Hackers Have Been Using a Rootkit That Somehow Got Microsoft's Digital Seal of Approval

Digital signatures are an industry-standard means of defending against malicious programs, but a recently spotted rootkit figured out how to outsmart them.

We may earn a commission from links on this page.
Image for article titled Hackers Have Been Using a Rootkit That Somehow Got Microsoft's Digital Seal of Approval
Photo: Drew Angerer (Getty Images)

A recent report by cybersecurity firm Bitdefender shows that e-criminals have been using a particular rootkit, dubbed “FiveSys,” that bafflingly received a digital signature from Microsoft.

The malicious program apparently allowed attackers “virtually unlimited privileges” on affected systems and was used by hackers to target online gamers for credential theft and in-game purchase hijacking. Researchers say it’s definitely possible that “FiveSys” could be redirected towards other kinds of data theft, too.

Advertisement

Rootkits are malicious programs designed to allow criminals prolonged access to a particular server or device. With a rootkit, an attacker can remain embedded in a particular computer, unbeknownst to the device’s operating system or its anti-malware defenses, for long periods of time. They also typically give attackers high levels of control over a particular system or device.

Advertisement

Digital signatures, meanwhile, are basically algorithms that companies and other large organizations use for security purposes. Signatures create a “virtual fingerprint” connected to specific entities that are meant to verify their trustworthiness. Microsoft utilizes a digital signing process as a security measure meant to rebuff programs that do not appear to have come from trusted sources.

Advertisement

However, the company’s security protocols appear to have been no match for the “FiveSys” rootkit and its cybercriminal handlers—which managed to get their malicious program signed with Microsoft’s digital rubber stamp of approval. It’s not totally clear how they did that.

“Chances is that it was submitted for validation and somehow it got through the checks,” Bogdan Botezatu, director of threat research and reporting, told ZDNet. “While the digital signing requirements detect and stop most of the rootkits, they are not foolproof.”

Advertisement

After being contacted by Bitdefender, Microsoft subsequently revoked the rootkit’s signature, meaning the program will no longer have access to systems. When reached for comment, a Microsoft spokesperson provided Gizmodo with the following statement: “We have built-in detections in place and we continue to investigate and take the necessary steps to help protect customers.”

More on security and privacy from G/O Media’s partner:
- Best VPN Providers
- Low Cost VPN Providers
- NordVPN - In Depth Review
- ExpressVPN - In Depth Review

Gizmodo is not involved in creating these articles but may receive a commission from purchases through its content.

Advertisement