Article 6CWVE Hackers exploit gaping Windows loophole to give their malware kernel access

Hackers exploit gaping Windows loophole to give their malware kernel access

by
Dan Goodin
from Ars Technica - All content on (#6CWVE)
microsoft-windows-800x534.jpg

Enlarge (credit: Getty Images)

Hackers are using open source software that's popular with video game cheaters to allow their Windows-based malware to bypass restrictions Microsoft put in place to prevent such infections from occurring.

The software comes in the form of two software tools that are available on GitHub. Cheaters use them to digitally sign malicious system drivers so they can modify video games in ways that give the player an unfair advantage. The drivers clear the considerable hurdle required for the cheat code to run inside the Windows kernel, the fortified layer of the operating system reserved for the most critical and sensitive functions.

Researchers from Cisco's Talos security team said Tuesday that multiple Chinese-speaking threat groups have repurposed the tools-one called HookSignTool and the other FuckCertVerifyTimeValidity. Instead of using the kernel access for cheating, the threat actors use it to give their malware capabilities it wouldn't otherwise have.

Read 23 remaining paragraphs | Comments

External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments