Hackers exploit Windows policy loophole for malicious kernel access

1 min read
Source: BleepingComputer
Hackers exploit Windows policy loophole for malicious kernel access
Photo: BleepingComputer
TL;DR Summary

Chinese hackers have been exploiting a Windows policy loophole to sign and load malicious kernel mode drivers on breached systems. By altering the signing date of drivers before July 29th, 2015, using tools like 'HookSignTool' and 'FuckCertVerify,' threat actors can use older, leaked, non-revoked certificates to escalate privileges and evade detection. Microsoft has revoked associated certificates and suspended developer accounts, but the risk remains as further certificates may still be exposed or stolen.

Share this article

Reading Insights

Total Reads

0

Unique Readers

0

Time Saved

4 min

vs 5 min read

Condensed

91%

84773 words

Want the full story? Read the original article

Read on BleepingComputer