Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Paragon Flaws Exploited in BYOVD Attacks

March 3, 2025
Reading Time: 2 mins read
in Alerts
Google and PayPal Exploited in Phishing Scam

Microsoft has recently discovered five vulnerabilities in the BioNTdrv.sys driver used by Paragon Partition Manager, one of which is actively exploited by ransomware gangs. These vulnerabilities were identified as part of a series of kernel driver flaws that allow attackers to escalate privileges on Windows systems. The flaw CVE-2025-0289, in particular, is being leveraged in “Bring Your Own Vulnerable Driver” (BYOVD) attacks, where attackers drop the vulnerable driver onto a targeted machine to gain SYSTEM privileges and execute further malicious actions. These attacks enable cybercriminals to bypass security protections and potentially cause denial-of-service (DoS) scenarios on the victim’s machine.

The affected vulnerabilities span several versions of Paragon Partition Manager, with four flaws impacting versions 7.9.1 and earlier, while CVE-2025-0289 affects version 17 and older.

Even if Paragon Partition Manager is not installed on a system, attackers can still exploit these vulnerabilities through the BYOVD technique by including the vulnerable driver in their own malicious tools. This method allows them to load the driver into Windows, thereby escalating privileges and bypassing system defenses.

Microsoft has responded by adding the driver to its Vulnerable Driver Blocklist, urging users to ensure that this feature is enabled for added protection.

In addition to patching the vulnerabilities, Paragon Software has recommended users upgrade to the latest version, which includes an updated version of the BioNTdrv.sys driver that addresses all of the discovered flaws. However, as the BYOVD method does not require Paragon software to be present on a machine, the risks of exploitation remain high, particularly for systems that have not enabled Microsoft’s Vulnerable Driver Blocklist. This highlights the growing popularity of BYOVD tactics among cybercriminal groups, including notorious ransomware operators like Lazarus, LockBit, and BlackByte, who are known to exploit these vulnerabilities to achieve unauthorized access and execute their malicious payloads.

Microsoft’s advisory and the update to the Vulnerable Driver Blocklist underscore the importance of proactive system defense, especially as BYOVD attacks continue to rise. Users are strongly encouraged to regularly verify that their blocklist is active and ensure their systems are protected from kernel-level exploitation. The trend of such attacks highlights the increasing sophistication of cybercriminals, who are continually evolving their methods to bypass traditional security mechanisms. With ransomware and privilege escalation attacks becoming more prevalent, staying up to date with security patches and protective measures is crucial for mitigating these high-risk threats.

Reference:
  • Ransomware Gangs Exploit Paragon Partition Flaws to Gain System Privileges
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

FIN6 Uses Fake Resumes To Hack Recruiters

FIN6 Uses Fake Resumes To Hack Recruiters

June 11, 2025
Microsoft Fixes Exploited WebDAV Zero Day

Microsoft Fixes Exploited WebDAV Zero Day

June 11, 2025
Fake Sora AI Lure Installs Infostealer

Fake Sora AI Lure Installs Infostealer

June 11, 2025
New Skitnet Malware Arms Ransomware Gangs

Google Bug Exposed Any User’s Phone Number

June 10, 2025
New Skitnet Malware Arms Ransomware Gangs

Roundcube RCE Flaw Risks 84,000 Servers

June 10, 2025
New Skitnet Malware Arms Ransomware Gangs

New Skitnet Malware Arms Ransomware Gangs

June 10, 2025

Latest Alerts

Fake Sora AI Lure Installs Infostealer

FIN6 Uses Fake Resumes To Hack Recruiters

Microsoft Fixes Exploited WebDAV Zero Day

Google Bug Exposed Any User’s Phone Number

Roundcube RCE Flaw Risks 84,000 Servers

New Skitnet Malware Arms Ransomware Gangs

Subscribe to our newsletter

    Latest Incidents

    BHA Hit By Ransomware But Races Continue

    Sompo Data Breach Puts 17.5M Records At Risk

    DDoS Disrupts Roularta Media In Belgium

    Texas DOT Breach Leaks 300K Crash Reports

    Illinois HFS Employee Phishing Leaks Data

    Cyberattack Disrupts UNFI Food Deliveries

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial