Talk

Silo-Binding Uncovering the Ghost in the Silo

March 19, 14:30 (CAMPUS)

Microsoft spends many resources every year patching possible security holes and empowering security application vendors to build better and more reliable products. In this context, it is always interesting to find out how new Windows features impact existing anti-malware solutions.

Bindlinks, are a new technology with features reminiscent of symbolic links which provide enhanced file and directory aliasing capabilities, but also introduce novel security concerns, especially when used inside a Silo. Although Microsoft considers local administrator privileges a sufficiently strong boundary, our research demonstrates that attackers can achieve significant defense evasion and privilege escalation techniques through bindlinks.

We built a new process impersonation method, similar to Hollowing and Doppelgänging, which we name “Silo-Binding”, enabling adversaries to bypass detection by masking malicious processes inside Silos as legitimate applications. We reveal critical side effects, including firewall evasion, stealthy DLL hijacking for code injection, and disruption of security solution sensors. Bindlinks’ capability to manipulate AMSI Providers, ETW event schema DLLs, and EDR Hooking DLLs underscores its considerable threat potential, as adversaries can disable endpoint protection mechanisms and evade forensic detection methods altogether. Furthermore, we highlighted how attackers can leverage bindlinks towards Volume Shadow Copies to access sensitive data or execute malicious processes from unexpected locations.

Finally, we explore bindlinks’ implications for Docker on Windows, showing how users within the seemingly limited “docker-users” group effectively possess administrator-level control if Windows Containers are enabled.

Speaker

Andrei-Marius Muntea

Andrei-Marius Muntea is currently pursuing a PhD in Cybersecurity at the Technical University of Cluj-Napoca.

Alongside his research, he teaches laboratory classes in the university's Cybersecurity Master's program, specializing in Secure Coding and Windows Driver Development.

Professionally, Andrei-Marius is part of Bitdefender's Active Threat Control team, where he contributes to the development of the behavioral detection module, the component responsible for identifying and mitigating cyber threats. His expertise is focused on defense evasion, especially on how Microsoft technologies can be used to bypass endpoint protection platforms. Beyond his academic and professional pursuits, Andrei-Marius Muntea is a big fan of Warhammer 40K.

Andrei Mermeze

Andrei Mermeze is an experienced cybersecurity engineer working on Bitdefender`s behavior detection components.

His expertise is focused on defense evasion, especially on how Microsoft technologies can be used to bypass endpoint protection platforms. He is also a teaching assistant at the Technical University of Cluj-Napoca, specializing in Windows Drivers Development and, in the past, Virtualization Based Security.

Organized by

Technology partners

Partner events

Scroll to Top