By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Online Tech Guru
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release
Reading: Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks
Best Deal
Font ResizerAa
Online Tech GuruOnline Tech Guru
  • News
  • Mobile
  • PC/Windows
  • Gaming
  • Apps
  • Gadgets
  • Accessories
Search
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release
Nintendo wins m in 15-year-old lawsuit over Wii controller patent

Nintendo wins $8m in 15-year-old lawsuit over Wii controller patent

News Room News Room 17 December 2025
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow
  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Online Tech Guru > News > Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks
News

Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks

News Room
Last updated: 17 December 2025 17:38
By News Room 4 Min Read
Share
Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks
SHARE

Microsoft is killing off an obsolete and vulnerable encryption cipher that Windows has supported by default for 26 years. This follows more than a decade of devastating hacks that exploited it and recent blistering criticism from a prominent US senator.

When the software maker rolled out Active Directory in 2000, it made RC4 a sole means of securing the Windows component, which administrators use to configure and provision fellow administrator and user accounts inside large organizations. RC4, short for Rivist Cipher 4, is a nod to mathematician and cryptographer Ron Rivest of RSA Security, who developed the stream cipher in 1987. Within days of the trade-secret-protected algorithm being leaked in 1994, a researcher demonstrated a cryptographic attack that significantly weakened the security it had been believed to provide. Despite the known susceptibility, RC4 remained a staple in encryption protocols, including SSL and its successor TLS, until about a decade ago.

Out With the Old

One of the most visible holdouts in supporting RC4 has been Microsoft. Eventually, Microsoft upgraded Active Directory to support the much more secure AES encryption standard. But by default, Windows servers have continued to respond to RC4-based authentication requests and return an RC4-based response. The RC4 fallback has been a favorite weakness hackers have exploited to compromise enterprise networks. Use of RC4 played a key role in last year’s breach of health giant Ascension. The breach caused life-threatening disruptions at 140 hospitals and put the medical records of 5.6 million patients into the hands of the attackers. US senator Ron Wyden, an Oregon Democrat, in September called on the Federal Trade Commission to investigate Microsoft for “gross cybersecurity negligence,” citing the continued default support for RC4.

“By mid-2026, we will be updating domain controller defaults for the Kerberos Key Distribution Center (KDC) on Windows Server 2008 and later to only allow AES-SHA1 encryption,” Matthew Palko, a Microsoft principal program manager, wrote. “RC4 will be disabled by default and only used if a domain administrator explicitly configures an account or the KDC to use it.”

AES-SHA1, an algorithm widely believed to be secure, has been available in all supported Windows versions since the rollout of Windows Server 2008. Since then, Windows clients by default authenticated using the much more secure standard, and servers responded using the same. But, Windows servers, also by default, respond to RC4-based authentication requests and returned an RC4-based response, leaving networks open to Kerberoasting.

Following next year’s change, RC4 authentication will no longer function unless administrators perform the extra work to allow it. In the meantime, Palko said, it’s crucial that admins identify any systems inside their networks that rely on the cipher. Despite the known vulnerabilities, RC4 remains the sole means of some third-party legacy systems for authenticating to Windows networks. These systems can often go overlooked in networks even though they are required for crucial functions.

Share This Article
Facebook Twitter Copy Link
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The Very Best Gifts for Dads of Christmas 2025

The Very Best Gifts for Dads of Christmas 2025

News Room News Room 17 December 2025
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow

Trending

Wikipedia founder Jimmy Wales interview: trust the process

Wikipedia will be 25 years old in January. During that time, the encyclopedia has gone…

17 December 2025

Fallout 5 Will Exist in a World Where ‘The Stories and Events of the Show Happened or Are Happening,’ Todd Howard Confirms

Fallout 5 will indeed take into account the canon events of the Fallout TV series,…

17 December 2025

Border Patrol Bets on Small Drones to Expand US Surveillance Reach

US Customs and Border Protection is quietly doubling down on a surveillance strategy built around…

17 December 2025
News

Amazon has a new leader for its ‘AGI’ group as it plays catch-up on AI

Amazon has a new leader for its ‘AGI’ group as it plays catch-up on AI

Amazon’s head of artificial general intelligence (AGI), Rohit Prasad, is leaving the company next year as it reaches an “inflection point” in its development of the technology, CEO Andy Jassy…

News Room 17 December 2025

Your may also like!

Billionaires want data centers everywhere, including space
News

Billionaires want data centers everywhere, including space

News Room 17 December 2025
Warner Bros. Discovery advises shareholders to reject Paramount Skydance takeover bid
Gaming

Warner Bros. Discovery advises shareholders to reject Paramount Skydance takeover bid

News Room 17 December 2025
Snap rear camera selfies using this iPhone’s case’s second screen.
News

Snap rear camera selfies using this iPhone’s case’s second screen.

News Room 17 December 2025
The Most Powerful Politics Influencers Barely Post About Politics
News

The Most Powerful Politics Influencers Barely Post About Politics

News Room 17 December 2025

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site.

Read our privacy policy for more information.

Quick Links

  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
Advertise with us

Socials

Follow US
Welcome Back!

Sign in to your account

Lost your password?