{"id":75639,"date":"2017-06-16T11:17:42","date_gmt":"2017-06-16T18:17:42","guid":{"rendered":""},"modified":"2025-12-08T13:50:32","modified_gmt":"2025-12-08T21:50:32","slug":"analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/","title":{"rendered":"Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">On April 14, a group calling themselves the Shadow Brokers caught the attention of the security community by <a href=\"https:\/\/blogs.technet.microsoft.com\/msrc\/2017\/04\/14\/protecting-customers-and-evaluating-risk\/\" target=\"_blank\" rel=\"noopener noreferrer\">releasing a set of weaponized exploits<\/a>. Shortly thereafter, one of these exploits was used to create wormable malware that we now know as <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2017\/05\/12\/wannacrypt-ransomware-worm-targets-out-of-date-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\">WannaCrypt<\/a>, which targeted a large number of out-of-date systems and held encrypted files for ransom.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Although the exploits are ineffective on newer platforms or attempt to take advantage of already patched vulnerabilities, they nevertheless provide an opportunity to analyze and evaluate whether the exploitation techniques used are still viable on Windows 10 systems with Creators Update.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In Windows 10, key security enhancements such as kernel Address Space Layout Randomization (<a href=\"https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Weston-Windows-10-Mitigation-Improvements.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">kASLR<\/a>), kernel Data Execution Prevention (<a href=\"https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Weston-Windows-10-Mitigation-Improvements.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">DEP<\/a>), and virtualization-based security (VBS) capabilities delivered with <a href=\"https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/keep-secure\/deploy-device-guard-enable-virtualization-based-security\" target=\"_blank\" rel=\"noopener noreferrer\">Device Guard<\/a> all contribute to breaking the exploit techniques observed in the wild. Through VBS\u2019s usage of CPU hypervisor functionality, Device Guard-enabled systems can verify and enforce integrity of code that&#8217;s mapped in the kernel address space. Alongside Device Guard is the new kernel <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/mt637065(v=vs.85).aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Control Flow Guard<\/a> (kCFG) introduced with Windows 10 Creators Update. kCFG prevents many exploitation techniques that rely on corrupting function pointers to achieve code execution.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this blog, we provide an in-depth analysis of two of the exploits released by the Shadow Brokers. Both exploits allow arbitrary code execution through vulnerabilities in the Server Message Block (SMBv1) file-sharing server implementation.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We follow with a discussion about how Device Guard and kCFG prevent these exploits\u2014and many other exploits\u2014from installing backdoor implants in kernel memory.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-exploit-kit\">The exploit kit<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The kit\u2019s directory structure shows a modular exploitation framework, where payloads are kept separate from exploits.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">All the binaries in the kit contain multiple strings that describe their purpose. Furthermore, the kit exports common functionality to DLL files, revealing additional information through referenced function names. While the strings and the function calls were not necessary for us to examine the kit, both helped speed up our initial analysis.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For more information about the individual exploits in the kit that targeted Microsoft products, refer to the <a href=\"https:\/\/blogs.technet.microsoft.com\/msrc\/2017\/04\/14\/protecting-customers-and-evaluating-risk\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog post from Microsoft Security Response Center<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"eternalromance-smb-exploit\">ETERNALROMANCE SMB exploit<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Let\u2019s dig into the guts of one of the exploits in the kit.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">ETERNALROMANCE is a remote code execution (RCE) exploit against the legacy SMBv1 file sharing protocol. It takes advantage of <a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-0145\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2017-0145<\/a>, which has been patched with the <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">MS17-010 security bulletin<\/a>. One might note that file sharing over SMB is normally used only within local networks and that the SMB ports are typically blocked from the internet at the firewall. However, if an attacker has access to a vulnerable endpoint running SMB, the ability to run arbitrary code in kernel context from a remote location is a serious compromise.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This exploit was written to remotely install and launch an SMB backdoor. At the core of this exploit is a <em>type confusion<\/em> vulnerability leading to an <em>attacker offset controlled<\/em> arbitrary heap write. As with almost any <em>heap corruption<\/em> exploit, the attacker must know or control the layout of the heap to consistently succeed. With SMB, most objects are allocated in the non-paged pool.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"getting-a-reliable-heap-layout\">Getting a reliable heap layout<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The exploit begins to spray the heap by starting several concurrent instances of <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/ee441489.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">SMB_ COM_TRANSACTION<\/a>. The exploit binary supports three different heap spray methods, allowing it to deal with varying pool behaviors between Windows versions. Apart from the first few allocations (the exact number depends on the pool state), transaction objects are allocated with a fixed, predictable displacement from each other. After the spray has finished, the exploit uses an info leak in a <em>TRANS_PEEK_NMPIPE<\/em> transaction. It uses the info leak to determine whether the target is running a 32- or 64-bit version of Windows and to get kernel pointers for various SMB objects.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"building-primitives-from-heap-corruption\">Building primitives from heap corruption<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The spray has placed many <em>TRANSACTION<\/em> objects on the heap at a known distance from each other. And because the exploit has leaked the size of a pointer, it knows the offsets to all fields in the <em>TRANSACTION<\/em> object. The exploit can now\u2014using carefully crafted offsets\u2014use the type <em>confusion out-of-bounds write<\/em> from one object to corrupt an adjacent one.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">By overwriting the ID associated with the victim object with a hardcoded number (zero), the exploit can now refer to the object without knowing what the original ID was.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The exploit proceeds to corrupt the transaction structure in a variety of ways, constructing arbitrary read-write (RW) primitives. It writes additional fields to prevent the transaction from being freed when consumed, allowing the exploit to continue reusing the same transaction for multiple requests without having to pick a new target object to corrupt.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"installing-in-memory-backdoor\">Installing in-memory backdoor<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">At this point, the exploit code attempts to plant backdoor code inside the SMB driver. This step consists of copying shellcode into the non-paged pool, corrupting a function pointer to point to the shellcode and having that function pointer executed. Note that starting with Windows 8, SMB has moved to using non-executable pools, rendering this method ineffective on newer platforms.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To find a good spot for the function pointer, the exploit follows a pointer on the heap to reach the data segment. Scanning the data segment, it proceeds to look for a table of function pointers that is used to dispatch different <em>SMB_COM_TRANSACTION2<\/em> subcommands to different functions.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When it finds the table of function pointers, the exploit overwrites the 14th entry on this table, which corresponds to the <em>TRANS2_SESSION_SETUP<\/em> subcommand. <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/ee441654.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">MSDN documentation<\/a> describes this subcommand as reserved, making it an ideal candidate for triggering the backdoor as it is almost never present in SMB traffic.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Whenever an SMB packet is sent with this subcommand ID to the target device, the function pointer gets executed, triggering the shellcode. This mechanism and the backdoor code are not persistent\u2014they require a persistent second-stage component to survive a reboot.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"eternalblue-smb-exploit\">ETERNALBLUE SMB exploit<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The WannaCrypt malware spreads by using an adapted version of the ETERNALBLUE exploit. This bug, which targets a different SMBv1 vulnerability, is a linear buffer overrun on the pool.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The bug occurs in a special case when converting a list of <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/hardware\/ff545793(v=vs.85).aspx\" target=\"_blank\" rel=\"noopener noreferrer\">extended attributes<\/a> (EA) from one format to another. If the list contains an EA entry that goes outside the packet buffer, the list is truncated as if it only included up to the last valid entry.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When updating the length of the list, the size is written to as if it were a 16-bit ushort, when it is actually a 32-bit ulong. This means that the upper 16-bits are not updated when the list gets truncated:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The code allocates a buffer with a size calculated to fit all EA entries up to the truncation. But as the list size was increased, this leads to a linear heap overflow with attacker controlled data.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In a similar way as before, heap is sprayed but this time with <em>srvnet!SRVBUFFER<\/em> objects using the SMBv2 protocol. This object contains two key pointers that they target: an <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/hardware\/ff554414(v=vs.85).aspx\" target=\"_blank\" rel=\"noopener noreferrer\">MDL<\/a> pointer that receives network packet payload and a pointer to a <em>srvnet!SRVNET_CONNECTION<\/em> object. Both pointers are overwritten so that they point to fixed addresses in the HAL region (used by the<em> hardware abstraction layer<\/em>).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Because of the corrupted MDL pointer, the next packet payload will get written to the HAL region. This payload contains shellcode and initializes the memory structure for a fake <em>srvnet!SRVNET_CONNECTION<\/em> object. The connection object has a pointer to a srvnet!<em>SRVNET_CLIENT_CONNECTION_DISPATCH<\/em> structure that contains function pointers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">After the packet payload has been received, the <em>SRVNET_RECEIVE_HANDLER<\/em> function pointer is executed from the attacker-controlled srvnet!<em>SRVNET_CLIENT_CONNECTION_DISPATCH<\/em> structure, jumping to the shellcode.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On Windows 7, which is the system that the exploit targets, the HAL region is mapped as readable, writable, and executable. On newer systems the HAL region is no longer executable, meaning that the CPU would fault when trying to execute the shellcode. Furthermore, the HAL region and other kernel regions (such as page tables) have been randomized on the latest 64-bit versions of Windows 10, breaking assumptions of the 64-bit version in the ETERNALBLUE exploit.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mitigation-with-virtualization-based-security\">Mitigation with virtualization-based security<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Virtualization-based security (VBS) provided with Device Guard on Windows 10 and kCFG enhancements with Creators Update stop common exploitation techniques, including those utilized by ETERNALROMANCE and ETERNALBLUE.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"stopping-shellcode-execution-with-w-x-enforcement\">Stopping shellcode execution with W^X enforcement<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">On systems that have <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/device-security\/device-guard\/deploy-device-guard-enable-virtualization-based-security\" target=\"_blank\" rel=\"noopener noreferrer\">Device Guard VBS enabled<\/a>, writing and then executing shellcode\u2014such as the ETERNALROMANCE backdoor\u2014in the kernel is not possible due to W^X enforcement policies in the hypervisor. These policies ensure that a kernel memory page is never both writable and executable at any given time.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Even if an attacker tries to attack page tables, the hypervisor is still able to force the <em>execute-disable<\/em> bit through <a href=\"https:\/\/software.intel.com\/sites\/default\/files\/managed\/2b\/80\/5-level_paging_white_paper.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">extended page tables (EPT)<\/a>. This in turn forces attackers to rely on code-reuse methods, such as return-orientation programming (ROP). As a consequence, the shellcode implant library in the Shadow Brokers release is fundamentally incompatible with VBS-protected systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"preventing-use-of-corrupt-function-pointers-with-kcfg\">Preventing use of corrupt function pointers with kCFG<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">In <a href=\"https:\/\/www.microsoft.com\/en-US\/windows\/features\" target=\"_blank\" rel=\"noopener noreferrer\">Windows 10 Creators Update<\/a>, we introduced a new security mitigation in the kernel space for VBS-enabled systems. The kernel is now compiled with <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/mt637065(v=vs.85).aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Control Flow Guard<\/a> (CFG)\u2014a control flow integrity solution designed to prevent common stack-pivoting techniques that rely on corrupt function pointers or C++ virtual method tables.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Control Flow Guard in the compiled kernel (also known as <em>kCFG<\/em>) aims to verify all indirect call targets before invoking them. This makes it harder for an attacker to execute code by abusing function pointers or other indirect calls.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the case of the ETERNALROMANCE exploit, the subverted function pointer would lead to a security fault when invoked, making the exploit non-functional in its current form. The same applies for ETERNALBLUE, which also relies on a corrupted function pointer to achieve code execution.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On early Windows 10 systems before Creators Update and without Device Guard, it is possible to attack the page tables of the HAL region to turn it executable and gain code execution using the ETERNALBLUE exploit technique.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"secure-computing-with-windows-10-creators-update\">Secure computing with Windows 10 Creators Update<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">While we actively provide patches for vulnerabilities in services like SMBv1, we strive to deliver more and more system-wide mitigations that proactively protect our users from current, as well as future, exploitation and attack methods.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Customers who run Windows 10 Creators Update benefit from <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/device-security\/device-guard\/device-guard-deployment-guide\" target=\"_blank\" rel=\"noopener noreferrer\">Device Guard<\/a> and security enhancements like kCFG and W^X. They also benefit from a <a href=\"https:\/\/www.microsoft.com\/en-us\/WindowsForBusiness\/Windows-security\" target=\"_blank\" rel=\"noopener noreferrer\">host of other security features<\/a> that have been strengthened with Windows 10 Creators Update, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/windows-defender\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Defender Antivirus<\/a> for endpoint antimalware protection powered by the Microsoft Intelligent Security Graph, which learns from <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2017\/05\/08\/antivirus-evolved\/\" target=\"_blank\" rel=\"noopener noreferrer\">billions of devices worldwide<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Defender Advanced Threat Protection<\/a> (Windows Defender ATP) enables enterprises to detect breach activity early and respond fast; try it for free with Windows 10 Enterprise<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-au\/windows\/microsoft-edge\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Edge<\/a> is a proven fast browser secured by virtualization and by Windows Defender SmartScreen<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">To test how Windows Defender ATP can help your organization detect, investigate, and respond to advanced attacks, <strong><a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\" target=\"_blank\" rel=\"noopener noreferrer\">sign up for a free trial<\/a><\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"reducing-exposure-to-smbv1-exploits-on-older-platforms\">Reducing exposure to SMBv1 exploits on older platforms<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft strongly advises customers to apply all available security updates in a timely manner. To reduce the attack surface on your network, block inbound SMB traffic at the firewall and, if possible, <a href=\"https:\/\/blogs.technet.microsoft.com\/filecab\/2016\/09\/16\/stop-using-smb1\/\" target=\"_blank\" rel=\"noopener noreferrer\">disable the SMBv1 compatibility driver<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em><strong>Viktor Brange<\/strong><\/em><br><em> Windows Offensive Security Research Team<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"talk-to-us\"><strong>Talk to us<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Questions, concerns, or insights on this story? Join discussions at the <a href=\"https:\/\/answers.microsoft.com\/en-us\/protect\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft community<\/a> and <a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Defender Security Intelligence<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Follow us on Twitter <a href=\"https:\/\/twitter.com\/WDSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@WDSecurity.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On April 14, a group calling themselves the Shadow Brokers caught the attention of the security community by releasing a set of weaponized exploits.<\/p>\n","protected":false},"author":61,"featured_media":78230,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3822,3809],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3690,3694],"topic":[3684,3687],"coauthors":[1968],"class_list":["post-75639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-microsoft-security-insights","tag-security-strategies","content-type-news","product-microsoft-defender","product-microsoft-defender-for-endpoint","topic-security-operations","topic-threat-intelligence","review-flag-1694638272-264","review-flag-1694638265-83","review-flag-7-1694638266-851","review-flag-8-1694638266-352","review-flag-disable","review-flag-never-1694638263-791","review-flag-new-1694638263-340"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"On April 14, a group calling themselves the Shadow Brokers caught the attention of the security community by releasing a set of weaponized exploits.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-16T18:17:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-08T21:50:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/01\/Shadowbrokers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Microsoft Defender Security Research Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Defender Security Research Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/windows-defender-research\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Defender Security Research Team\"}],\"headline\":\"Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security\",\"datePublished\":\"2017-06-16T18:17:42+00:00\",\"dateModified\":\"2025-12-08T21:50:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/\"},\"wordCount\":1926,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/01\/Shadowbrokers.jpg\",\"keywords\":[\"Microsoft Security Insights\",\"Security strategies\"],\"articleSection\":[\"Cloud Access Security Broker\",\"Cybersecurity\",\"Microsoft Defender for Cloud Apps\",\"Security Intelligence\",\"Security Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/\",\"name\":\"Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/01\/Shadowbrokers.jpg\",\"datePublished\":\"2017-06-16T18:17:42+00:00\",\"dateModified\":\"2025-12-08T21:50:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/01\/Shadowbrokers.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/01\/Shadowbrokers.jpg\",\"width\":1600,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/a385e64377ec1eb81d3bd7f9839f060b\",\"name\":\"Microsoft Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=gea2dea4ce5dbbbe4077dc25334909eb7\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=g\",\"caption\":\"Microsoft Security\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/mssecurity\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/","og_locale":"en_US","og_type":"article","og_title":"Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security | Microsoft Security Blog","og_description":"On April 14, a group calling themselves the Shadow Brokers caught the attention of the security community by releasing a set of weaponized exploits.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/","og_site_name":"Microsoft Security Blog","article_published_time":"2017-06-16T18:17:42+00:00","article_modified_time":"2025-12-08T21:50:32+00:00","og_image":[{"width":1600,"height":600,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/01\/Shadowbrokers.jpg","type":"image\/jpeg"}],"author":"Microsoft Defender Security Research Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Defender Security Research Team","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/windows-defender-research\/","@type":"Person","@name":"Microsoft Defender Security Research Team"}],"headline":"Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security","datePublished":"2017-06-16T18:17:42+00:00","dateModified":"2025-12-08T21:50:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/"},"wordCount":1926,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/01\/Shadowbrokers.jpg","keywords":["Microsoft Security Insights","Security strategies"],"articleSection":["Cloud Access Security Broker","Cybersecurity","Microsoft Defender for Cloud Apps","Security Intelligence","Security Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/","name":"Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/01\/Shadowbrokers.jpg","datePublished":"2017-06-16T18:17:42+00:00","dateModified":"2025-12-08T21:50:32+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/01\/Shadowbrokers.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/01\/Shadowbrokers.jpg","width":1600,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/a385e64377ec1eb81d3bd7f9839f060b","name":"Microsoft Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=gea2dea4ce5dbbbe4077dc25334909eb7","url":"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0242738c3da64c97e705834683728e774a3f4e29c071681ed74a68e3a671d270?s=96&d=microsoft&r=g","caption":"Microsoft Security"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/mssecurity\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/75639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=75639"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/75639\/revisions"}],"predecessor-version":[{"id":144293,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/75639\/revisions\/144293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/78230"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=75639"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=75639"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=75639"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=75639"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=75639"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=75639"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=75639"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=75639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}