Windows 10 custom themes could be abused to 'steal Windows account information'


by

DobaKung

In Windows, you can create a ' custom theme ' that is a combination of UI colors, sounds, mouse cursor, wallpaper, etc., and Windows users can switch between different themes as needed to change the appearance of the OS. I can do it. It has been pointed out that performing an attack using such a Windows 10 theme may allow someone who does not know anything to steal the Windows account credentials.

Windows 10 themes can be abused to steal Windows accounts
https://www.bleepingcomputer.com/news/microsoft/windows-10-themes-can-be-abused-to-steal-windows-accounts/


Windows theme settings are stored in a directory called '%AppData%\Microsoft\Windows\Themes' as a file with a '.theme' extension such as 'hogehoge.theme'.

You can also right-click on the active theme and select 'Save and Share Theme' to have the theme packaged in a file with a .deskthemepack extension called 'hogehoge.deskthemepack' to share with other users. I can. These theme packages can be shared by email or downloaded and installed from a website.

On September 6, 2020, computer security researcher Jimmy Bain pointed out that a custom Windows theme could be used to perform a pass-the-hash attack.



A pass-the-hash attack tricks a user into stealing a Windows login and password hash to gain access to a remote SMB share that requires authentication.

The attacker sets a resource that requires remote authentication for the custom theme wallpaper, as shown in the image below. Normally, when you try to access a resource that requires remote authentication, Windows automatically sends an NTLM hash of your Windows user's login name and password.



The attacker uses a custom theme to get the credentials, and a special script to dehash the password and decipher it. According to Bleeping Computer, an IT news site, it was possible to decrypt the NTLM hash in 4 seconds.



Microsoft encourages Windows 10 to use the

Microsoft account that you use to access various Microsoft services, rather than the local account that you set up on each PC. Therefore, Bleeping Computer warns that the attacker could gain access to various services provided by Microsoft with the stolen account information.

From a system protection point of view, Bane recommends blocking files with .theme, .themepack, and .desktopthemepackfile extensions or changing their associations, although the theme feature of Windows 10 will be disabled.



If you are using Windows 10 Pro, you can edit the Group Policy so that NTLM will not send your credentials. However, for Windows 10 Home you will need to edit the registry value.



Also, adding multi-factor authentication to your Microsoft account will prevent attackers from gaining remote access if your credentials are stolen.

in Software,   Security, Posted by log1i_yk