Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Can Manipulate BitLocker Registry Keys Via WMI to Execute Malicious Code as Interactive User

Posted on August 4, 2025August 4, 2025 By CWS

A novel lateral motion approach that exploits BitLocker’s Part Object Mannequin (COM) performance to execute malicious code on course programs.

The approach, demonstrated via the BitLockMove proof-of-concept device, represents a complicated evolution in lateral motion ways that bypasses conventional detection mechanisms whereas leveraging reputable Home windows elements.

BitLocker, Microsoft’s full disk encryption characteristic designed to guard knowledge via whole quantity encryption, has turn out to be a cornerstone of Home windows endpoint safety.

Sometimes enabled on workstations and laptops to stop unauthorized entry in case of system theft or loss, BitLocker’s complete safety has made it a pretty goal for attackers in search of to abuse its underlying infrastructure.

Researcher Fabian Mosch defined throughout his presentation that each Home windows utility or characteristic introduces a major quantity of objects, together with processes, recordsdata, and registry keys, that collectively increase the assault floor.

Whereas BitLocker successfully protects knowledge at relaxation, its implementation accommodates components that subtle menace actors can weaponize.

Motion course of

The newly disclosed approach targets the distant manipulation of BitLocker registry keys via Home windows Administration Instrumentation (WMI) to hijack particular COM objects.

This strategy allows attackers to execute code underneath the context of the interactive person on course hosts, probably resulting in area escalation if the compromised person possesses elevated privileges akin to area administrator rights.

The assault leverages a vital vulnerability within the BitLocker COM object hierarchy, particularly focusing on the BDEUILauncher class via the IBDEUILauncher interface. This interface supplies three key strategies that attackers can exploit:

BdeUIProcessStart: Initiates the BitLocker course of (BdeUISrv.exe)

BdeUIContextTrigger: Gives context manipulation capabilities

GetUserLogonTime: Retrieves person logon timing info

The exploitation course of facilities on the CLSID ab93b6f1-be76-4185-a488-a9001b105b94, which spawns 4 totally different processes because the Interactive Consumer. Amongst these, the BaaUpdate.exe course of proves significantly weak to COM hijacking when executed with enter parameters.

The assault particularly targets the lacking CLSID A7A63E5C-3877-4840-8727-C1EA9D7A4D50, which the BaaUpdate.exe course of makes an attempt to load.

By making a registry entry for this CLSID and establishing applicable subkeys, attackers can redirect the method to load malicious code as an alternative of the reputable element, Fabin stated.

The BitLockMove device, out there on GitHub, demonstrates the sensible implementation of this method throughout two operational modes:

Enumeration Mode

The device’s reconnaissance functionality makes use of undocumented Microsoft APIs from the winsta.dll library to remotely enumerate lively periods on course programs. These APIs, together with WinStationEnumerateW, WinStationOpenServerW, and WinStationQueryInformationW, present complete session info with out requiring Distant Desktop Providers to be enabled.

Assault Mode

Throughout the lively exploitation part, BitLockMove establishes a distant connection to the goal host by way of WMI and executes queries to allow the Distant Registry service. The device then constructs the mandatory registry path to organize the surroundings for COM hijacking, particularly creating entries underneath the CLSID key construction.

The assault sequence entails a number of vital steps:

Distant Registry Activation: The device queries the Distant Registry service standing and allows it if crucial

Registry Key Manipulation: Creation of the malicious CLSID entry with InProcServer32 subkey pointing to the attacker’s DLL

Course of Coercion: Triggering the BitLocker course of via the BDEUILauncher class

Code Execution: Loading and executing the attacker’s payload throughout the reputable BitLocker course of context

Cleanup Operations: Eradicating traces of the assault by deleting the malicious registry entries

Regardless of the approach’s sophistication, a number of detection alternatives exist throughout numerous assault phases. Safety groups ought to concentrate on implementing complete monitoring throughout a number of key areas:

API Monitoring

The enumeration part depends on undocumented winsta.dll APIs that differ from Microsoft’s formally supported WTSEnumerateSessionsW API. Endpoint Detection and Response (EDR) options ought to monitor for uncommon API calls, significantly:

Processes loading winsta.dll libraries exterior of reputable Microsoft instruments

Non-standard session enumeration makes an attempt

Uncommon WMI queries focusing on service configurations

Service State Monitoring

Modifications to the Distant Registry service symbolize a vital detection level. Home windows Occasion ID 7040 captures service state modifications, and organizations ought to implement alerting for:

Distant Registry service transitions from disabled to enabled states

Fast service state modifications (enabled then disabled in brief timeframes)

Service modifications occurring exterior regular upkeep home windows

Safety groups can implement SIGMA guidelines to detect suspicious Distant Registry service modifications:

title: Detection of Distant Registry Service Enablement
detection:
choice:
EventID: 7040
ServiceName: ‘RemoteRegistry’
OldStartType: ‘Disabled’
NewStartType: [‘Manual start’, ‘Auto start’]
situation: choice
degree: excessive

Registry Auditing

Complete registry monitoring represents maybe the best detection mechanism. Organizations ought to allow auditing for the affected CLSID key and implement monitoring for:

Registry key creation underneath suspicious CLSID paths

InProcServer32 subkey modifications

Fast registry key creation and deletion patterns

Occasion IDs 4657 (registry worth modification), 4660 (registry key deletion), and 4663 (registry object entry) present essential visibility into registry manipulation makes an attempt.

Course of Conduct Evaluation

The ultimate execution stage generates distinctive course of artifacts that safety groups can monitor:

BdeUISrv.exe processes spawning from svchost.exe

BaaUpdate.exe executions adopted by uncommon baby processes

BitLocker-related processes operating in surprising person contexts

The disclosure of the BitLocker COM hijacking approach underscores the evolving sophistication of lateral motion ways and the significance of complete safety monitoring.

Whereas the approach demonstrates regarding capabilities, the a number of detection alternatives out there to safety groups present viable defensive methods.

Organizations should acknowledge that even well-designed safety features like BitLocker can turn out to be assault vectors when their underlying implementations are exploited.

As menace actors proceed to develop modern approaches to community compromise, the cybersecurity group should stay dedicated to sharing data, creating strong detection mechanisms, and constructing resilient defensive architectures.

The analysis introduced by Fabian Mosch at Troopers 2025 supplies worthwhile insights into superior persistent menace ways and emphasizes the vital significance of proactive safety measures in defending fashionable enterprise environments.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:BitLocker, Code, Execute, Hackers, Interactive, Keys, Malicious, Manipulate, Registry, User, WMI

Post navigation

Previous Post: Northwest Radiologists Data Breach Impacts 350,000 Washingtonians
Next Post: Man-in-the-Middle Attack Prevention Guide

Related Posts

New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers Cyber Security News
Cisco IMC Vulnerability Attackers to Access Internal Services with Elevated Privileges Cyber Security News
Sophisticated Skitnet Malware Actively Adopted by Ransomware Gangs to Streamline Operations Cyber Security News
Splunk Address Third Party Packages Vulnerabilities in Enterprise Versions Cyber Security News
Nessus Windows Vulnerabilities Allow Overwrite of Arbitrary Local System Files Cyber Security News
Microsoft Windows 11 Insider Preview Build 26200.5600 Released Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account
  • Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally
  • FUJIFILM Printers Vulnerability Let Attackers Trigger DoS Condition
  • US Announces $100 Million for State, Local and Tribal Cybersecurity
  • AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account
  • Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally
  • FUJIFILM Printers Vulnerability Let Attackers Trigger DoS Condition
  • US Announces $100 Million for State, Local and Tribal Cybersecurity
  • AI Guardrails Under Fire: Cisco’s Jailbreak Demo Exposes AI Weak Points

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News