The story of a rootkit that was signed by Microsoft

In July, security researchers made a shocking discovery: hundreds of malware used by multiple hacking groups to infect Windows devices were digitally signed and certified as safe by Windows itself. .

rootkit

On Tuesday, different researchers did one similar official announcement: Microsoft digital keys were stolen to sign even more malware for use by an unknown attacker in a supply chain attack that infected around 100 carefully selected victims.

The , researchers from Symantec's Threat Hunter team reported, was digitally signed with a certificate known as Microsoft Windows Hardware Developer Program and the Microsoft Windows Hardware Compatibility Program. This program is used to certify that device drivers – the software that runs deep within the core of Windows – usually come from a known and trusted source to safely access the most sensitive areas of the operating system. Without the certification, the drivers are not suitable to run on Windows.

Somehow, members of this hacking group – which Symantec calls Carderbee – managed to get Microsoft to digitally sign a type of malware known as a rootkit. Once installed, rootkits become an extension of the operating system itself.

To get this level without being blocked by end-point security systems and other defenses, the Carderbee hackers first needed to get rootkit certification and Microsoft's seal of approval, which they did.

With the rootkit signed, Carderbee went “a little” further. By means that are not yet clear, the group attacked the infrastructure of Esafenet, a China-based software developer. The company develops Cobra DocGuard , for and decrypting software so it cannot be hacked.

The Carderbee team then pushed malicious updates to around 2.000 organizations that were the company's customers. After that the members of the hacking group started distributing the Microsoft-signed rootkit to about 100 of these organizations.

"It seems clear that the attackers behind this activity were patient and very skilled," Symantec researchers said.

"The fact that they only distribute the rootkit to a few computers suggests planning and target recognition by the attackers behind this activity."

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).