MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
cyber
Search

Traffic-Redirecting Rootkit Somehow Got a Microsoft-issued Digital Signature

Sunday October 24, 2021. 05:34 PM , from Slashdot
Cybersecurity researchers at Bitdefender say cyber criminals have been using a rootkit named FiveSys 'that somehow made its way through the driver certification process to be digitally signed by Microsoft,' reports ZDNet:

The valid signature enables the rootkit — malicious software that allows cyber criminals to access and control infected computers — to appear valid and bypass operating systems restrictions and gain what researchers describe as 'virtually unlimited privileges'. It's known for cyber criminals to use stolen digital certificates, but in this case, they've managed to acquire a valid one.

It's a still a mystery how cyber criminals were able to get hold of a valid certificate. 'Chances is that it was submitted for validation and somehow it got through the checks. While the digital signing requirements detect and stop most of the rootkits, they are not foolproof,' Bogdan Botezatu, director of threat research and reporting at Bitdefender told ZDNet. It's uncertain how FiveSys is actually distributed, but researchers believe that it's bundled with cracked software downloads.

Once installed, FiveSys rootkit redirects internet traffic to a proxy server, which it does by installing a custom root certificate so that the browser won't warn about the unknown identity of the proxy. This also blocks other malware from writing on the drivers, in what's likely an attempt to stop other cyber criminals from taking advantage of the compromised system. Analysis of attacks shows that FiveSys rootkit is being used in cyber attacks targeting online gamers, with the aim of stealing login credentials and the ability to hijack in-game purchases. The popularity of online games means that a lot of money can be involved — not only because banking details are connected to accounts, but also because prestigious virtual items can fetch large sums of money when sold, meaning attackers could exploit access to steal and sell these items.

Currently, the attacks are targeting gamers in China — which is where researchers also believe that the attackers are operating from.

'The campaign started slowly in late 2020, but massively expanded during the course of summer 2021,' ZDNet adds.

'The campaign is now blocked after researchers at Bitdefender flagged the abuse of digital trust to Microsoft, which revoked the signature.'

Read more of this story at Slashdot.
rss.slashdot.org/~r/Slashdot/slashdot/~3/KJ1r8rFgOFg/traffic-redirecting-rootkit-somehow-got-a-micro...
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Current Date
Mar, Thu 28 - 10:16 CET