Hackers Can Manipulate BitLocker Registry Keys Via WMI to Execute Malicious Code as Interactive User

A novel lateral movement technique that exploits BitLocker’s Component Object Model (COM) functionality to execute malicious code on target systems. The technique, demonstrated through the BitLockMove proof-of-concept tool, represents a sophisticated evolution in lateral movement tactics that bypasses traditional detection mechanisms while leveraging legitimate Windows components. BitLocker, Microsoft’s full disk encryption feature designed to protect […]

The post Hackers Can Manipulate BitLocker Registry Keys Via WMI to Execute Malicious Code as Interactive User appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: