Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks

Ars Technica News

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks
WindowsMicrosoftHacks
  • 📰 WIRED
  • ⏱ Reading Time:
  • 284 sec. here
  • 13 min. at publisher
  • 📊 Quality Score:
  • News: 141%
  • Publisher: 51%

The weak RC4 for administrative authentication has been a hacker holy grail for decades.

When the software maker rolled out Active Directory in 2000, it made RC4 a sole means of securing the Windows component, which administrators use to configure and provision fellow administrator and user accounts inside large organizations.

RC4, short for Rivist Cipher 4, is a nod to mathematician and cryptographer Ron Rivest of RSA Security, who developed the stream cipher in 1987. Within days of the trade-secret-protected algorithm being leaked in 1994, a researcher demonstrated a cryptographic attack that significantly weakened the security it had been believed to provide. Despite the known susceptibility, RC4 remained a staple in encryption protocols, including SSL and its successor TLS, until about a decade ago. Out With the Old One of the most visible holdouts in supporting RC4 has been Microsoft. Eventually, Microsoft upgraded Active Directory to support the much more secure AES encryption standard. But by default, Windows servers have continued to respond to RC4-based authentication requests and return an RC4-based response. The RC4 fallback has been a favorite weakness hackers have exploited to compromise enterprise networks. Use of RC4 played a key role in last year’s breach of health giant Ascension. The breach caused life-threatening disruptions at 140 hospitals and put the medical records of 5.6 million patients into the hands of the attackers. US senator Ron Wyden, an Oregon Democrat, in September called on the Federal Trade Commission to investigate Microsoft for “gross cybersecurity negligence,” citing the continued default support for RC4. “By mid-2026, we will be updating domain controller defaults for the Kerberos Key Distribution Center on Windows Server 2008 and later to only allow AES-SHA1 encryption,” Matthew Palko, a Microsoft principal program manager, wrote. “RC4 will be disabled by default and only used if a domain administrator explicitly configures an account or the KDC to use it.” AES-SHA1, an algorithm widely believed to be secure, has been available in all supported Windows versions since the rollout of Windows Server 2008. Since then, Windows clients by default authenticated using the much more secure standard, and servers responded using the same. But, Windows servers, also by default, respond to RC4-based authentication requests and returned an RC4-based response, leaving networks open to Kerberoasting. Following next year’s change, RC4 authentication will no longer function unless administrators perform the extra work to allow it. In the meantime, Palko said, it’s crucial that admins identify any systems inside their networks that rely on the cipher. Despite the known vulnerabilities, RC4 remains the sole means of some third-party legacy systems for authenticating to Windows networks. These systems can often go overlooked in networks even though they are required for crucial functions. To streamline the identification of such systems, Microsoft is making several tools available. One is an update to KDC logs that will track both requests and responses that systems make using RC4 when performing requests through Kerberos. Kerberos is an industry-wide authentication protocol for verifying the identities of users and services over a non-secure network. It’s the sole means for mutual authentication to Active Directory, which hackers attacking Windows networks widely consider a Holy Grail because of the control they gain once it has been compromised. Microsoft is also introducing new PowerShell scripts to sift through security event logs to more easily pinpoint problematic RC4 usage. Microsoft said it has steadily worked over the past decade to deprecate RC4, but that the task wasn’t easy. No Salt, No Iteration? Really? “The problem though is that it’s hard to kill off a cryptographic algorithm that is present in every OS that’s shipped for the last 25 years and was the default algorithm for so long, Steve Syfuhs, who runs Microsoft’s Windows Authentication team, wrote on Bluesky. “See,” he continued, “the problem is not that the algorithm exists. The problem is how the algorithm is chosen, and the rules governing that spanned 20 years of code changes.” Over those two decades, developers discovered a raft of critical RC4 vulnerabilities that required “surgical” fixes. Microsoft considered deprecating RC4 by this year, but ultimately “punted” after discovering vulnerabilities that required still more fixes. During that time Microsoft introduced some “minor improvements” that favored the use of AES, and as a result, usage dropped by “orders of magnitude.” “Within a year we had observed RC4 usage drop to basically nil. This is not a bad thing and in fact gave us a lot more flexibility to kill it outright because we knew it genuinely wasn’t going to break folks, because folks weren’t using it.” Syfuhs went on to document additional challenges Microsoft encountered and the approach it took to solving them. While RC4 has known cipher weaknesses that make it insecure, Kerberoasting exploits a separate weakness. As implemented in Active Directory authentication, it uses no cryptographic salt and a single round of the MD4 hashing function. Salt is a technique that adds random input to each password before it is hashed. That requires hackers to invest considerable time and resources into cracking the hash. MD4, meanwhile, is a fast algorithm that requires modest resources. Microsoft’s implementation of AES-SHA1 is much slower and iterates the hash to further slow down cracking efforts. Taken together, AES-Sha1-hashed passwords require about 1,000 times the time and resources to be cracked. Windows admins would do well to audit their networks for any usage of RC4. Given its wide adoption and continued use industry-wide, it may still be active, much to the surprise and chagrin of those charged with defending against hackers. This story originally appeared on Ars Technica.

We have summarized this news so that you can read it quickly. If you are interested in the news, you can read the full text here. Read more:

WIRED /  🏆 555. in US

Windows Microsoft Hacks Cybersecurity Security Vulnerabilities Encryption

 

United States Latest News, United States Headlines

Similar News:You can also read news stories similar to this one that we have collected from other news sources.

Microsoft Discontinued One Of Its Only Useful Smartphone Apps After Only 4 YearsMicrosoft Discontinued One Of Its Only Useful Smartphone Apps After Only 4 YearsAlec is an experienced writer and researcher who has spent the last decade diving into the intersection of technology and the public interest. Prior to becoming a freelance writer, he worked as an investigative researcher focusing on disinformation campaigns, cybersecurity, and the intersection of technology and foreign policy.
Read more »

‘Users Must Choose’—Microsoft Confirms New Windows Security Feature‘Users Must Choose’—Microsoft Confirms New Windows Security FeatureMicrosoft has made security changes to one of the most popular tools bundled with Windows installations, and now users must choose safety or risk.
Read more »

Taylor Sheridan's 'Call of Duty' Movie Gets a Big Update from Microsoft HeadTaylor Sheridan's 'Call of Duty' Movie Gets a Big Update from Microsoft HeadChris McPherson is a Senior Author in News for Collider who focuses on Taylor Sheridan, Harry Potter, Dad TV, box office, blockbuster movies and more.
Read more »

Microsoft Copilot quietly shows up on LG TVs, and you can’t remove itMicrosoft Copilot quietly shows up on LG TVs, and you can’t remove itTech Product Reviews, How To, Best Ofs, deals and Advice
Read more »

Hackers Are Stealing Microsoft Account Passwords With This TrickHackers Are Stealing Microsoft Account Passwords With This TrickTalia has been a professional writer since 2018. She got her start at The Nerd Stash, covering consumer technology and entertainment.
Read more »

Trump admin can finally take a victory lap after breaking new recordTrump admin can finally take a victory lap after breaking new recordRecent data from AAA and GasBuddy show that the national average price of gas has fallen to a four-year low as of Monday.
Read more »



Render Time: 2026-04-01 15:07:06