CrowdStrike’s Falcon software uses a special driver that allows it to run at a lower level than most apps so it can detect threats across a Windows system. Microsoft tried to restrict third parties from accessing the kernel in Windows Vista in 2006 but was met with pushback from cybersecurity vendors and EU regulators. However, Apple was able to lock down its macOS operating system in 2020 so that developers could no longer get access to the kernel.

Now, it looks like Microsoft wants to reopen the conversations around restricting kernel-level access inside Windows.

  • Wahots@pawb.social
    link
    fedilink
    arrow-up
    43
    ·
    edit-2
    5 months ago

    Imo, third party companies just shouldn’t have access to the kernel level. Someone is always getting hacked, and having this level of access to potentially hundreds of millions of computers is a huge risk. Especially if it’s for something trivial, like anticheat in Helldivers 2.

      • ReversalHatchery@beehaw.org
        link
        fedilink
        English
        arrow-up
        7
        ·
        edit-2
        5 months ago

        and let someone into the kernel,

        Problem is, that similarly to invasion of privacy, this is not visible, and so they don’t understand what’s happening. It’s just one more program, what could happen? It’s not like somebody coming and inspecting your house, in that it is not noticeable in practice.

        • @ReversalHatchery , I completely agree. My ring 0 is sacred and I can’t prove there isn’t anything in it already, but I wouldn’t knowingly shove third party stuff into my kernel. I like to keep my apps restricted from anything they don’t need on my system in userland. However, millions upon millions of people installed Tencent’s Vanguard to play League of Legends like it wasn’t any big deal (it is). If people want an inner ring security module, I suppose that’s a bit their choice. 🤷🏽‍♂️

      • 1rre
        link
        fedilink
        arrow-up
        1
        ·
        5 months ago

        That’s the issue with it being closed source, it makes sense to avoid vulnerabilities by locking off the kernel, frankly I’d class adding anti cheat to your kernel on the same tier as mucking about with a Linux kernel and recompiling it

    • jonne@infosec.pub
      link
      fedilink
      arrow-up
      4
      ·
      5 months ago

      Yeah, those security agents can become attack vectors themselves, so running them kernel level is nuts.

    • BurningRiver@beehaw.org
      link
      fedilink
      arrow-up
      1
      ·
      5 months ago

      Enterprise level AVs are going to sit in the kernel so they can watch for anomalies in the OS. There are better EDRs out there than Crowdstrike, and virus definitions are an outdated way of detecting anamalous behavior anyway.