back to article Microsoft signed a dodgy driver and now ransomware scum are exploiting it

Ransomware crooks are exploiting a third-party Windows kernel-level driver used and provided by disk management tool Paragon Partition Manager. Paragon Partition Manager is a software tool that allows users to create and manage partitions on a storage drive. It sports a Microsoft-approved, digitally signed kernel-level driver …

  1. Philip Storry
    WTF?

    Legacy code strikes again!

    This is almost certainly code that was written in the late 90s or early 2000s, and has just sat there ever since.

    "It works, so why change it" is fine for code in userland applications that won't hold sensitive data, but not for kernel code like this. (Or for some kinds of userland apps.)

    So how do we get companies to audit their old code?

    In the case of kernel-mode drivers, I suggest that Microsoft make signing the driver a contract. If the driver has a security flaw, then the cost to Microsoft of investigating and mitigating the flaw will be borne by the supplier. Plus a penalty fine per vulnerability if they're common types (buffer overflow, pointer misuse).

    Only by introducing some kind of fiscal penalty will the audit of old code suddenly become fiscally viable, which is what we need.

    1. Will Godfrey Silver badge
      Unhappy

      Re: Legacy code strikes again!

      Nice idea, but this would hit small companies really hard. The big ones would simply restructure, move contentious code to new entities and sell them off, thus absolving themselves of any future responsibility.

    2. Roland6 Silver badge

      Re: Legacy code strikes again!

      >” If the driver has a security flaw, then the cost to Microsoft of investigating and mitigating the flaw will be borne by the supplier.”

      The whole of Windows is signed by Microsoft; you could argue the OS is a driver for the “PC”, thus MS would be on the hook….

      However, this has been the case since when ever Microsoft sold their first product, so we have a long history of how this works….

      At least it seems the certificate revocation process works and only blocks this specific driver rather than all Paragons products.

    3. BinkyTheMagicPaperclip Silver badge

      Re: Legacy code strikes again!

      Nope, not legacy code, lowering of standards.

      Back in the day I have the vague memory/possibly idealistic viewpoint that WHQL drivers actually meant something. That hasn't been true for a *long* time, especially for GPU drivers, where things can be objectively broken but it still meet WHQL.

      Perhaps you could argue that it's still 'OK', but test coverage needs increasing, but they've had a long time to do that and not really improved things. I realise GPU drivers are very complex, but I don't think that's a particular excuse, especially when certain vendors *cough* AMD *cough*, can repeatedly leave notable bugs in their driver unfixed for a year at a time.

      1. TSM

        Re: Legacy code strikes again!

        I think probably your memory is overly idealistic.

        Here's a post from Raymond Chen from *21 years ago* detailing some of the shenanigans that manufacturers got up to to get their drivers approved by WHQL, by making them work differently in WHQL than when operating in a normal environment:

        https://devblogs.microsoft.com/oldnewthing/20040305-00/?p=40373

  2. Always Right Mostly

    If only there were processes and tools to test code before signing and shipping it.

    1. Will Godfrey Silver badge
      Unhappy

      There are plenty of "tools" - mostly in upper management.

  3. Bebu sa Ware
    Facepalm

    Didn't Paragon donate this code to the Linux kernel ntfs3 driver?

    Just asking.

    1. doublelayer Silver badge

      Re: Didn't Paragon donate this code to the Linux kernel ntfs3 driver?

      They donated code to that, but I see no evidence that it was this code, and it seems quite unlikely that it was because Windows already has an NTFS driver. The Partition Manager software that this appears to be part of is a distinct product. If this had been, for example, Paragon's NTFS for Mac OS software, then I'd be more worried that a similar bug could affect Linux, although even then the most sensitive code would likely be OS-specific.

    2. TeeCee Gold badge
      Coat

      Re: Didn't Paragon donate this code to the Linux kernel ntfs3 driver?

      Hence the old saying: "Beware of geeks bearing gifts.".

  4. Chris Hills

    Revole the certificate!

    Surely the certificate should be revoked immediately. There really should be a mechanism for this (at least, for online devices).

    1. Ken Hagan Gold badge

      Re: Revole the certificate!

      I think "the certificate" in this case is the same one that signs all other third party drivers and it hasn't actually been compromised.

      The correct solution is to teach Windows to recognise this particular driver, which apparently MS have already done in the case of Win11. (Kinda odd that Win10 has missed out on that. Are they trying to blackmail us into upgradjng or something?)

      1. Phil Koenig Bronze badge

        Re: Revole the certificate!

        Are they trying to blackmail us into upgradjng or something?

        How dare you suggest such a thing.

        We now return you to your regular revoling tasks.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like