This Tuesday, 2023-07-11, was Microsoft’s Patch Tuesday for July 2023, so right here’s a quick reminder to do two issues:
Patch early, patch usually.
Greater than 100 vulnerabilities have been patched this month, together with 4 zero-day safety holes for which working exploit code already exists.
Despite the fact that everybody was in danger till Tuesday, it’s necessary to not be a type of individuals who stays in danger longer than essential.
When defenders shut off holes that cybercriminals are already abusing, it is best to assume one factor: these crooks are going to focus their consideration on the stragglers in opposition to whom these now-patched assaults are nonetheless efficient, with a purpose to extract the final “worth” out of their former zero-day holes.
Head to our sister web site Sophos Information for official particulars concerning the patches.
We’ve printed an unavoidably prolonged listing, primarily based on Microsoft’s official information, that can assist you navigate via the various CVE numbers and bug explanations related to the quite a few services and products affected.
We predict you’ll discover the data simpler to work with, as a place to begin, than Redmond’s personal tables and charts.
We’ve additionally printed an in-depth article about an ongoing safety challenge that was severe sufficient to be addressed in a Microsoft Advisory (ADV230001).
We’ve given you necessary, fascinating and informative element concerning the ongoing saga of malicious kernel drivers, a lot of them signed and authorised by Microsoft itself, which have lastly been blocked by Home windows.
Two fast takeaways
As we’ve talked about above, you may learn up about this month’s Microsoft safety fixes on Sophos Information, however there are two components of this month’s patch set that we thought we’d cowl right here.
The primary necessary merchandise is the matter of these 4 zero-days that we already referred to.
CVE-2023-32049 and CVE-2023-35311 are safety bypass exploits, that means that criminals can abuse these bugs to sidestep safety protections that might in any other case bounce in that can assist you keep away from malware an infection or a potential assault.
Between them, these bugs permit criminals to current you with booby-trapped net URLs in your browser, or malicious electronic mail content material in Outlook, that might normally pop up a warning to remind you of the dangers, and to provide you an opportunity to bail out and shield your self…
…with out these warnings showing in any respect.
Though this isn’t as harmful as a real distant code execution (RCE) gap, the place an outsider might trick you into operating a rogue program simply by viewing an online web page or by beginning a selected community service, you may see why safety bugs of this kind are gold mud to cybercriminals.
Bypasses for safety warnings that customers have come to count on, and maybe to depend upon, present a easy and efficient means of luring even well-informed and cautious customers into making expensive errors.
There are additionally patches for 2 zero-day elevation of privilege (EoP) exploits.
EoP exploits imply that crooks who’re already in your community, however with out the power to do a lot harm or to steal a lot information, can promote themselves to sysadmin degree and thus primarily challenge themselves “entry all areas” safety badges.
Dodgy driver issues
The second necessary merchandise is the matter of ADV230001, Microsoft’s advisory entitled Steering on Microsoft signed drivers getting used maliciously.
This saga began again on the finish of 2022, when Sophos researchers got here throughout one thing that you just don’t see anyplace close to as usually as you used to, particularly rogue Home windows kernel drivers:
The beauty of kernel drivers is that they supply a means for third-party software program to get usefully concerned on the very lowest ranges of the working system, similar to supporting esoteric laptop {hardware}, offering further cybersecurity safety, monitoring and managing in any other case invisible particulars together with reminiscence allocation and useful resource utilisation, and extra.
A kernel-level anti-virus program, for instance, can bounce in earlier than each program runs, and never merely report but additionally actively block rogue software program from loading in any respect.
The not-so-great factor about kernel drivers is that they provide the exact same super-low-level, mega-dangerous and probably subversive capabilities to malware creators and cybercriminals, too.
Certainly, kernel-level malware instruments, usually generally known as a rootkits, can work the identical type of low-level magic in reverse, for instance by watching out for known-bad applications and stopping them from being blocked within the first place, and even making them apparently invisible to scanning instruments, listing itemizing software program and inventory-taking functions.
The identify rootkit comes from early Unix malware, and references the concept of a equipment of software program instruments that helps you not solely to get administrator-level entry within the first place (generally known as root on Unix and Unix-like programs), but additionally to go unnoticed for so long as potential.
Driver clampdown
Because of the proliferation and abuse of rootkits on Home windows XP, Microsoft began clamping down on kernel drivers, beginning again in Home windows Vista.
Certainly, in present variations of Home windows the place Safe Boot is enabled, you may solely load kernel drivers which have been formally reviewed and digitally signed by Microsoft itself. (There are exceptions to this rule, however you may’t simply create and cargo a kernel driver right this moment with out sending it to Microsoft for scrutiny first.)
Though you might, albeit reluctantly, settle for that code validation providers similar to Apple’s App Retailer and Google’s Play Retailer will inevitably be permeable to malware, provided that their aim is to look at and approve large numbers of third-party apps shortly, mechanically and objectively…
…you may moderately count on that kernel drivers, given their harmful powers and their comparative rarity in comparison with common functions, could be nearly as good as unattainable to sneak previous the Home windows vetting course of.
Final December’s rogue driver discoveries by SophosLabs, nevertheless, in the end turned up a big listing of kernel-level malware, together with 100 drivers signed “personally” by Microsoft itself.
68 of the Microsoft-approved rogue drivers have been anti-anti-virus instruments, aimed toward killing off safety software program “from beneath” by abusing the facility and authority of the working system.
The remaining have been extra common rootkits aimed toward spying on and manipulating information contained in the working system, the place data as intimate as particular person community packets to and from each operating program could be snooped, surveilled and sneakily altered.
To study extra concerning the fascinating backstory of those wrongly-signed crimeware drivers, please learn our article entitled Microsoft revokes malicious drivers in Patch Tuesday Culling:
What to do?
We mentioned it on the prime, albeit in barely completely different phrases: Don’t delay; do it right this moment.
Should you’re liable for your personal laptop, simply go to Settings > Home windows Replace > Test for updates to see if you happen to’re up-to-date or not.
Don’t overlook that the updates received’t be accomplished till you reboot your laptop, so intention to try this sooner moderately than later.