Tech »  Topic »  Windows Virtualization-Based Security Exploited to Develop Highly Evasive Malware

Windows Virtualization-Based Security Exploited to Develop Highly Evasive Malware


In a groundbreaking development, researchers have uncovered how attackers are exploiting Windows Virtualization-Based Security (VBS) enclaves to create malware that is highly evasive and difficult to detect.

VBS enclaves, designed as isolated and secure regions of memory within a process, are being weaponized to bypass traditional security mechanisms, posing a significant threat to enterprise systems.

VBS Enclaves: A Double-Edged Sword

VBS enclaves were introduced by Microsoft as part of its Virtual Trust Levels (VTL) architecture, aimed at improving system security by isolating sensitive operations from the rest of the operating system.

These enclaves operate in an isolated memory region inaccessible to the kernel and other processes, making them invaluable for protecting sensitive data.

However, this same isolation is now being exploited by attackers to hide malicious code from endpoint detection and response (EDR) tools and memory-based forensic analysis.

The key advantage for attackers lies in the enclave’s ability to ...


Copyright of this story solely belongs to gbhackers . To see the full text click HERE