Raleigh, NC

32°F
Broken Clouds Humidity: 60%
Wind: 3.09 M/S

Hackers Leverage Paragon Partition Manager Driver Flaw in Ransomware Attacks

Hackers Leverage Paragon Partition Manager Driver Flaw in Ransomware Attacks

Threat Actors Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks 

Cybercriminals have been actively exploiting a security vulnerability in the BioNTdrv.sys driver of Paragon Partition Manager to escalate privileges and execute arbitrary code in ransomware attacks. 

The zero-day flaw, identified as CVE-2025-0289, is part of a broader set of five vulnerabilities discovered by Microsoft, according to the CERT Coordination Center (CERT/CC). 

“These vulnerabilities include arbitrary kernel memory mapping and write flaws, a null pointer dereference, insecure kernel resource access, and an arbitrary memory move vulnerability,” CERT/CC stated. 

In a potential attack scenario, an adversary with local access to a Windows system could exploit these weaknesses to gain elevated privileges or trigger a denial-of-service (DoS) condition. The risk is heightened because BioNTdrv.sys is signed by Microsoft, making it a prime target for abuse. 

Additionally, attackers could execute a Bring Your Own Vulnerable Driver (BYOVD) attack on systems where the driver is not installed, enabling them to gain higher privileges and execute malicious code. 

List of Vulnerabilities Affecting BioNTdrv.sys Versions 1.3.0 and 1.5.1 

  • CVE-2025-0285 – Arbitrary kernel memory mapping flaw in version 7.9.1 due to improper validation of user-supplied data lengths, allowing privilege escalation. 
  • CVE-2025-0286 – Arbitrary kernel memory write vulnerability in version 7.9.1, enabling attackers to execute arbitrary code. 
  • CVE-2025-0287 – Null pointer dereference in version 7.9.1, allowing attackers to execute kernel-level code and escalate privileges. 
  • CVE-2025-0288 – Arbitrary kernel memory vulnerability in version 7.9.1, caused by improper input sanitization in the memmove function, allowing privilege escalation. 
  • CVE-2025-0289 – Insecure kernel resource access vulnerability in version 17 due to improper validation of the MappedSystemVa pointer, enabling system compromise. 

Paragon Software has since patched these vulnerabilities in version 2.0.0 of the driver. Additionally, Microsoft has added the affected driver versions to its driver blocklist to mitigate exploitation. 

This development follows recent research by Check Point, which exposed a large-scale malware campaign leveraging another vulnerable Windows driver from Adlice’s product suite (truesight.sys) to bypass security measures and deploy the Gh0st RAT malware. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.