Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Senator Demands FTC Probe Over Microsoft Security Defaults
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
CybersecurityTechnology

Senator Demands FTC Probe Over Microsoft Security Defaults

Highlights

  • Ascension attack exposes millions due to outdated Microsoft security defaults.

  • Senator Wyden urges investigation, citing risks from RC4 encryption.

  • Microsoft plans phased updates, but concerns about vulnerability persist.

Samantha Reed
Last updated: 11 September, 2025 - 12:49 am 12:49 am
Samantha Reed 6 hours ago
Share
SHARE

A high-profile call for regulatory scrutiny has emerged after a ransomware attack struck Ascension, one of the largest non-profit health systems in the United States, impacting millions of patients. The security breach has drawn attention not only to the immediate consequences for those exposed but also to broader systemic concerns about the default security configurations employed by Microsoft products such as Windows, Bing, Edge, and Active Directory. Cybersecurity vulnerabilities that have persisted for decades are now the focus of renewed calls for action, as policymakers and industry leaders evaluate industry standards in the context of escalating cyberattacks.

Contents
How Did the Attack Happen at Ascension?Why Is Microsoft’s Use of RC4 Encryption Under Criticism?What Actions Are Microsoft and Regulators Considering?

Earlier reports on similar incidents primarily highlighted specific vulnerabilities within the healthcare sector, occasionally referencing outdated encryption standards like RC4 and the technique of Kerberoasting. However, those accounts often centered on organizational missteps or general risks rather than drawing a direct connection between default security configurations set by major vendors and large-scale breaches. The current developments bring new urgency to longstanding warnings from federal agencies and private experts, moving the spotlight squarely onto Microsoft’s role in enabling or mitigating these risks.

How Did the Attack Happen at Ascension?

The attack originated in February 2024, when a contractor using a company-issued laptop accessed a phishing link via Microsoft Bing on Microsoft Edge, both default tools. The malware quickly infiltrated Ascension’s broader network after gaining administrative privileges through Active Directory. As a result, ransomware was disseminated widely, compromising sensitive information such as medical records, insurance details, and identification data belonging to over 5.6 million patients.

Why Is Microsoft’s Use of RC4 Encryption Under Criticism?

Senator Ron Wyden alleges that the persistence of obsolete encryption protocols, particularly RC4, is a critical security gap in Microsoft’s infrastructure. RC4, first introduced in the 1980s, remains enabled by default in certain Microsoft products, despite warnings from cybersecurity experts and federal agencies. Wyden argued that continuing to support such outdated standards “needlessly exposes its customers to ransomware and other cyber threats,” and urges Microsoft to adopt more secure encryption like the Advanced Encryption Standard (AES).

What Actions Are Microsoft and Regulators Considering?

In response to the concerns raised, Microsoft stated that use of RC4 constitutes a small percentage of its traffic, clarifying that “RC4 is an old standard and we discourage its use both in how we engineer our software and in our documentation to customers.”

“However, disabling its use completely would break many customer systems,”

the company explained, outlining a phased approach: RC4 is set to be disabled by default in Active Directory starting in Q1 of 2026, with further restrictions planned for broader usage but no exact timeline provided. Senator Wyden maintains that Microsoft bears the primary responsibility to improve their products’ default security.

“Microsoft chooses the default settings, including the security features that are enabled automatically and the required security settings (e.g. minimum password length),”

he contended, pointing out that while changes can be made by end users, few organizations actually update the defaults in practice.

Public concern grows as key infrastructure sectors remain vulnerable due to outdated encryption still permitted by default in widely-used products. While Microsoft plans incremental changes, questions persist about the pace and sufficiency of its response. The distinction between user responsibility and vendor accountability continues to spark debate, especially as both regulatory agencies and lawmakers examine whether voluntary guidance or enforceable standards will best protect critical data.

Major software vendors frequently balance backward compatibility with advancing security protocols, yet this incident underscores the persistent risk associated with supporting obsolete technology. Organizations relying on products like Active Directory should evaluate default settings and adopt stronger, government-endorsed encryption to narrow their exposure to known threats. Ongoing scrutiny by legislative and regulatory bodies could prompt more rapid adoption of secure defaults, motivating vendors to prioritize customer safety over ease of transition. Ultimately, the responsibility for cybersecurity is increasingly shared, with default configurations serving as a frontline defense that should not be overlooked.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Sara Blakely Initiates Sneex to Address High Heel Comfort

Hackers Target Major npm Packages, Security Teams Respond Swiftly

Apple Introduces Memory Integrity Enforcement to Boost iPhone Security

Microsoft Patches 81 Vulnerabilities in September Update Release

US Targets Ukrainian Suspect Over Global Ransomware Attacks

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Sara Blakely Initiates Sneex to Address High Heel Comfort
Next Article Nintendo Secures New Patents, Raising Concerns Over Competition

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Wordle Challenges Players With “Chair” as September 11 Solution
Gaming
RingConn Gen 2 Adds Automatic Workout Detection with Firmware Update
Wearables
Nintendo Secures New Patents, Raising Concerns Over Competition
Gaming
Tesla Faces Pushback On Pop-Out Door Handles In China
Electric Vehicle
Zoox Launches Public Robotaxi Service on Las Vegas Strip
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?