TotalRecall Reloaded exposes Windows Recall security gap

Security researcher Alexander Hagenah has released an updated tool called TotalRecall Reloaded that reveals weaknesses in Microsoft Windows 11's Recall feature. Despite Microsoft's security overhauls, the tool can intercept user data after Windows Hello authentication without needing administrator privileges. Microsoft maintains that this does not represent a vulnerability.

Two years ago, Microsoft introduced Recall as part of its Copilot+ PCs, a feature designed to track PC usage via screenshots for easier recall of past activities. Initially criticized for storing unencrypted data, Microsoft delayed its rollout and improved security: data is now encrypted, accessible only via Windows Hello, turned off by default, and better at excluding sensitive information like financial details. However, Hagenah argues that while the Recall database itself—protected by a VBS enclave—is 'rock solid,' the AIXHost.exe process handling data lacks similar protections. 'The vault is solid. The delivery truck is not,' he wrote on the tool's GitHub page. The TotalRecall Reloaded tool injects a DLL into AIXHost.exe, allowing it to capture screenshots, OCR text, and metadata once the user authenticates. It can also access recent screenshots, database metadata, or delete the entire database without authentication, and continues intercepting even after Recall closes. Hagenah reported the issue to Microsoft's Security Response Center on March 6; the company classified it as 'not a vulnerability' on April 3. A Microsoft spokesperson stated, 'We appreciate Alexander Hagenah for identifying and responsibly reporting this issue. After careful investigation, we determined that the access patterns demonstrated are consistent with intended protections and existing controls, and do not represent a bypass of a security boundary or unauthorized access to data. The authorization period has a timeout and anti-hammering protection that limit the impact of malicious queries.' Apps like Signal Messenger, AdGuard, and Brave Browser have implemented workarounds to exclude their content from Recall.

Relaterede artikler

Dramatic illustration of Stryker's operations center disrupted by Iran-linked cyberattack, with error-filled screens and intact medical devices.
Billede genereret af AI

Iran-linked hackers disrupt Stryker's network in apparent retaliation

Rapporteret af AI Billede genereret af AI

A cyberattack attributed to the Iran-aligned Handala Hack group has disrupted the Microsoft environment of medical device maker Stryker, paralyzing much of its global operations. The incident, which emerged shortly after US and Israeli airstrikes on Iran, involved data wiping across tens of thousands of computers. Stryker confirmed the attack is contained, with no impact on its critical medical devices.

A security vulnerability in Microsoft Excel combines spreadsheets and the Copilot Agent to potentially steal data, according to TechRadar. The flaw is described as fascinating in its approach. The report was published on March 11, 2026.

Rapporteret af AI

Security researchers have flagged a new risk to users of Microsoft's Phone Link application. An unidentified threat actor is using the tool to steal SMS messages and one-time passwords.

Microsoft Windows VP Pavan Davuluri has detailed specific changes to enhance Windows 11 quality, building on the company's recently initiated campaign. Updates for Windows Insider testers are set to roll out by late April, including taskbar fixes and scaled-back Copilot integrations.

Rapporteret af AI

Microsoft has removed the Copilot name from its Windows 11 Notepad app in the latest Insider build, renaming the AI features to 'Writing tools.' The change affects branding but keeps the generative writing functions intact. Similar updates appear in the Snipping Tool.

Dette websted bruger cookies

Vi bruger cookies til analyse for at forbedre vores side. Læs vores privatlivspolitik for mere information.
Afvis