A driver containing rootkit malware was certified by Microsoft | PC Gamer - groveshemottess81
A driver containing rootkit malware was certified by Microsoft
Microsoft tests drivers in front assigning them a digital certificate that approves them to be installed by default. Somehow, a number one wood titled Netfilter that redirects traffic to an IP in China and installs a origin certificate to the register managed to get in through and through that testing without being detected as malware.
Karsten Hahn, a malware analyst at G Data, found the vindictive driver and notified Microsoft, "WHO promptly added malware signatures to Windows Defender and are now conducting an internal investigation." Microsoft as wel suspended the account that submitted the driver, and is currently going over their previous submissions.
Microsoft's security reception center squad described the malware's bodily process A "limited to the gaming sphere specifically in China" and explained its purpose: "The actor's goal is to use the driver to spoof their geo-location to cheat the system and play from anywhere. The malware enables them to gain ground an reward in games and possibly overwork other players aside compromising their accounts through common tools like keyloggers."
How did this happen? Right now, nobody knows. Windows users are advised, "Thither are nobelium actions customers should take differently follow security department best practices and deploy Antivirus software such as Windows Defender for Endpoint."
Source: https://www.pcgamer.com/a-driver-containing-rootkit-malware-was-certified-by-microsoft/
Posted by: groveshemottess81.blogspot.com

0 Response to "A driver containing rootkit malware was certified by Microsoft | PC Gamer - groveshemottess81"
Post a Comment