Microsoft to deprecate vulnerable RC4 cipher by mid-2026

Microsoft will disable the obsolete RC4 encryption cipher in Windows Active Directory by mid-2026, addressing decades of security vulnerabilities. The move follows criticism over its role in major hacks, including last year's Ascension breach affecting 140 hospitals. Administrators must now audit networks for lingering RC4 use.

Microsoft has supported the weak RC4 cipher by default in Windows for 26 years, since introducing Active Directory in 2000. RC4, developed by Ron Rivest in 1987, faced a major cryptographic attack shortly after its 1994 leak, yet persisted in protocols like SSL and TLS until about a decade ago.

Despite upgrading to the secure AES standard, Windows servers continued to fallback to RC4 for authentication requests, enabling attacks like Kerberoasting, known since 2014. This vulnerability contributed to the Ascension health breach, disrupting services at 140 hospitals and exposing 5.6 million patients' records.

In September, US Senator Ron Wyden urged the Federal Trade Commission to probe Microsoft for "gross cybersecurity negligence" due to ongoing RC4 support.

Last week, Microsoft announced deprecation of RC4. "By mid-2026, we will be updating domain controller defaults for the Kerberos Key Distribution Center (KDC) on Windows Server 2008 and later to only allow AES-SHA1 encryption," wrote principal program manager Matthew Palko. "RC4 will be disabled by default and only used if a domain administrator explicitly configures an account or the KDC to use it."

AES-SHA1, available since Windows Server 2008, uses iterated hashing and salt, making it about 1,000 times harder to crack than RC4's unsalted, single-round MD4 implementation.

To aid transition, Microsoft offers updated KDC logs and PowerShell scripts to detect RC4 usage, crucial for legacy third-party systems. Steve Syfuhs, of Microsoft's Windows Authentication team, noted on Bluesky the challenges: "The problem though is that it’s hard to kill off a cryptographic algorithm that is present in every OS that’s shipped for the last 25 years."

Over the past decade, Microsoft reduced RC4 usage significantly through incremental changes, dropping it to near zero without widespread breakage.

Related Articles

Realistic illustration of a computer screen showing the VanHelsing ransomware attack targeting multiple operating systems, suitable for a cybersecurity news article.
Image generated by AI

VanHelsing ransomware RaaS targets multiple platforms

Reported by AI Image generated by AI

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

The era of cumbersome passwords may end in 2026, as passkeys emerge as a more secure alternative using biometrics. Cybersecurity experts predict widespread adoption, driven by major companies like Microsoft. This shift promises easier logins and reduced hacking risks.

Reported by AI

Security firm Mandiant has unveiled a rainbow table that enables cracking of administrative passwords protected by the outdated NTLMv1 hashing algorithm in under 12 hours using affordable hardware. The tool targets lingering use of this vulnerable protocol in sensitive networks. Mandiant hopes it will push organizations to abandon the deprecated function.

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

Reported by AI

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

Chinese authorities have instructed domestic companies to stop using cybersecurity software from more than a dozen US and Israeli firms due to national security concerns. The directive supports Beijing's drive to replace Western technology with homegrown alternatives amid intensifying tech competition with the United States. Three sources familiar with the matter said the notice was issued in recent days.

Reported by AI

Microsoft's Windows 11 operating system has surpassed 1 billion users worldwide, achieving the milestone slightly quicker than its predecessor. CEO Satya Nadella announced the figure during the company's recent earnings call. Despite user complaints, the OS continues to gain traction amid Windows 10's gradual decline.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline