HomeNewsHackers can now make Malware untraceable on Windows, Google warns

Hackers can now make Malware untraceable on Windows, Google warns

-

We independently research, test, review, and recommend the best products—learn more about our process. If you buy something through our links, we may earn a commission. learn more

Last Updated on 22/11/2021 by Sanskriti

Yet another technique has been revealed by the researchers through which the hackers can use flawed digital signatures in malware payloads to escape detection.

Neel Mehta, Google’s threat analysis group said in a report published on Thursday, “Attackers created malformed code signatures that are treated as valid by Windows but are not able to be decoded or checked by OpenSSL code — which is used in a number of security scanning products.”

The new technique was discovered to be utilized by the OpenSUpdater family of undesirable software, which is renowned for downloading and installing additional dubious applications on infected PCs. The majority of the campaign’s targets are individuals in the United States who are prone to downloading cracked games and other grey-area products.

The information comes from a series of OpenSUpdater samples that have been uploaded to VirusTotal since at least mid-August.

Hackers can now make Malware untraceable on Windows, Google warns 1

Image Source-n3x0.com

Not only are the artifacts signed with an invalid leaf X.509 certificate that was edited in such a way that the ‘parameters’ element of the Signature Algorithm field included an End-of-Content (EOC) marker instead of a NULL tag, but they’re also signed with an invalid leaf X.509 certificate that was edited in such a way that the ‘parameters’ element of the Signature Algorithm field included an End-of.

Despite the fact that such encodings are rejected as incorrect by-products when using OpenSSL to get signature information, checks on Windows systems would allow the file to be executed without any security alerts.

“This is the first time TAG has observed actors using this technique to evade detection while preserving a valid digital signature on PE files,” Mehta said.

“Code signatures on Windows executables provide guarantees about the integrity of a signed executable, as well as information about the identity of the signer. Attackers who are able to obscure their identity in signatures without affecting the integrity of the signature can avoid detection longer and extend the lifetime of their code-signing certificates to infect more systems.”

Sanskriti
Sanskriti
Sanskriti loves technology in general and ensures to keep TheDigitalHacker audience aware of the latest trends, updates, and data breaches.
- Advertisment -

Must Read

edge-ai

Challenges and Opportunities in Deploying AI Solutions in Edge Computing Environments

0
Edge AI is a ground-breaking new paradigm that has the potential to completely change how companies run. Organizations can seize new chances for creativity,...