Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Paragon Flaws Exploited in BYOVD Attacks

March 3, 2025
Reading Time: 2 mins read
in Alerts
Google and PayPal Exploited in Phishing Scam

Microsoft has recently discovered five vulnerabilities in the BioNTdrv.sys driver used by Paragon Partition Manager, one of which is actively exploited by ransomware gangs. These vulnerabilities were identified as part of a series of kernel driver flaws that allow attackers to escalate privileges on Windows systems. The flaw CVE-2025-0289, in particular, is being leveraged in “Bring Your Own Vulnerable Driver” (BYOVD) attacks, where attackers drop the vulnerable driver onto a targeted machine to gain SYSTEM privileges and execute further malicious actions. These attacks enable cybercriminals to bypass security protections and potentially cause denial-of-service (DoS) scenarios on the victim’s machine.

The affected vulnerabilities span several versions of Paragon Partition Manager, with four flaws impacting versions 7.9.1 and earlier, while CVE-2025-0289 affects version 17 and older.

Even if Paragon Partition Manager is not installed on a system, attackers can still exploit these vulnerabilities through the BYOVD technique by including the vulnerable driver in their own malicious tools. This method allows them to load the driver into Windows, thereby escalating privileges and bypassing system defenses.

Microsoft has responded by adding the driver to its Vulnerable Driver Blocklist, urging users to ensure that this feature is enabled for added protection.

In addition to patching the vulnerabilities, Paragon Software has recommended users upgrade to the latest version, which includes an updated version of the BioNTdrv.sys driver that addresses all of the discovered flaws. However, as the BYOVD method does not require Paragon software to be present on a machine, the risks of exploitation remain high, particularly for systems that have not enabled Microsoft’s Vulnerable Driver Blocklist. This highlights the growing popularity of BYOVD tactics among cybercriminal groups, including notorious ransomware operators like Lazarus, LockBit, and BlackByte, who are known to exploit these vulnerabilities to achieve unauthorized access and execute their malicious payloads.

Microsoft’s advisory and the update to the Vulnerable Driver Blocklist underscore the importance of proactive system defense, especially as BYOVD attacks continue to rise. Users are strongly encouraged to regularly verify that their blocklist is active and ensure their systems are protected from kernel-level exploitation. The trend of such attacks highlights the increasing sophistication of cybercriminals, who are continually evolving their methods to bypass traditional security mechanisms. With ransomware and privilege escalation attacks becoming more prevalent, staying up to date with security patches and protective measures is crucial for mitigating these high-risk threats.

Reference:
  • Ransomware Gangs Exploit Paragon Partition Flaws to Gain System Privileges
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

Russian APT28 Deploys Outlook Backdoor

SAP S4hana Exploited Vulnerability

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Virustotal Finds Undetected SVG Files

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Russian APT28 Deploys Outlook Backdoor

September 5, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Lazarus Hackers Exploit ZeroDay, Deploy Rats

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

CISA Flags TP Link Router Flaws

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

September 4, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial