Feeds

Now Microsoft 'actively investigates' Surface slab jailbreak tool

'Appropriate action taken as necessary' against Windows RT hack

Remote control for virtualized desktops

Microsoft is suddenly serious about tackling RT Jailbreak, a slick tool that unlocks Surface tablets using a hack publicised just days earlier.

A spokesperson for Microsoft’s Trustworthy Computing Group, tasked with Windows security, told The Register that Redmond is “actively investigating” the RT Jailbreak Tool v1 cooked up last week. Microsoft will take “appropriate action as necessary”, the spokesperson said, but provided no further details.

RT Jailbreak is batch file created by a coder called Netham45 that can crack locked-down Windows RT tablets in a matter of seconds. Once in, users can run any unauthorised desktop apps on their ARM-powered devices. Microsoft would rather people download and install authorised, and cryptographically signed, software specifically built for touch-driven computers from its official Windows Store outlet.

The jailbreak tool disables the signature check in the kernel to allow any software to run. It uses a debugging trick published last week by a security researcher known as C. L. Rokr, although the original hack entailed getting one's hands dirty with WinDbg. Netham45 tidied up the process and packaged it as RT Jailbreak Tool v1, which was released just four days after Rokr went public with his or her discovery.

Microsoft appeared to brush off the Rokr hack at the time, saying it wasn’t a security vulnerability - even though it exploited an existing shortcoming in the Windows kernel. “We applaud the ingenuity of the folks who worked this out and the hard work they did to document it. We’ll not guarantee these approaches will be there in future releases,” Microsoft noted.

Redmond's now heightened concern over the new tool may be because it is not quite so inaccessible to "the average user" as the original exploit, allowing punters to install all sorts of ARM-compatible software without the need to trouble the Windows Store. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.