• Old certificate, new signature: Open-source tools forge signature timestamps..

    Home » Forums » Cyber Security Information and Advisories » Cyber Security for Business users » Old certificate, new signature: Open-source tools forge signature timestamps..

    Author
    Topic
    #2572972

    Old certificate, new signature: Open-source tools forge signature timestamps on Windows drivers

    Cisco Talos has observed threat actors taking advantage of a Windows policy loophole that allows the signing and loading of cross-signed kernel mode drivers with signature timestamp prior to July 29, 2015.

    Actors are leveraging multiple open-source tools that alter the signing date of kernel mode drivers to load malicious and unverified drivers signed with expired certificates.

    We have observed over a dozen code signing certificates with keys and passwords contained in a PFX file hosted on GitHub used in conjunction with these open source tools.

    The majority of drivers we identified that contained a language code in their metadata have the Simplified Chinese language code, suggesting the actors using these tools are frequently used by native Chinese speakers.

    Cisco Talos has further identified an instance of one of these open-source tools being used to re-sign cracked drivers to bypass digital rights management (DRM).

    We have released a second blog post alongside this one demonstrating real-world abuse of this loophole by an undocumented malicious driver named RedDriver

    1 user thanked author for this post.
    Viewing 2 reply threads
    Author
    Replies
    • #2572985

      During the research phase for this blog post we reached out to Microsoft to notify them of our findings. In response, Microsoft has blocked all certificates discussed in this blog and has released an advisory. We would like to thank the Microsoft team for their assistance and cooperation in mitigating this threat.

      Microsoft, in response to our notification, has blocked all certificates discussed in this blog post. Please refer to the advisory published by Microsoft for further information on their response.

      Microsoft has released Window Security updates (see Security Updates Table) [11 JUL 2023 Security Updates] that untrust drivers and driver signing certificates for the impacted files and has suspended the partners’ seller accounts. Additionally, Microsoft has implemented blocking detections (Microsoft Defender 1.391.3822.0 and newer) to help protect customers from legitimately signed drivers that have been used maliciously in post-exploit activity.

      Recommended Actions:

      Microsoft recommends that all customers install the latest Windows updates and ensure their anti-virus and endpoint detection products are up to date with the latest signatures and are enabled to prevent these attacks.

      How do I determine if any drivers are affected that were installed prior to the available detections were implemented?

      Offline scans will be required to detect malicious drivers which might have been installed prior to March 2, 2023, when new Microsoft detections were implemented. For more information see Remove malware from your Windows PC.

      ADV230001 Guidance on Microsoft Signed Drivers Being Used Maliciously

      • #2572990

        This has all been dealt with via MS Defender v1.391.3822.0 together with the July Cumulative update.
        What of those that don’t use MS Defender and are waiting for July update clearance?

        Windows - commercial by definition and now function...
        • #2572994

          This has all been dealt with via MS Defender v1.391.3822.0 together with the July Cumulative update.

          That Defender update was released five days ago.

          What of those that don’t use MS Defender and are waiting for July update clearance?

          Ask AV vendor if they should just feel lucky?

        • #2573151

          At this time the attacks have been seen going after Chinese targets – for this attack anyway.

          Only install anything from trusted sources.

          Only open emails from trusted senders.

          As always remember that if you have a backup even IF you install updates earlier than when I say to – should something happen you can roll back.  That is always the ultimate protection.

          Susan Bradley Patch Lady/Prudent patcher

          1 user thanked author for this post.
    • #2573054

      Guidance on Microsoft Signed Drivers Being Used Maliciously

      ..Details:

      Microsoft was informed that drivers certified by Microsoft’s Windows Hardware Developer Program were being used maliciously in post-exploitation activity. In these attacks, the attacker had already gained administrative privileges on compromised systems prior to use of the drivers…

      [Moderator edit] trimmed quote to reduce potential copyright issues

      • This reply was modified 1 year, 11 months ago by Alex5723.
      • This reply was modified 1 year, 11 months ago by b.
      • This reply was modified 1 year, 11 months ago by b.
    • #2573081

      This has all been dealt with via MS Defender v1.391.3822.0 together with the July Cumulative update.

      That Defender update was released five days ago.

      pre-emptive mitigations.

      What of those that don’t use MS Defender and are waiting for July update clearance?

      Ask AV vendor if they should just feel lucky?

      that’s encouraging…

      Windows - commercial by definition and now function...
    Viewing 2 reply threads
    Reply To: Old certificate, new signature: Open-source tools forge signature timestamps..

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: