Hackers Exploit Windows Policy Loophole to Forge Kernel-Mode Driver Signatures,
A Microsoft Windows policy loophole has been observed being exploited primarily by native Chinese-speaking threat actors to forge signatures on kernel-mode drivers.
« Actors are leveraging multiple open-source tools that alter the signing date of kernel mode drivers to load malicious and unverified drivers signed with expired certificates, » Cisco Talos said in an exhaustive two-part report shared
« Actors are leveraging multiple open-source tools that alter the signing date of kernel mode drivers to load malicious and unverified drivers signed with expired certificates, » Cisco Talos said in an exhaustive two-part report shared
,
A Microsoft Windows policy loophole has been observed being exploited primarily by native Chinese-speaking threat actors to forge signatures on kernel-mode drivers.
« Actors are leveraging multiple open-source tools that alter the signing date of kernel mode drivers to load malicious and unverified drivers signed with expired certificates, » Cisco Talos said in an exhaustive two-part report shared
« Actors are leveraging multiple open-source tools that alter the signing date of kernel mode drivers to load malicious and unverified drivers signed with expired certificates, » Cisco Talos said in an exhaustive two-part report shared
, ,
https://thehackernews.com/2023/07/hackers-exploit-windows-policy-loophole.html