Security Advisor

Windows 8 's Rookie Security Mistake

Microsoft's choice to store passwords in plain text format may give attackers easy access to your system.

Microsoft's newest OS has a lot of good things going for it when it comes to security. Its Secure Boot feature will help to stop attackers from burying harmful malware deep inside a PC's BIOS menu; and its built-in antimalware will add an additional level of protection not found (without the help of third-party software) in previous versions of Windows.

While it sounds like Windows 8 has a lot going for it when it comes to securing your system, it's recently come to light that Microsoft has made the fatal error of storing login passwords in plain text.

This news comes from security firm Passcape Software, a company knows a thing or two about retrieving passwords. And if stored in plain text form, the firm's job is that much easier.

Passwords can be retrieved through the OS's new PIN password feature (a four-digit code for accessing a system and Microsoft-related accounts) and the Picture password login. Here's how Passcape Software explains it:

"The matter is that these two authentication methods are based on a regular user account. In other words, the user must first have created an account with a regular password and then optionally switch to PIN or picture password authentication. Notably that the original plain-text (!) password to the account also remains in the system."

Once a user switches from the "classic" Windows password scheme to one of the new ones, those old-style passwords are encrypted and put in Microsoft's Vault (protected storage). However, anyone who accesses a system using admin privileges can swipe the encrypted data from the Vault.

If it's as easy to pull off as Passcape Software makes it sound like, not sure why Microsoft's protected storage system is called Vault. Sounds like Microsoft Unlocked Screen Door would be a more apt name.

And what's the easiest way to descrambling said encrypted data? Passcape Software has the perfect solution for you (at a cost).

Microsoft has yet to comment on the security firm's find.  But if this actually pans out to be a legit way for attackers to gain access to your passwords, I wouldn't be surprised if this was already fixed before the OS's official release on Oct. 26.

And Microsoft, here's some advice: don't store passwords in plain text files, you dummy.

 

About the Author

Chris Paoli is the site producer for Redmondmag.com and MCPmag.com.

Featured

  • SameSite Cookie Changes Rolled Back Until Summer

    The Chromium Project announced on Friday that it's delaying enforcement of SameSite cookie changes, and is temporarily rolling back those changes, because of the COVID-19 turmoil.

  • Basic Authentication Extended to 2H 2021 for Exchange Online Users

    Microsoft is now planning to disable Basic Authentication use with its Exchange Online service sometime in the "second half of 2021," according to a Friday announcement.

  • Microsoft Offers Endpoint Configuration Manager Advice for Keeping Remote Clients Patched

    Microsoft this week offered advice for organizations using Microsoft Endpoint Configuration Manager with remote Windows systems that need to get patched, and it also announced Update 2002.

  • Azure Edge Zones Hit Preview

    Azure Edge Zones, a new edge computing technology from Microsoft designed to enable new scenarios for developers and partners, emerged as a preview release this week.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.