![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
Windows OS Is Still the Most Lucrative Target for Hackers. Why?
In this issue
Windows OS Is Still the Most Lucrative Target for Hackers. Why?
We update monthly on Patch Tuesday, install firewalls, anti-virus and anti-spyware, and always coach users to use complex, secure passwords. But apparently it is still not enough. A recent poll of 300 hackers conducted at Black Hat finds Windows OS is still a very hot target for attack. Those that answered the survey were a combination of white hat, gray hat and black hat hackers.
Nearly 50 percent of those surveyed said they had compromised Windows-based systems more than any other within the past year. Most said they infiltrated Windows 10 most frequently, followed by Windows 8. Microsoft says Windows 10 has been deployed on 700 million devices since its launch in 2015.
Microsoft has prioritized security in recent years, recently noting it will continue to invest over $1 billion a year on cybersecurity and research in order to further enhance the defenses of its products. But clearly, Windows is still seen as a sitting duck for hackers seeking a quick win. Why is that?
“With more than 80 percent of the desktop OS market share, it is no surprise that Windows is a hot target for hackers,” said Michael Maltsev, a security researcher at Reason Software Company. “Microsoft is well aware of this, and constantly works on mitigations for known attacks. For example, Windows 10 introduces security features such as KCFG (Kernel Control Flow Guard), ACG (Arbitrary Code Guard), HyperGuard, ASR (Attack Surface Reduction) and WDEG (Exploit Protection). Even though not all mitigations are enabled by default due to compatibility reasons, we can see a trend where it’s more difficult for attackers to exploit the system, and more attackers are relying on social engineering for the job.”
Windows Security Has Improved, But So Have Hacker Techniques
To its credit, Microsoft has included enhancements and improvements to each new Windows OS, which have paid off with better security in each new OS release, but there will always be the age-old problem of user error.
“It’s not that easy to compromise Windows from a remote only standpoint anymore,” said Dennis Chow, CISO, SCIS Security, a cybersecurity only consulting firm in Houston. “Many exploits are focused on ‘client side’ exploitation where they have to entice users to take an action; visit a site or email and click on a payload.”
The social engineering criminals Chow is referring to are constantly evolving their techniques, and with a majority of users sitting on the other end of a Windows OS, that is what they are after.
“Many hackers are running a business and you don’t create a new app or device that won’t have a market,” said Chris Goettl, director of product management, security, for Ivanti. “You create where there will be demand, where you can attach to more of the market. If more than 50 percent of the systems that hackers want to access are running Windows, then Windows is their primary target.”
Despite Investment in Security, Windows Vulnerabilities Climb
Enhancements in security features may have hardened Windows defenses, but admins are still fighting a hard-won battle against bugs and vulnerabilities that only appears to be getting worse. Analysis conducted last year by Avecto found Microsoft vulnerabilities have more than doubled since 2013. In a five-year analysis of Windows vulnerabilities, the firm found the number of reported vulnerabilities has risen 111 percent since 2013 and the number of critical vulnerabilities rose 60 percent in the same period.
“Companies are still leaving critical vulnerabilities open,” said Chris Stoneff, vice president of security solutions at Bomgar, which recently acquired Avecto. “According to the Avecto survey, 88 percent of all critical vulnerabilities reported by Microsoft over the last five years would have been mitigated by removing admin rights.”
Thycotic, in its summary of the Black Hat survey findings, echoes Stoneff’s thoughts and advised organizations to adopt a “zero-trust” strategy that emphasizes least privilege in order to mitigate Windows security concerns.
“Three out of four (75 percent) of hackers say companies fail at applying least privilege, giving user accounts too much access,” the summary of findings read. “Once compromised these local domain accounts can allow hackers to exploit administrative privileges to gain full access of the entire IT infrastructure and remain undetected.”
Going Beyond Group Policy Objects
Another key takeaway from the Thycotic survey highlights the need for organizations with Windows environments to use more than just Group Policy Objects for security. More than 90 percent of hackers surveyed said they compromised Windows environments despite the use of GPO to help maintain security.
“Despite using GPO to harden Windows environments, hackers indicate they can easily bypass security controls,” said the summary of findings. “Most hackers use Mimikatz, a popular Windows security audit tool (also available in Kali Linux), to extract plaintext passwords, hashes, PIN codes, Kerberos tickets from memory and perform pass-the-hash attacks. Other methods include getting passwords from SYSVOL, exploiting Group Policy Preferences or using Metasploit.”
Despite Troubles, Windows Will Continue Its Domination
With its massive market share, Windows will continue to be the top target for industrious criminals, but there are tactics Windows admins and security managers can employ to shore up defenses. A holistic approach that relies on solid patching practices and layered tools for security can give your organization a better shot at keeping hackers at bay.
Publisher: AskWoody LLC (woody@askwoody.com); editor: Tracey Capen (editor@askwoody.com).
Trademarks: Microsoft and Windows are registered trademarks of Microsoft Corporation. AskWoody, Windows Secrets Newsletter, WindowsSecrets.com, WinFind, Windows Gizmos, Security Baseline, Perimeter Scan, Wacky Web Week, the Windows Secrets Logo Design (W, S or road, and Star), and the slogan Everything Microsoft Forgot to Mention all are trademarks and service marks of AskWoody LLC. All other marks are the trademarks or service marks of their respective owners.
Your email subscription:
- Subscription help: customersupport@askwoody.com
Copyright © 2025 AskWoody LLC, All rights reserved.

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
.NET 8.0 Desktop Runtime (v8.0.16) – Windows x86 Installer
by
WSmeyerbos
40 minutes ago -
Neowin poll : What do you plan to do on Windows 10 EOS
by
Alex5723
3 minutes ago -
May 31, 2025—KB5062170 (OS Builds 22621.5415 and 22631.5415 Out-of-band
by
Alex5723
33 minutes ago -
Discover the Best AI Tools for Everything
by
Alex5723
14 minutes ago -
Edge Seems To Be Gaining Weight
by
bbearren
6 minutes ago -
Rufus is available from the MSFT Store
by
PL1
22 hours, 17 minutes ago -
Microsoft : Ending USB-C® Port Confusion
by
Alex5723
1 day ago -
KB5061768 update for Intel vPro processor
by
drmark
6 hours, 51 minutes ago -
Outlook 365 classic has exhausted all shared resources
by
drmark
3 hours, 2 minutes ago -
My Simple Word 2010 Macro Is Not Working
by
mbennett555
20 hours, 11 minutes ago -
Office gets current release
by
Susan Bradley
22 hours, 49 minutes ago -
FBI: Still Using One of These Old Routers? It’s Vulnerable to Hackers
by
Alex5723
2 days, 12 hours ago -
Windows AI Local Only no NPU required!
by
RetiredGeek
1 day, 21 hours ago -
Stop the OneDrive defaults
by
CWBillow
2 days, 13 hours ago -
Windows 11 Insider Preview build 27868 released to Canary
by
joep517
2 days, 23 hours ago -
X Suspends Encrypted DMs
by
Alex5723
3 days, 1 hour ago -
WSJ : My Robot and Me AI generated movie
by
Alex5723
3 days, 2 hours ago -
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
by
Alex5723
3 days, 2 hours ago -
OpenAI model sabotages shutdown code
by
Cybertooth
3 days, 3 hours ago -
Backup and access old e-mails after company e-mail address is terminated
by
M W Leijendekker
2 days, 15 hours ago -
Enabling Secureboot
by
ITguy
2 days, 22 hours ago -
Windows hosting exposes additional bugs
by
Susan Bradley
3 days, 11 hours ago -
No more rounded corners??
by
CWBillow
3 days, 7 hours ago -
Android 15 and IPV6
by
Win7and10
2 days, 20 hours ago -
KB5058405 might fail to install with recovery error 0xc0000098 in ACPI.sys
by
Susan Bradley
3 days, 23 hours ago -
T-Mobile’s T-Life App has a “Screen Recording Tool” Turned on
by
Alex5723
4 days, 2 hours ago -
Windows 11 Insider Preview Build 26100.4202 (24H2) released to Release Preview
by
joep517
3 days, 20 hours ago -
Windows Update orchestration platform to update all software
by
Alex5723
4 days, 9 hours ago -
May preview updates
by
Susan Bradley
3 days, 21 hours ago -
Microsoft releases KB5061977 Windows 11 24H2, Server 2025 emergency out of band
by
Alex5723
3 days, 12 hours ago
Recent blog posts
Key Links
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 |
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.