Researchers Discover Microsoft-Signed FiveSys Rootkit in the Wild

Cyber Security

Products You May Like

A newly identified rootkit has been found with a valid digital signature issued by Microsoft that’s used to proxy traffic to internet addresses of interest to the attackers for over a year targeting online gamers in China.

Bucharest-headquartered cybersecurity technology company Bitdefender named the malware “FiveSys,” calling out its possible credential theft and in-game-purchase hijacking motives. The Windows maker has since revoked the signature following responsible disclosure.

Automatic GitHub Backups

“Digital signatures are a way of establishing trust,” Bitdefender researchers said in a white paper, adding “a valid digital signature helps the attacker navigate around the operating system’s restrictions on loading third-party modules into the kernel. Once loaded, the rootkit allows its creators to gain virtually unlimited privileges.”

Rootkits are both evasive and stealthy as they offer threat actors an entrenched foothold onto victims’ systems and conceal their malicious actions from the operating system (OS) as well as from anti-malware solutions, enabling the adversaries to maintain extended persistence even after OS reinstallation or replacement of the hard drive.

FiveSys Rootkit

In the case of FiveSys, the malware’s main objective is to redirect and route internet traffic for both HTTP and HTTPS connections to malicious domains under the attacker’s control via a custom proxy server. The rootkit operators also employ the practice of blocking the loading of drivers from competing groups using a signature blocklist of stolen certificates to prevent them from taking control of the machine.

“To make potential takedown attempts more difficult, the rootkit comes with a built-in list of 300 domains on the ‘.xyz’ [top-level domain],” the researchers noted. “They seem to be generated randomly and stored in an encrypted form inside the binary.”

The development marks the second time wherein malicious drivers with valid digital signatures issued by Microsoft through the Windows Hardware Quality Labs (WHQL) signing process have slipped through the cracks. In late June 2021, German cybersecurity company G Data disclosed details of another rootkit dubbed “Netfilter” (and tracked by Microsoft as “Retliften”), which, like FiveSys, also aimed at gamers in China.

Products You May Like

Articles You May Like

Aidan Gomez helped invent the transformer at Google. At Cohere, he’s now taking AI to businesses
Samsung One UI 6 Watch Beta for Select Galaxy Watch 5, Galaxy Watch 4 Models Reportedly Released
OVHcloud Hit with Record 840 Million PPS DDoS Attack Using MikroTik Routers
Polyfill[.]io Attack Impacts Over 380,000 Hosts, Including Major Companies
Google Pixel 9 Alleged Hands-on Video Shows Off Pink Colour Variant With Rounded Corners

Leave a Reply

Your email address will not be published. Required fields are marked *