Wednesday, February 26, 2025
Homecyber securityWindows Virtualization-Based Security Exploited to Develop Highly Evasive Malware

Windows Virtualization-Based Security Exploited to Develop Highly Evasive Malware

Published on

SIEM as a Service

Follow Us on Google News

In a groundbreaking development, researchers have uncovered how attackers are exploiting Windows Virtualization-Based Security (VBS) enclaves to create malware that is highly evasive and difficult to detect.

VBS enclaves, designed as isolated and secure regions of memory within a process, are being weaponized to bypass traditional security mechanisms, posing a significant threat to enterprise systems.

VBS Enclaves: A Double-Edged Sword

VBS enclaves were introduced by Microsoft as part of its Virtual Trust Levels (VTL) architecture, aimed at improving system security by isolating sensitive operations from the rest of the operating system.

These enclaves operate in an isolated memory region inaccessible to the kernel and other processes, making them invaluable for protecting sensitive data.

However, this same isolation is now being exploited by attackers to hide malicious code from endpoint detection and response (EDR) tools and memory-based forensic analysis.

The key advantage for attackers lies in the enclave’s ability to execute code that is invisible to traditional monitoring methods.

For example, API calls made from within an enclave bypass user-mode hooks and kernel-level monitoring, rendering them undetectable by conventional security tools.

According to Akamai, this capability has led researchers to dub such malware “enclave malware.”

Exploitation Techniques

Attackers have identified multiple pathways to execute malicious code within VBS enclaves.

One approach involves exploiting vulnerabilities in the operating system or third-party enclave modules, such as CVE-2024-49706, which allowed unsigned modules to be loaded into enclaves before being patched.

Another method is the “Bring Your Own Vulnerable Enclave” (BYOVE) technique, where attackers exploit known vulnerabilities in legitimate signed enclave modules to execute malicious payloads.

For instance, CVE-2023-36880, a vulnerability in a Microsoft Edge enclave module, was leveraged to achieve arbitrary read/write access within the enclave memory.

Additionally, attackers can abuse “debuggable” enclave modules intended for development purposes to inject unsigned shellcode into VTL1 (Virtual Trust Level 1), achieving partial execution within the secure environment.

While this method sacrifices some stealth due to its debuggable nature, it still evades API monitoring effectively.

Researchers have also demonstrated a novel evasion technique called “Mirage,” which uses VBS enclaves to store malicious payloads in VTL1 memory.

Virtualization-Based Security
Example VBS enclave creation code

The payload periodically transfers back to VTL0 (normal memory) for execution before erasing itself, making detection through memory scans nearly impossible.

Unlike traditional techniques that toggle executable states of memory pages, Mirage leverages the isolation of VTL1 to keep payloads completely hidden from forensic tools during dormant stages.

The misuse of VBS enclaves underscores a critical challenge in cybersecurity: technologies designed for protection can also be weaponized by adversaries.

While enclave malware remains largely theoretical at this stage, its potential adoption by advanced threat actors could significantly complicate detection and response efforts.

To mitigate these risks, security teams are advised to establish baselines for legitimate use of VBS enclaves and monitor for anomalies such as unexpected enclave activity in non-standard processes.

Additionally, identifying loaded enclave-related DLLs like vertdll.dll can serve as an early warning mechanism for potential abuse.

As attackers continue to innovate with techniques like BYOVE and Mirage, defenders must remain vigilant and adapt their strategies to counteract emerging threats leveraging trusted execution environments.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...