Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Paragon Flaws Exploited in BYOVD Attacks

March 3, 2025
Reading Time: 2 mins read
in Alerts
Google and PayPal Exploited in Phishing Scam

Microsoft has recently discovered five vulnerabilities in the BioNTdrv.sys driver used by Paragon Partition Manager, one of which is actively exploited by ransomware gangs. These vulnerabilities were identified as part of a series of kernel driver flaws that allow attackers to escalate privileges on Windows systems. The flaw CVE-2025-0289, in particular, is being leveraged in “Bring Your Own Vulnerable Driver” (BYOVD) attacks, where attackers drop the vulnerable driver onto a targeted machine to gain SYSTEM privileges and execute further malicious actions. These attacks enable cybercriminals to bypass security protections and potentially cause denial-of-service (DoS) scenarios on the victim’s machine.

The affected vulnerabilities span several versions of Paragon Partition Manager, with four flaws impacting versions 7.9.1 and earlier, while CVE-2025-0289 affects version 17 and older.

Even if Paragon Partition Manager is not installed on a system, attackers can still exploit these vulnerabilities through the BYOVD technique by including the vulnerable driver in their own malicious tools. This method allows them to load the driver into Windows, thereby escalating privileges and bypassing system defenses.

Microsoft has responded by adding the driver to its Vulnerable Driver Blocklist, urging users to ensure that this feature is enabled for added protection.

In addition to patching the vulnerabilities, Paragon Software has recommended users upgrade to the latest version, which includes an updated version of the BioNTdrv.sys driver that addresses all of the discovered flaws. However, as the BYOVD method does not require Paragon software to be present on a machine, the risks of exploitation remain high, particularly for systems that have not enabled Microsoft’s Vulnerable Driver Blocklist. This highlights the growing popularity of BYOVD tactics among cybercriminal groups, including notorious ransomware operators like Lazarus, LockBit, and BlackByte, who are known to exploit these vulnerabilities to achieve unauthorized access and execute their malicious payloads.

Microsoft’s advisory and the update to the Vulnerable Driver Blocklist underscore the importance of proactive system defense, especially as BYOVD attacks continue to rise. Users are strongly encouraged to regularly verify that their blocklist is active and ensure their systems are protected from kernel-level exploitation. The trend of such attacks highlights the increasing sophistication of cybercriminals, who are continually evolving their methods to bypass traditional security mechanisms. With ransomware and privilege escalation attacks becoming more prevalent, staying up to date with security patches and protective measures is crucial for mitigating these high-risk threats.

Reference:
  • Ransomware Gangs Exploit Paragon Partition Flaws to Gain System Privileges
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

Chrome Extensions Leak Data And API Keys

Chrome Extensions Leak Data And API Keys

June 6, 2025
Chrome Extensions Leak Data And API Keys

AMOS Stealer Hits macOS Via Fake CAPTCHA

June 6, 2025
Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

June 6, 2025
UNC6040 Vishing Group Target Salesforce Data

UNC6040 Vishing Group Target Salesforce Data

June 5, 2025
New Chaos RAT Variant Hits Windows and Linux

New Chaos RAT Variant Hits Windows and Linux

June 5, 2025
New Chaos RAT Variant Hits Windows and Linux

FBI Warns Hedera NFT Airdrop Crypto Scam

June 5, 2025

Latest Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

FBI Warns Hedera NFT Airdrop Crypto Scam

New Chaos RAT Variant Hits Windows and Linux

UNC6040 Vishing Group Target Salesforce Data

Subscribe to our newsletter

    Latest Incidents

    German Dog Rescue IG Hacked For Ransom

    Hack Attempt Hits German Police Phone System

    InfoJobs Spain Hit By Credential Stuffing

    KiranaPro Startup Hacked All Data Wiped

    Nervos Bridge Paused After $3.9 Million Hack

    Ukraine GUR Claims Tupolev Data Theft Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial