Home » today » Business » Microsoft confirms it signed a rootkit driver – Computer – News

Microsoft confirms it signed a rootkit driver – Computer – News

Microsoft acknowledges that it has signed a driver that contains a rootkit. The company is currently investigating this rootkit, which Microsoft says was only deployed in the Chinese gaming sector.

Microsoft confirms in a blog post that the actor behind the rootkit, which is called Netfilter, sent the driver for validation, after which Microsoft signed it. “The actor has submitted drivers for certification through the Windows Hardware Compatibility Program,” the tech giant said. “The drivers were created by a third party. We suspended the account and checked the submitted drivers for additional signs of malware.”

Microsoft claims that the actor behind this rootkit is only active in the ‘Chinese gaming sector’. There is no indication that Netfilter was used to compromise business environments, according to the tech giant. The company also states that it has not yet attributed the attack to a state hacker. Microsoft writes that users should not take any measures other than “following good security measures and deploying antivirus software.”

“The actor’s goal is to use the driver to track their geolocation.” spoofen and thus cheat the system and play anywhere,” Microsoft said. As a result, the malware could “gain an advantage in games” and “potentially exploit other players by stealing their accounts through tools like keyloggers.”

The signed rootkit driver was last Friday noticed by G-Data, a German cybersecurity company that makes antivirus software, among other things. The malware communicates with Chinese servers. “The main functionality of the rootkit driver is to redirect traffic,” the company wrote. The rootkit can also update itself.

Since Windows Vista, code that runs in kernel mode must first be signed by Microsoft before it is released. Drivers without a Microsoft certificate cannot be installed by default. G-Data was therefore recently notified of a possible false alarm because its antivirus software detected a Netfilter driver signed by Microsoft.

“But in this case, the detection was really positive, so we forwarded our findings to Microsoft, who quickly added the malware to Windows Defender and are conducting an internal investigation,” G-Data said.

The signed Netfilter driver. Source: G-Data

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.