Threat actors have been exploiting a security vulnerability in Paragon Partition Manager's BioNTdrv.sys driver in ransomware attacks to escalate privileges and execute arbitrary code. The zero-day fla...
Read Full Article »Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks
Discussion Points
- This content provides valuable insights about AI.
- The information provides valuable insights for those interested in AI.
- Understanding AI requires attention to the details presented in this content.
Summary
A newly discovered zero-day flaw in Paragon Partition Manager's BioNTdrv.sys driver has been exploited by threat actors to facilitate ransomware attacks. This vulnerability, designated as CVE-2025-0289, allows attackers to escalate privileges and execute arbitrary code.
The exploitation of this flaw is part of a set of five identified vulnerabilities discovered by Microsoft through the CERT Coordination Center (CERT/CC). These vulnerabilities include arbitrary kernel memory mapping.
The discovery of these flaws serves as a stark reminder of the ongoing cat-and-mouse game between threat actors and cybersecurity professionals. As the landscape of threats continues to evolve, it is essential for organizations to prioritize vulnerability patching and maintain robust security measures to prevent similar incidents in the future.