• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechMicrosoft

Uh-oh! Microsoft Leaks ‘Golden Keys’ to Windows Devices

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
August 11, 2016, 6:08 PM ET
Sunni Mosques Closed In Baghdad
BAGHDAD, IRAQ - MAY 21: An Iraqi mosque caretaker locks the gate of al-Qazaz Sunni mosque May 21, 2005 in Baghdad, Iraq. Sunnis clerics announced a closing of Sunni mosques across Baghdad in protest of killings of Sunni clerics that some have blamed on Shiite militias. (Photo by Wathiq Khuzaie/Getty Images)Wathiq Khuzaie—Getty Images

Microsoft (MSFT) messed up.

The tech giant inadvertently leaked a “backdoor” means to digitally bypass Secure Boot, a firmware component designed to keep its devices sealed. Anyone with administrator rights who possesses the “golden keys,” as security researchers have described their finding, can load whatever operating system they please—Google’s (GOOG) Android or Linux, say—onto an otherwise restricted Windows device, such as a Windows Phone, Windows RT tablet, or HoloLens.

Someone with physical access to one of these devices can also use the tool to load malicious software, such a so-called rootkit, onto it, giving that person full control over the system. (It’s worth noting that Windows PCs and servers are typically not locked with Secure Boot.)

Get Data Sheet,Coins2Day’s technology newsletter.

The security researchers who uncovered the code—they go by the aliases “MY123” and “Slipstream”—appear to have found it idly preloaded onto Microsoft devices, as The Register reports. Microsoft presumably designed the tool for internal debugging purposes, so that its engineers could circumvent the usual operating system checks that normally confirm whether a system is booting with Redmond-approved software. It was a short-cut for developers, in other words.

You can read the pair’s jarringly presented write-up here. Be warned that it includes twitchy graphics and blaring chiptune music. Or if you prefer a more readable version, you can peruse this text-only version on Pastebin.

For more on Microsoft technology accidents, watch:

“You can see how this is very bad!!” Wrote Slipstream, author of the post. “A backdoor, which MS put in to secure boot because they decided to not let the user turn it off in certain devices, allows for secure boot to be disabled everywhere!”

The hacker continued on a policy soapbox, haranguing the Federal Bureau of Investigation for advocating that tech companies grant law enforcement “backdoor” access to their products. The so-called encryption debate that Slipstream alludes to was on full display earlier this year when the FBI duked it out with Apple (AAPL) in a fight to gain access to a deceased terrorist’s iPhone.

“This is a perfect real world example about why your idea of backdooring cryptosystems with a ‘secure golden key’ is very bad!” He said. (The hackers’ finding, for what its worth, has less to do with encryption than it has to do with “backdoors” generally.)

According to Slipstream, the researchers reported the vulnerability to Microsoft in March. The company, after apparently dismissing their work initially, paid them a bug bounty reward and issued a patch (MS16-094) a few months later.

Here’s Why Apple Is Going To War Over FBI ‘Backdoor’ Order

But that wasn’t the end of the story. The pair then demonstrated how to bypass that fix, forcing Microsoft to issue another patch this month (MS16-100)—and even that may not be enough to solve the problem.

The hackers appear to be convinced that the issue will persist, despite Microsoft’s best efforts. It would “be impossible in practise [sic] for MS to revoke every bootmgr”—the code that guides the earliest stages of a computer’s startup sequence— Slipstream wrote, “as they’d break install media, recovery partitions, backups, etc.”

A Microsoft spokesperson provided Coins2Day with a statement downplaying the risk: “The jailbreak technique described in the researchers’ report on August 10 does not apply to desktop or enterprise PC systems. It requires physical access and administrator rights to ARM and RT devices and does not compromise encryption protections.”

Stay tuned—another patch is expected next month.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.