)

A cybersecurity rule sitting in Microsoft’s antivirus program will soon run by default, in a bid to prevent threat actors from stealing Windows credentials

Cybersecurity researcher Kostas first spotted the change in an update to Microsoft’s Attack Surface Reduction (ASR) rules.

Threat actors usually steal credentials or use various exploits in order to move laterally through an already compromised network. One way to go about this business is to get admin access, then dump the memory of the Local Security Authority Server Service (LSASS) process, as it holds NTLM hashes of Windows credentials. 

Driver conflicts

These can later be brute-forced, but in order to keep LSASS memory dumps away from prying eyes, Microsoft prevents access to it, through the Credential Guard, which isolates the process in a virtualized container. 

However, as BleepingComputer notes, the feature sometimes results in driver conflicts on the endpoints, which is why many organizations choose not to enable it. 

Now, to work around this issue, Microsoft will enable an ASR rule, called “Block credential stealing from the Windows local security authority subsystem,” by default. 

It prevents processes from opening the LSASS process, even with admin privileges.

"The default state for the Attack Surface Reduction (ASR) rule “Block credential stealing from the Windows local security authority subsystem (lsass.exe)” will change from Not Configured to Configured and the default mode set to Block. All other ASR rules will remain in their default state: Not Configured.," the updated document reads.

"Additional filtering logic has already been incorporated in the rule to reduce end user notifications. Customers can configure the rule to Audit, Warn or Disabled modes, which will override the default mode. The functionality of this rule is the same, whether the rule is configured in the on-by-default mode, or if you enable Block mode manually. "

 Via: BleepingComputer 

Sead Fadilpašić

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.