Skip to content

ABC Tool

  • Home
  • About / Contect
    • PRIVACY POLICY
“TotalRecall Reloaded” tool finds a side entrance to Windows 11’s Recall database

“TotalRecall Reloaded” tool finds a side entrance to Windows 11’s Recall database

Posted on April 16, 2026 By safdargal12 No Comments on “TotalRecall Reloaded” tool finds a side entrance to Windows 11’s Recall database
Blog

The problem, as detailed by Hagenah on the TotalRecall GitHub page, isn’t with the security around the Recall database, which he calls “rock solid.” The problem is that, once the user has authenticated, the system passes Recall data to another system process called AIXHost.exe, and that process doesn’t benefit from the same security protections as the rest of Recall.

“The vault is solid,” Hagenah writes. “The delivery truck is not.”

The TotalRecall Reloaded tool uses an executable file to inject a DLL file into AIXHost.exe, something that can be done without administrator privileges. It then waits in the background for the user to open Recall and authenticate using Windows Hello. Once this is done, the tool can intercept screenshots, OCR’d text, and other metadata that Recall sends to the AIXHost.exe process, which can continue even after the user closes their Recall session.

“The VBS enclave won’t decrypt anything without Windows Hello,” Hagenah writes. “The tool doesn’t bypass that. It makes the user do it, silently rides along when the user does it, or waits for the user to do it.”

A handful of tasks, including grabbing the most recent Recall screenshot, capturing select metadata about the Recall database, and deleting the user’s entire Recall database, can be done with no Windows Hello authentication.

Once authenticated, Hagenah says the TotalRecall Reloaded tool can access both new information recorded to the Recall database as well as data Recall has previously recorded.

Bug or not, Recall is still risky

For its part, Microsoft has said that Hagenah’s discovery isn’t actually a bug and that the company doesn’t plan to fix it. Hagenah originally reported his findings to Microsoft’s Security Response Center on March 6, and Microsoft officially classified it as “not a vulnerability” on April 3.



Source link

Post Views: 1

Post navigation

❮ Previous Post: Fashion retailer Express left customers’ personal data and order details exposed to the internet
Next Post: Motorola Razr Fold Price Revealed Thanks to UK Preorders Going Live ❯

You may also like

Renders show the Motorola Razr 70 in a new color, Pantone Bright White
Blog
Renders show the Motorola Razr 70 in a new color, Pantone Bright White
April 15, 2026
Little Snitch’s software counter surveillance jumps from Mac to Linux
Blog
Little Snitch’s software counter surveillance jumps from Mac to Linux
April 11, 2026
Today’s NYT Mini Crossword Answers for April 11
Blog
Today’s NYT Mini Crossword Answers for April 11
April 12, 2026
LLMs training other LLMs; 72B distributed training run; computer vision is harder than generative text
Blog
LLMs training other LLMs; 72B distributed training run; computer vision is harder than generative text
April 11, 2026

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • The iPhone 17e is one upgrade away from ruining budget Android phones
  • This New Air Purifier Filter Can Remove Cannabis Smoke Odor, Just in Time for 4/20
  • Judge rules Trump administration violated the First Amendment in fight against ICE-tracking
  • NASA Shuts Off Instrument on Voyager 1 to Keep Spacecraft Operating
  • Samsung tipped to use UFS 5.0 storage on select Galaxy S27 models

Recent Comments

No comments to show.

Archives

  • April 2026

Categories

  • Blog

Copyright © 2026 ABC Tool.

Theme: Oceanly News by ScriptsTown