Digitally-Signed Rootkits are Back – A Look at FiveSys and Companions

Discussion in 'malware problems & news' started by guest, Oct 21, 2021.

  1. guest

    guest Guest

    FiveSys Rootkit Abuses Microsoft-Issued Digital Signature
    October 21, 2021
    https://www.securityweek.com/fivesys-rootkit-abuses-microsoft-issued-digital-signature
    Bitdefender: Digitally-Signed Rootkits are Back – A Look at FiveSys and Companions
    (PDF): https://www.bitdefender.com/files/News/CaseStudies/study/405/Bitdefender-DT-Whitepaper-Fivesys-creat5699-en-EN.pdf
     
  2. Floyd 57

    Floyd 57 Registered Member

    Joined:
    Mar 17, 2017
    Posts:
    1,296
    Location:
    Europe
    Good thing @cruelsister added WV to her defense arsenal, as comodo would miss this (I think?). But I wonder if WV can catch it, without signatures that is
     
  3. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,549
    Location:
    U.S.A. (South)
    Good point. And herein enters the return of the infamous rootkit(s) again. Because once success sets in, duplicates are certain to follow.
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    The defence is quite simple, simply don't allow driver loading from untrusted apps. That's what I told you in another topic, with a tool like SpyShelter you can control app behavior, similar to the permission system in Android and iOS, only way more advanced. I have been using HIPS since 2004, I started with Process Guard then System Safety Monitor and Neoava Guard and now SS.

    The problem with Windows is that once some app has managed to load a malicious driver, there is no easy way to block malicious behavior anymore. And that's what makes rootkits so dangerous. So that's why M$ decided to implement PatchGuard in Windows Vista, this will at least prevent rootkits from messing around with the Windows kernel, but they still got plenty of other capabilities.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.