Archive for April 27, 2026

Unpatched Windows ‘PhantomRPC’ Flaw Allows Privilege Escalation

Posted in Commentary with tags on April 27, 2026 by itnerd

Researchers have published new findings PhantomRPC: A new privilege escalation technique in Windows RPC on April 24th about a  has no patch as it is said to be an architecture problem, and affects all Windows systems.

In response, three cybersecurity experts offer perspective.

Sameed Aijas Ahmed Khan with Dubai-based Secure.com:

“PhantomRPC is a meaningful finding because it sits at the architectural level of Windows, not in an isolated feature that can simply be switched off or patched. What makes it particularly relevant for organizations is the lateral movement risk. 

Once an attacker has a foothold, a flaw in how Windows systems communicate internally can become a pathway across the broader environment and that kind of silent spread is exactly what makes unpatched vulnerabilities so costly over time. We’ve written about how the Dell zero-day campaign went undetected for over 400 days precisely because the initial entry point wasn’t caught in time.

Architectural changes are genuinely complex, and caution is understandable. But as we’ve covered in looking at the Microsoft Word zero-day earlier this year, the window between disclosure and active exploitation tends to be short and organizations are left managing that risk largely on their own.

When remediation isn’t immediately available, mitigation becomes the working strategy. That means network segmentation to limit unnecessary exposure, tightening access controls around privileged accounts, and increasing monitoring for anomalous behavior in affected systems. As we note in our coverage of vulnerability remediation vs. mitigation, a mitigated vulnerability is still present so the goal is to reduce the blast radius while staying alert to how the situation evolves.”

Jacob Krell, Senior Director, Secure AI Solutions and Cybersecurity, Suzu Labs:

PhantomRPC can turn a lower-privileged service compromise into SYSTEM-level control. For an organization, that means a normal foothold can become full host compromise. From there, an attacker may be able to access sensitive credentials, tamper with security tooling, establish persistence, and use the machine as a staging point for lateral movement. The important point is that this is not just a single bad component. Kaspersky’s research points to a broader weakness in how Windows RPC handles server provenance, which means new abuse paths may continue to appear as researchers and attackers find additional privileged RPC clients.

Microsoft’s decision not to issue a patch makes sense only within a narrow vulnerability-triage model. The issue typically requires SeImpersonatePrivilege, and Microsoft appears to have treated that prerequisite as a limiting factor. The problem is that SeImpersonatePrivilege has been central to Windows privilege escalation research for years. It is not rare, exotic, or purely theoretical. Many real-world compromises already land in service contexts where impersonation privileges are available by design.

That is especially important because service accounts are often one of the first positions an attacker obtains after exploiting a web-facing application or local service. From an attacker’s perspective, the question after that initial foothold is simple: how do I become SYSTEM? PhantomRPC provides one answer by abusing the trust relationship between privileged RPC clients, expected endpoints, and impersonation. That makes the prerequisite less reassuring than it may appear on paper.

Microsoft should remediate the underlying architectural weakness, or at minimum provide stronger platform-level safeguards around RPC endpoint authenticity and privileged impersonation flows. The lesson from the Potato family was that broad impersonation rights can turn service-level access into SYSTEM. PhantomRPC shows that lesson still applies, just through a different IPC path. A flaw that repeatedly converts common service compromise into full host control should not be dismissed simply because the dangerous privilege was granted by design.

To protect themselves, organizations should focus on detection, hardening, and reducing unnecessary impersonation exposure. Kaspersky’s recommended approach is ETW-based monitoring for RPC activity where high-privileged clients attempt to connect to unavailable servers, especially when those calls use elevated impersonation levels. Those failures can indicate places where a malicious RPC server could be inserted.

They should also review which custom and third-party services hold SeImpersonatePrivilege and remove it where it is not strictly required. Where possible, legitimate services should be configured so expected RPC endpoints are actually registered, reducing the opportunity for an attacker to occupy the missing endpoint first. This is not a complete fix, but it reduces the attack surface and gives defenders observable signals.

PhantomRPC should be viewed in the same lineage as the Potato family of Windows privilege escalation techniques. Those exploits showed years ago that service accounts with SeImpersonatePrivilege can become a dangerous bridge to SYSTEM when Windows allows a lower-privileged process to impersonate a higher-privileged caller. PhantomRPC matters because it shows that the underlying design issue was never fully eliminated. The abuse path has moved from familiar COM-based techniques into the RPC layer itself.

That is why treating SeImpersonatePrivilege as a simple prerequisite misses the larger point. The privilege is widely granted to service identities because Windows services need impersonation for legitimate functionality. In practice, that makes it part of the operating system’s architectural attack surface, not an unusual edge condition. If a common service context can register the right endpoint, wait for a privileged client, and inherit its authority, the weakness is in the trust model around impersonation and endpoint provenance.

This is also unlikely to be the last route researchers find. Once the pattern is understood, the question becomes how many other privileged Windows clients connect to expected IPC endpoints without strong enough assurance about who is actually listening. Security teams should treat PhantomRPC less like a one-off vulnerability and more like a signal that Windows IPC and impersonation flows need sustained monitoring, hardening, and architectural attention.

Xcape, Inc. board member Damon Small:

Microsoft’s decision not to patch is technically defensible under their traditional servicing criteria – since the attacker already needs SeImpersonatePrivilege – but it is operationally negligent in a landscape where attackers frequently use compromised service accounts as a beachhead. This “Moderate” rating ignores how easily these prerequisites are met during real-world lateral movement. Since no patch is forthcoming, defenders must treat this as a permanent architectural debt. To be clear, it is not so much that Microsoft decided not to patch, but at this time it appears that it cannot be patched without fundamentally changing how RPC functions.

The most effective mitigation organizations should invoke is to restrict SeImpersonatePrivilege to the absolute minimum number of accounts and utilize Host Intrusion Prevention Systems (HIPS) or EDR rules to monitor for unauthorized processes attempting to bind to known RPC ports, particularly those associated with the Terminal Services port range.

This was reported to Microsoft on September 25, 2025. Microsoft assessed this as a moderate severity, not eligible for a bug bounty, and not in need of a CVE or immediate fix at the time. Because of the fundamental, architectural, nature of this vulnerability, we should expect to see variants on this attack pattern emerge in the future. Defenders should keep an eye on service accounts exhibiting anomalous behavior, such as spawning arbitrary listeners. This publication at this time is indicative of a pattern where Microsoft has downplayed an external researcher’s finding because resolving the underlying issue is a deep architectural change. It is a bold strategy for Microsoft to claim a flaw is not a bug simply because you have to be halfway into the house before you can use it to unlock the safe.

I strongly recommend that you read this report and consider this to be a “today” problem because there is no fix. Which means that it’s only a matter of time for threat actors exploit this if they have not already.

Microsoft’s Outlook.com Email Seems To Be Having Issues

Posted in Commentary with tags on April 27, 2026 by itnerd

I have received two calls today about people having issues with Outlook.com email accounts (which can be also hotmail.com). Here’s what they are reporting:

  • Outlook on iPhone is making users sign in.
  • You go through the steps to sign in and you still get a prompt to sign in.
  • Removing and re-adding the account does not fix this. Mi

I’ve been able to replicate this myself.

This issue seems to be widespread based on Down Detector which has similar reports of this issue. Microsoft’s Service Status page as well as on Twitter confirm this as well:

Thus it is safe to say that Microsoft has an issue that it is trying to wrap its hands around. There does not appear to be an ETA to resolution. Thus users of Outlook.com will have to wait it out until Microsoft fixes this.

TELUS Friendly Future Foundation Gala returns with headliner Lionel Richie

Posted in Commentary with tags on April 27, 2026 by itnerd

The TELUS Friendly Future Foundation announced its third annual gala will take place on June 18, 2026 at the iconic TELUS Centre for Performance and Learning in Toronto. As young Canadians face increasing challenges ranging from mental health concerns to employment barriers and financial hardship, the gala brings together Canada’s business, philanthropic, technology, and cultural leaders to raise funds to address these urgent issues. Since its inception, the TELUS Friendly Future Foundation, with the support of the 13 Canadian TELUS Community Boards, has provided $137 million to support youth across Canada. In 2025 alone, the Foundation exceeded $10 million in impact through grants that fuel critical youth-focused health and education programs and student bursaries that empower the next generation of changemakers to pursue their post-secondary dreams.

All funds raised from the gala directly support the TELUS Friendly Future Foundation’s mission to help youth reach their full potential through two vital programs:

  • The TELUS Student Bursary awards up to $5,000 annually to more than 500 deserving post-secondary students facing financial barriers and committed to giving back to their communities. Beyond financial aid, recipients gain access to comprehensive wraparound support including free or heavily discounted TELUS Mobility and Internet for Good plans, mental health services through TELUS Health and professional development opportunities. Since launching in 2023, the program has supported 2,000 students, with more than 50 per cent of all recipients being the first in their families to pursue higher education. 
  • TELUS Community Board Grants, which help fund critical, youth-serving charitable programs. The Foundation and its 13 Canadian TELUS Community Boards provide $6 million in grants annually to more than 500 local charities across the country. These grants support innovative, technology-enabled health and education programs that help millions of youth develop critical skills, confidence, and a deep sense of belonging in their communities.

The Together for Tomorrow Gala has become Canada’s premier philanthropic event dedicated to youth empowerment. Building on the success of the first two galas – which raised over $5 million – this year’s event, hosted by television personality Cheryl Hickey, promises an extraordinary evening of entertainment and impact. The night will culminate with an exclusive, one-night-only headline performance by four-time Grammy award winner Lionel Richie. Following the gala, guests are invited to continue the celebration at the afterparty with DJ Jake Wahlberg. A live auction will offer exclusive experiences and opportunities, giving guests the chance to bid on unique items while directly supporting the Foundation’s mission.

The Foundation would like to express a special thanks to TELUS, its many sponsors, donors and volunteers who help make this remarkable event possible.

For more information about the TELUS Friendly Future Foundation Gala, please visit friendlyfuture.com/gala. To learn more about gala sponsorship and attendance, please email info@friendlyfuture.com