Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Paragon Flaws Exploited in BYOVD Attacks

March 3, 2025
Reading Time: 2 mins read
in Alerts
Google and PayPal Exploited in Phishing Scam

Microsoft has recently discovered five vulnerabilities in the BioNTdrv.sys driver used by Paragon Partition Manager, one of which is actively exploited by ransomware gangs. These vulnerabilities were identified as part of a series of kernel driver flaws that allow attackers to escalate privileges on Windows systems. The flaw CVE-2025-0289, in particular, is being leveraged in “Bring Your Own Vulnerable Driver” (BYOVD) attacks, where attackers drop the vulnerable driver onto a targeted machine to gain SYSTEM privileges and execute further malicious actions. These attacks enable cybercriminals to bypass security protections and potentially cause denial-of-service (DoS) scenarios on the victim’s machine.

The affected vulnerabilities span several versions of Paragon Partition Manager, with four flaws impacting versions 7.9.1 and earlier, while CVE-2025-0289 affects version 17 and older.

Even if Paragon Partition Manager is not installed on a system, attackers can still exploit these vulnerabilities through the BYOVD technique by including the vulnerable driver in their own malicious tools. This method allows them to load the driver into Windows, thereby escalating privileges and bypassing system defenses.

Microsoft has responded by adding the driver to its Vulnerable Driver Blocklist, urging users to ensure that this feature is enabled for added protection.

In addition to patching the vulnerabilities, Paragon Software has recommended users upgrade to the latest version, which includes an updated version of the BioNTdrv.sys driver that addresses all of the discovered flaws. However, as the BYOVD method does not require Paragon software to be present on a machine, the risks of exploitation remain high, particularly for systems that have not enabled Microsoft’s Vulnerable Driver Blocklist. This highlights the growing popularity of BYOVD tactics among cybercriminal groups, including notorious ransomware operators like Lazarus, LockBit, and BlackByte, who are known to exploit these vulnerabilities to achieve unauthorized access and execute their malicious payloads.

Microsoft’s advisory and the update to the Vulnerable Driver Blocklist underscore the importance of proactive system defense, especially as BYOVD attacks continue to rise. Users are strongly encouraged to regularly verify that their blocklist is active and ensure their systems are protected from kernel-level exploitation. The trend of such attacks highlights the increasing sophistication of cybercriminals, who are continually evolving their methods to bypass traditional security mechanisms. With ransomware and privilege escalation attacks becoming more prevalent, staying up to date with security patches and protective measures is crucial for mitigating these high-risk threats.

Reference:
  • Ransomware Gangs Exploit Paragon Partition Flaws to Gain System Privileges
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

Hackers Use Leaked Shellter License Malware

Windows BitLocker Vulnerability Flaw

July 9, 2025
Hackers Use Leaked Shellter License Malware

Hackers Use Leaked Shellter License Malware

July 9, 2025
Hackers Use Leaked Shellter License Malware

Anatsa Android Trojan Targets 90K Users

July 9, 2025
AMOS Mac Stealer Adds Persistent Backdoor

AMOS Mac Stealer Adds Persistent Backdoor

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

NordDragonScan Malware Steals Windows Data

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

New Ransomware BERT Targets ESXi Systems

July 8, 2025

Latest Alerts

Windows BitLocker Vulnerability Flaw

Anatsa Android Trojan Targets 90K Users

Hackers Use Leaked Shellter License Malware

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

Subscribe to our newsletter

    Latest Incidents

    Credit Reports Breached And Sold On Dark Web

    Recruiting Software Exposed 26M Resumes

    Norwegian Municipalities Hit by Data Breach

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial