Security News > 2022 > December > Malicious Microsoft-signed Windows drivers wielded in cyberattacks

Malicious Microsoft-signed Windows drivers wielded in cyberattacks
2022-12-14 23:24

Microsoft says it has suspended several third-party developer accounts that submitted malicious Windows drivers for the IT giant to digitally sign so that the code could be used in cyberattacks.

These moves come after eggheads at Google-owned Mandiant, SentinelOne, and Sophos told Microsoft in October that multiple cybercrime gangs were using malicious third-party-developed Microsoft-signed kernel-mode hardware drivers to help spread ransomware.

Essentially, these crews created developer accounts with Microsoft to submit malicious drivers to the software goliath's Windows Hardware Developer Program.

"In these attacks, the attacker had already gained administrative privileges on compromised systems prior to use of the drivers," Microsoft wrote, adding that its "Investigation revealed that several developer accounts for the Microsoft Partner Center were engaged in submitting malicious drivers to obtain a Microsoft signature."

Microsoft has required kernel-mode drivers to be signed through the Windows Hardware Developer Program since Windows 10.

Dubbed the Bring Your Own Vulnerable Driver approach, a miscreant with sufficient privileges on a system loads a legit, non-malicious signed Windows driver known to contain vulnerabilities that can be exploited to switch off features and fully compromise the PC. Alternatively, the miscreant can load a signed driver specifically designed for evil.


News URL

https://go.theregister.com/feed/www.theregister.com/2022/12/14/microsoft_drivers_ransomware_attacks/