4/15 (Tue.) 14:45 - 15:15 4F 4C

Black Hat Update Techniques: Exploiting Overtrusted System Updates to Weaken All Security Defenses

Oh no… Windows Update again? System updates have long been a headache for users, disrupting workflows and breaking control over their machines. But what if we told you that top-tier security solutions share the same pain?

Inspired by the Black Hat USA research "Windows Downgrade Attacks using Windows Updates", we conducted an in-depth analysis of how real-world security solutions handle these attack techniques, revealing a critical gap in protection: inconsistencies in how security products interpret and enforce defenses across three key layers—registry settings, running processes, and disk files—ultimately exposing an entirely new attack surface.

In this talk, we’ll take a deep dive into Windows 11’s latest Trusted Installer-based update architecture, exposing its structural weaknesses and the security blind spots between upgrade mechanisms and endpoint protection. We'll analyze how adversaries manipulate event logs to exploit misalignments in system-to-security communications, ultimately forging unprotected registry and disk artifacts to hijack the upgrader’s identity. The result? A fully weaponized "arbitrary update" technique, allowing attackers to repurpose antivirus software as a backdoor execution tool.

Yi-An Lin
SPEAKER
TXOne Network Inc.
Threat Researcher, PSIRT & Threat Research Team

TOPIC / TRACK
Threat Research Forum
Live Translation Session

LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4C

LEVEL
General General sessions explore new cybersecurity knowledge and non-technical topics, ideal for those with limited or no prior cybersecurity knowledge.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese
Real-Time Chinese & English Translation

SUBTOPIC
Red Team
Windows
Endpoint Security