PhantomRPC: A New Windows RPC Privilege Escalation Technique
Security researchers at Kaspersky have uncovered PhantomRPC, an architectural-level vulnerability in Windows Remote Procedure Call that lets attackers deploy a fake RPC server and escalate privileges from low-privileged contexts to SYSTEM or Administrator — without requiring a classic memory-corruption bug.
SINGAPORE — In the world of Windows exploitation, attackers usually hunt for "bugs": a buffer overflow, a race condition, or a logic error in a specific driver. However, newly disclosed research from Kaspersky Application Security Specialist Haidar Kabibo, presented at Black Hat Asia 2026, has exposed something much more difficult to patch: a structural design consequence.
Dubbed PhantomRPC, this technique allows an attacker who has already gained a "foothold" on a system — specifically through low-privileged service accounts like NETWORK SERVICE or LOCAL SERVICE — to vault themselves to the highest level of authority on a machine: NT AUTHORITY\SYSTEM.
The Core Mechanism: The "Fake Server" Trap
Remote Procedure Call (RPC) is the backbone of Windows communication, allowing different processes to talk to one another. Under normal circumstances, a client process (like an updater or a diagnostic tool) reaches out to a legitimate RPC server (like the Terminal Services API).
PhantomRPC exploits the behavior of the RPC runtime when a legitimate server is unavailable. The attack chain works as follows:
- Deployment: An attacker with a low-privileged process deploys an attacker-controlled RPC server that mimics a legitimate, but currently inactive, RPC endpoint.
- The Coercion: A high-privileged process (such as a Group Policy update or a Windows Defender diagnostic) attempts to contact the real service.
- The Interception: Because the real service is unavailable, the Windows RPC runtime inadvertently connects to the attacker’s fake server instead.
- Impersonation: The attacker-server uses the legitimate
RpcImpersonateClient()function to assume the security context of the high-privileged caller, instantly granting the attacker SYSTEM or Administrator access.
Five Known Escalation Paths
Kaspersky researchers identified five distinct vectors where this architectural weakness can be weaponized today:
- Group Policy (gpupdate): Triggering
gpupdate /forceas a user causes the Group Policy Client (SYSTEM) to call Terminal Services. If the service is disabled, the fake RPC endpoint responds and steals the SYSTEM token. - Microsoft Edge: The browser's startup path triggers RPC calls that can be intercepted to elevate a
NETWORK SERVICEprocess to a full local Administrator. - Windows Defender (WDI): Periodic diagnostic calls can be intercepted to gain SYSTEM access without any user interaction.
- DHCP Client: A path from
LOCAL SERVICEto Administrator throughipconfig-triggered RPC calls. - Background Services: Kaspersky notes the attack surface is effectively unbounded; any background service that acts as an RPC client to an unavailable endpoint is a potential target.
The CyberSignal Analysis: Strategic Signals
Signal 01 — Architecture is the New Exploit Surface
PhantomRPC represents a shift in researcher and attacker focus. Instead of looking for a "one-off" bug in an obscure driver, they are targeting core Windows security architecture. Because this is a design behavior rather than a simple coding error, it likely affects all modern versions of Windows NT.
Signal 02 — "Coercion" Without Interaction
Most modern privilege escalation requires a user to click a link or run a specific file. PhantomRPC vectors like WDI and Group Policy happen automatically in the background. This makes it a perfect tool for post-exploitation lateral movement where stealth is paramount.
Signal 03 — The "Low-Privilege" Jump-Point
This research highlights that NETWORK SERVICE and LOCAL SERVICE accounts — often viewed by defenders as "contained" — are actually high-risk jump-points. This follows a trend we’ve seen in kernel-driver abuse, where low-level system access is systematically converted into total environmental control.