Microsoft to deprecate vulnerable RC4 cipher by mid-2026

Microsoft will disable the obsolete RC4 encryption cipher in Windows Active Directory by mid-2026, addressing decades of security vulnerabilities. The move follows criticism over its role in major hacks, including last year's Ascension breach affecting 140 hospitals. Administrators must now audit networks for lingering RC4 use.

Microsoft has supported the weak RC4 cipher by default in Windows for 26 years, since introducing Active Directory in 2000. RC4, developed by Ron Rivest in 1987, faced a major cryptographic attack shortly after its 1994 leak, yet persisted in protocols like SSL and TLS until about a decade ago.

Despite upgrading to the secure AES standard, Windows servers continued to fallback to RC4 for authentication requests, enabling attacks like Kerberoasting, known since 2014. This vulnerability contributed to the Ascension health breach, disrupting services at 140 hospitals and exposing 5.6 million patients' records.

In September, US Senator Ron Wyden urged the Federal Trade Commission to probe Microsoft for "gross cybersecurity negligence" due to ongoing RC4 support.

Last week, Microsoft announced deprecation of RC4. "By mid-2026, we will be updating domain controller defaults for the Kerberos Key Distribution Center (KDC) on Windows Server 2008 and later to only allow AES-SHA1 encryption," wrote principal program manager Matthew Palko. "RC4 will be disabled by default and only used if a domain administrator explicitly configures an account or the KDC to use it."

AES-SHA1, available since Windows Server 2008, uses iterated hashing and salt, making it about 1,000 times harder to crack than RC4's unsalted, single-round MD4 implementation.

To aid transition, Microsoft offers updated KDC logs and PowerShell scripts to detect RC4 usage, crucial for legacy third-party systems. Steve Syfuhs, of Microsoft's Windows Authentication team, noted on Bluesky the challenges: "The problem though is that it’s hard to kill off a cryptographic algorithm that is present in every OS that’s shipped for the last 25 years."

Over the past decade, Microsoft reduced RC4 usage significantly through incremental changes, dropping it to near zero without widespread breakage.

Mga Kaugnay na Artikulo

Realistic illustration of a computer screen showing the VanHelsing ransomware attack targeting multiple operating systems, suitable for a cybersecurity news article.
Larawang ginawa ng AI

VanHelsing ransomware RaaS targets multiple platforms

Iniulat ng AI Larawang ginawa ng AI

A new ransomware-as-a-service operation called VanHelsing emerged on March 7, 2025, quickly claiming at least three victims. It supports attacks on Windows, Linux, BSD, ARM, and ESXi systems, with affiliates retaining 80% of ransoms after a $5,000 deposit. The group prohibits targeting entities in the Commonwealth of Independent States.

The era of cumbersome passwords may end in 2026, as passkeys emerge as a more secure alternative using biometrics. Cybersecurity experts predict widespread adoption, driven by major companies like Microsoft. This shift promises easier logins and reduced hacking risks.

Iniulat ng AI

Security firm Mandiant has unveiled a rainbow table that enables cracking of administrative passwords protected by the outdated NTLMv1 hashing algorithm in under 12 hours using affordable hardware. The tool targets lingering use of this vulnerable protocol in sensitive networks. Mandiant hopes it will push organizations to abandon the deprecated function.

New research from ETH Zurich and USI Lugano reveals vulnerabilities in popular password managers, challenging their assurances that servers cannot access user vaults. The study analyzed Bitwarden, Dashlane, and LastPass, identifying ways attackers with server control could steal or modify data, particularly when features like account recovery or sharing are enabled. Companies have begun patching the issues while defending their overall security practices.

Iniulat ng AI

Microsoft has introduced new security enhancements designed to strengthen defenses in its Teams platform. These updates aim to provide better protection against malicious content. The announcement was made on December 30, 2025.

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

Iniulat ng AI

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

 

 

 

Gumagamit ng cookies ang website na ito

Gumagamit kami ng cookies para sa analytics upang mapabuti ang aming site. Basahin ang aming patakaran sa privacy para sa higit pang impormasyon.
Tanggihan