Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home News

Hackers Using Malicious Windows Drivers in Ransomware Attacks

admin by admin
Dec 20, 2022
in News
0 0
A A
0
FacebookTwitterLinkedIn

Following a series of cyberattacks, including ransomware attacks, Microsoft recently revoked several Microsoft hardware developer accounts.

In a coordinated disclosure, the news came from the following entities:-

  • Microsoft
  • Mandiant
  • Sophos
  • SentinelOne

Authenticode signatures from Microsoft’s Windows Hardware Developer Program have been used in order to verify the trustworthiness of malicious kernel-mode hardware drivers that are used by threat actors.

Abusing Microsoft-signed Malicious Windows Drivers

In Windows, kernel-mode hardware drivers gain the highest level of privilege when they are loaded since they are loaded in kernel mode. It is possible that these privileges could grant the driver the ability to perform a variety of malicious activities that would otherwise not be permissible.

EHA

In order to carry out these actions, the following tasks are performed:-

  • Disable security software
  • Protected files are deleted
  • Act as rootkits to hide malicious processes

The Windows Hardware Developer Program is a program developed by Microsoft that entails the signing of hardware drivers operating at the kernel level. The kernel-mode hardware drivers are must required in Windows 10.

As developers need to go through several verification stages to make the code look legit. Here below we have mentioned those stages:-

  • Register for the Hardware Developer program
  • Identify or purchase an Extended Validation (EV) certificate
  • Download and install the Windows Driver Kit (WDK)
  • Create the CAB file that will be submitted for approval. The CAB file includes the driver itself, driver INF, symbol file, and catalog files.
  • Sign the CAB file with the EV certificate
  • Submit the EV-signed CAB via the hardware dashboard
  • Microsoft will sign the driver
  • Download the signed driver from the hardware dashboard
  • Validate and test the signed driver

Moreover, through this program, code signed by Microsoft is automatically trusted by many security platforms. Therefore, there is a high value to being able to sign a kernel-mode driver by Microsoft so that it can be used by a malicious campaign.

To date, Mandiant has continuously observed threat actors assuming the role of code-signing certificates through the use of compromised or stolen certificates.

Security Software Termination Toolkit

UNC3944 has been identified by Mandiant as utilizing malware that has been signed through the authorization signing process. Since at least May 2022, UNC3944 has been an active group of threat actors that are motivated by financial gain.

As early as August 2022, UNC3944 has already been observed to have deployed both of these elements:-

Ransomware and SIM Swapping is Linked

Several different threat actors have been using the toolkit that the three companies have seen. In an incident response engagement, Sophos’ Rapid Response team ended an attack before hackers were able to distribute a final payload to computer systems.

A variant of this malware was previously used in the Cuba ransomware operation, according to Sophos. The SentinelOne security experts have also noticed attacks against the following entities using this Microsoft-signed toolkit:- 

  • Telecommunication
  • BPO
  • MSSP
  • Financial services businesses

The Hive Ransomware operation used it in one particular case in which it was used against a medical firm as part of its attack. Moreover, there are many legitimate binaries that use this Microsoft certificate as part of the attestation program.

A new security update was released by Microsoft recently to revoke certificates used by malicious files. In addition, it suspends the accounts as well that were used to present the signed drivers.

The company has not yet revealed how malicious drivers managed to circumvent the review process in the first place.

Penetration Testing As a Service – Download Red Team & Blue Team Workspace

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Understanding the Implications & Guarding Privacy- Axios Security Group
News

Understanding the Implications & Guarding Privacy- Axios Security Group

Hackers Actively Using Pupy RAT to Attack Linux Systems
News

Hackers Actively Using Pupy RAT to Attack Linux Systems

Buckle Up_ BEC and VEC Attacks Target Automotive Industry
News

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen
News

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems
News

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide
News

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

What Security Leaders Need to Know
News

What Security Leaders Need to Know

Iran launched a Cyberattack Against Critical Infrastructure in Israel
News

Iran launched a Cyberattack Against Critical Infrastructure in Israel

PuTTY Client Vulnerability Lets Attackers Recover Private Keys
News

PuTTY Client Vulnerability Lets Attackers Recover Private Keys

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

PoC Released For Critical Zero-Click Windows Vulnerability

PoC Released For Critical Zero-Click Windows Vulnerability

Developer Of Hive RAT Arrested By Authorities

Developer Of Hive RAT Arrested By Authorities

DuckDuckGo Launches Privacy Pro : 3-In-1 Service With VPN

DuckDuckGo Launches Privacy Pro : 3-In-1 Service With VPN

Palo Alto Networks PAN-OS Zero-day Under Active Attack

Palo Alto Networks PAN-OS Zero-day Under Active Attack

Match Systems publishes report on the consequences of CBDC implementation

Match Systems publishes report on the consequences of CBDC implementation

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.