• Old Microsoft ‘opt-in’ fix exploited in 3CX attack

    Home » Forums » Cyber Security Information and Advisories » Code Red – Security/Privacy advisories » Old Microsoft ‘opt-in’ fix exploited in 3CX attack

    Author
    Topic
    #2548078

    March 31st 2023

    Ref: bleepingcomputer

    Interesting article by Lawrence Abrams that caught my eye..

    A 10-year-old Windows vulnerability is still being exploited in attacks to make it appear that executables are legitimately signed, with the fix from Microsoft still “opt-in” after all these years. Even worse, the fix is removed after upgrading to Windows 11…..

    A registry fix has been supplied within the article:

    Windows Registry Editor Version 5.00
    [HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Wintrust\Config]
    “EnableCertPaddingCheck”=”1”

    [HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Cryptography\Wintrust\Config]
    “EnableCertPaddingCheck”=”1”

    The author follows on to share his feedback..

    I enabled the optional fix, used the computer as usual throughout the day, and did not run into any issues that made me regret my decision.

    While this may cause an issue with some installers, like Google Chrome, not showing as signed, the added protection is worth the inconvenience.

    Will Dormann reveals troubling authenticode findings over on twitter

    Both Windows 10 and 11 are affected but no mention of whether earlier and subsequent Windows Server editions will be affected? (I’d imagine so..)

    Keeping IT Lean, Clean and Mean!
    3 users thanked author for this post.
    Viewing 1 reply thread
    Author
    Replies
    Viewing 1 reply thread
    Reply To: Old Microsoft ‘opt-in’ fix exploited in 3CX attack

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: