Ransomware gang caught using Microsoft-approved drivers to hack targets

Share via:

Security researchers say they have evidence that threat actors affiliated with the Cuba ransomware gang used malicious hardware drivers certified by Microsoft during a recent attempted ransomware attack.

Drivers — software that enables operating systems and apps to access and communicate with hardware devices — require highly privileged access to the operating system and its data, which is why Windows requires drivers to bear an approved cryptographic signature before they can be loaded. Cybercriminals have long exploited these drivers, frequently employing a “bring your own vulnerable driver” strategy in which hackers exploit vulnerabilities discovered within an existing Windows driver from a legitimate software publisher.

Disclaimer

We strive to uphold the highest ethical standards in all of our reporting and coverage. We StartupNews.fyi want to be transparent with our readers about any potential conflicts of interest that may arise in our work. It’s possible that some of the investors we feature may have connections to other businesses, including competitors or companies we write about. However, we want to assure our readers that this will not have any impact on the integrity or impartiality of our reporting. We are committed to delivering accurate, unbiased news and information to our audience, and we will continue to uphold our ethics and principles in all of our work. Thank you for your trust and support.

Popular

More Like this

Ransomware gang caught using Microsoft-approved drivers to hack targets

Security researchers say they have evidence that threat actors affiliated with the Cuba ransomware gang used malicious hardware drivers certified by Microsoft during a recent attempted ransomware attack.

Drivers — software that enables operating systems and apps to access and communicate with hardware devices — require highly privileged access to the operating system and its data, which is why Windows requires drivers to bear an approved cryptographic signature before they can be loaded. Cybercriminals have long exploited these drivers, frequently employing a “bring your own vulnerable driver” strategy in which hackers exploit vulnerabilities discovered within an existing Windows driver from a legitimate software publisher.

Disclaimer

We strive to uphold the highest ethical standards in all of our reporting and coverage. We StartupNews.fyi want to be transparent with our readers about any potential conflicts of interest that may arise in our work. It’s possible that some of the investors we feature may have connections to other businesses, including competitors or companies we write about. However, we want to assure our readers that this will not have any impact on the integrity or impartiality of our reporting. We are committed to delivering accurate, unbiased news and information to our audience, and we will continue to uphold our ethics and principles in all of our work. Thank you for your trust and support.

Website Upgradation is going on for any glitch kindly connect at office@startupnews.fyi

More like this

Researchers suggest OpenAI trained AI models on paywalled O’Reilly...

OpenAI has been accused by many parties of...

Founder of TWO AI Pranav Mistry urges India to...

India should stop playing catch-up with the West...

A(I) rich harvest: Maharashtra farmer cuts costs, boosts yield...

Sanjeev Mane, a sugarcane farmer in Maharashtra’s Sangli...

Popular

Upcoming Events

SEA logistics sees M&A, greentech action amid funding lull

While the logistics sector continues to grapple with...

NVIDIA Making Radical Changes to CUDA After Nearly 20...

NVIDIA announced it’s making wholesale changes to the...

Data is Like Air and AI is the Breath...

New Delhi , April 1: In the digital...
afg afg afg afg afg afg ADGF ADGF ADGF ADGF ADGF ADGF ADGF ERQW DAS VBXZC ERQW DAS ERQW DAS VBXZC ERQW DAS ERQW DAS VBXZC ERQW DAS ERQW DAS VBXZC ERQW DAS ERQW DAS VBXZC ERQW DAS ERQW DAS VBXZC ERQW DAS hack instagram account hack instagram account hack instagram account hack instagram account hack instagram account hack instagram account hack instagram account hack instagram account hack instagram account hack instagram account