Hackers Bypass Windows Defender Security—What You Need To Know

Forbes - Mar 29th, 2025
Open on Forbes

Elite hackers from IBM X-Force Red have successfully bypassed Windows Defender Application Control, posing a significant threat to Windows users' security. By exploiting vulnerabilities in Microsoft's security boundaries, such as using known methods like 'Living Off The Land Binaries' (LOLBINS) and side-loading trusted applications with untrusted libraries, they were able to execute command and control payloads. This development highlights weaknesses in security systems intended to restrict application execution to trusted software, with potentially serious implications for device protection against malware.

The bypass incident underscores the critical need for robust security measures and vigilance in cybersecurity practices. As Windows Defender Application Control is eligible for Microsoft bug bounty payments, the discovery of this bypass method will likely prompt further scrutiny and potential improvements in Microsoft's security infrastructure. Meanwhile, Microsoft's acknowledgment of the issue and commitment to taking action suggests ongoing efforts to strengthen defenses and protect users. The incident also serves as a reminder of the constant evolution of cyber threats and the importance of staying informed and prepared for potential security breaches.

Story submitted by Fairstory

RATING

7.6
Fair Story
Consider it well-founded

The article provides a detailed and largely accurate account of a significant cybersecurity issue involving the bypassing of Windows Defender Application Control. It effectively communicates the technical aspects of the breach and highlights the potential risks to Windows users. The inclusion of credible sources, such as a red team operator from IBM X-Force Red and a Microsoft spokesperson, enhances the story's credibility and reliability.

However, the article could benefit from more diverse perspectives, including those of independent cybersecurity experts, to provide a more balanced view of the issue. Additionally, while the technical content is clear and well-structured, it may be challenging for a general audience to fully comprehend without further explanations or a glossary of terms.

Overall, the article is timely and addresses a topic of public interest, with the potential to influence readers' understanding of cybersecurity threats and encourage action to improve security measures. To maximize its impact and engagement, the story could include more practical advice for non-experts and explore broader implications of the security breach.

RATING DETAILS

8
Accuracy

The story accurately reports on a significant security issue involving the bypassing of Windows Defender Application Control (WDAC). The claim that hackers have found a way to bypass WDAC is supported by references to known techniques such as Living Off The Land Binaries (LOBINS) and side-loading with untrusted DLLs. These methods are well-documented in cybersecurity circles, which lends credibility to the report.

The article provides a specific example involving Microsoft Teams, which aligns with typical exploitation scenarios where trusted applications are used to execute malicious code. However, the story lacks detailed technical explanations that would allow for full verification of the claims, such as specific steps taken by the red team hackers or the exact nature of the vulnerabilities exploited.

The article's mention of a Microsoft spokesperson acknowledging the issue adds to its credibility, though it does not elaborate on the specific actions Microsoft plans to take. This leaves some aspects open to verification, particularly regarding the effectiveness of the proposed mitigation strategies.

Overall, the story presents a mostly accurate depiction of the security threat, but it could benefit from more detailed technical information and a clearer explanation of Microsoft's response.

7
Balance

The article maintains a relatively balanced perspective by focusing on the technical aspects of the security breach without delving into sensationalism. It presents the viewpoints of both the hackers (through the actions of Bobby Cooke and his team) and the affected party, Microsoft.

However, the story could improve its balance by including perspectives from independent cybersecurity experts or analysts who could provide additional context or counterpoints. This would help readers better understand the broader implications of the security breach and the effectiveness of the proposed mitigation strategies.

There is a slight imbalance in the presentation, as the article emphasizes the threat posed by the hackers without equally highlighting the potential solutions or ongoing efforts to address the issue. A more balanced approach would include a discussion of industry standards or best practices that could mitigate such vulnerabilities.

8
Clarity

The article is generally clear and well-structured, with a logical flow that guides readers through the key points. It begins by outlining the security issue, provides background information on Windows Defender Application Control, and then explains the methods used to bypass it.

The language used is accessible to readers with a basic understanding of cybersecurity, though some technical terms may require further explanation for a general audience. The article could benefit from a glossary or additional context for terms like "LOBINS" and "side-loading."

The tone is neutral and informative, focusing on the facts without sensationalizing the issue. This helps maintain the article's credibility and ensures that readers can easily follow the narrative without being distracted by unnecessary jargon or hyperbole.

8
Source quality

The article cites credible sources, including a red team operator from IBM X-Force Red and a Microsoft spokesperson. IBM X-Force Red is a well-respected entity in the cybersecurity field, and their involvement lends authority to the claims made in the story.

However, the article could benefit from a wider range of sources, such as independent cybersecurity experts or researchers who could corroborate the findings and provide additional insights. This would enhance the story's reliability and provide a more comprehensive view of the issue.

The reliance on a single red team operator as the primary source of information may limit the depth of the analysis. Including more diverse perspectives from various cybersecurity professionals would strengthen the article's credibility and provide a more nuanced understanding of the security breach.

7
Transparency

The article provides a reasonable level of transparency by explaining the purpose of Windows Defender Application Control and the methods used by hackers to bypass it. This helps readers understand the context and significance of the security breach.

However, the article could improve its transparency by offering more detailed explanations of the technical aspects involved in the bypass. For example, a more in-depth discussion of the specific vulnerabilities exploited and the exact methods used would enhance readers' understanding of the issue.

Additionally, the article does not disclose any potential conflicts of interest, such as relationships between the author and the sources cited. While none are apparent, explicitly stating this would improve transparency and reader trust.

Sources

  1. https://github.com/v4resk/red-book/blob/main/redteam/evasion/endpoint-detection-respons-edr-bypass/windows-defender-application-control-wdac-killing-edr.md
  2. https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/applications-that-can-bypass-appcontrol
  3. https://www.securityintelligence.com/x-force/bypassing-windows-defender-application-control-loki-c2/
  4. https://www.threatlocker.com/blog/windows-defender-bypass
  5. https://learn.microsoft.com/en-us/defender-vulnerability-management/tvm-block-vuln-apps