Guru3D.com
  • HOME
  • NEWS
    • Channels
    • Archive
  • DOWNLOADS
    • New Downloads
    • Categories
    • Archive
  • GAME REVIEWS
  • ARTICLES
    • Rig of the Month
    • Join ROTM
    • PC Buyers Guide
    • Guru3D VGA Charts
    • Editorials
    • Dated content
  • HARDWARE REVIEWS
    • Videocards
    • Processors
    • Audio
    • Motherboards
    • Memory and Flash
    • SSD Storage
    • Chassis
    • Media Players
    • Power Supply
    • Laptop and Mobile
    • Smartphone
    • Networking
    • Keyboard Mouse
    • Cooling
    • Search articles
    • Knowledgebase
    • More Categories
  • FORUMS
  • NEWSLETTER
  • CONTACT

New Reviews
Intel Core i5 11400F processor review
Corsair Vengeance RGB Pro SL 3600 MHz 32GB review
ASRock Z590 Extreme review
Gigabyte Radeon RX 6700 XT Gaming OC review
Corsair K70 RGB TKL keyboard review
Corsair RM650x (2021) power supply review
be quiet! Silent Loop 2 280mm review
Corsair K55 RGB PRO XT keyboard review
Guru3D Rig of the Month - March 2021
Intel Core i9-11900K processor review

New Downloads
NVIDIA Unreal Engine 4 RTX & DLSS Demo
Intel HD graphics Driver Download Version: DCH 27.20.100.9466
CPU-Z download v1.96
GeForce 466.11 WHQL driver download
Guru3D RTSS Rivatuner Statistics Server Download 7.3.2 Beta 2
MSI Afterburner 4.6.4 Beta 2 Download
HWiNFO Download v7.02
Corsair Utility Engine Download (iCUE) Download v4.9.350
Quake II RTX Download 1.5.0
GeForce 465.89 WHQL driver download


New Forum Topics
AMD Epyc 7763 CPUs break Cinebench world record, crushes Intel Xeon in performance MSI discontinues GeForce RTX 3080 Gaming X TRIO, etailers cancel pre-orders RTSS and NV V3 frame rate limiter = artifacts, flicker? GeForce 466.11 WHQL driver download & discussion Playseat teams up with PUMA and offers red gaming chair that moves along with you Display Smart Access Memory Status Info On Home Page of Adreneline? Homeworld 3 - First in-engine video AMD Radeon Adrenalin Edition 21.3.2 driver download & discussion RAIJINTEK releases ANTILA D5 EVO RBW-15 ARGB reservoir integrated pump Apexgaming G3 Is an interesting looking chassis




Guru3D.com » News » Vulnerable yet digitally signed Gigabyte driver actively being exploited - RobbinHood Randomware

Vulnerable yet digitally signed Gigabyte driver actively being exploited - RobbinHood Randomware

by Hilbert Hagedoorn on: 02/10/2020 09:12 AM | source: sophos | 8 comment(s)
Vulnerable yet digitally signed Gigabyte driver actively being exploited - RobbinHood Randomware

There is a form of ransomware exploiting a vulnerable Gigabyte driver. since the driver is digitally signed it becomes easy to install. The malware installs a second driver that disables security software, after which the encryption begins.

The signed driver, part of a now-deprecated software package published by Taiwan-based motherboard manufacturer Gigabyte, has a known vulnerability, tracked as CVE-2018-19320. The problem is a kernel driver called gdrv .sys that is prone to escalation privilege . Although the driver is no longer being used, it is still digitally approved by Versign, why this is the case is not yet known. Thanks to this certificate, the driver can still be installed, after which Windows driver signature verification can be disabled.

The vulnerability, published along with proof-of-concept code in 2018 and widely reported at the time, was disclaimed by the company, who told the researcher who tried to report the bug that “its products are not affected by the reported vulnerabilities.” The company later recanted, and has discontinued using the vulnerable driver, but it still exists, and it apparently remains a threat. Verisign, whose code signing mechanism was used to digitally sign the driver, has not revoked the signing certificate, so the Authenticode signature remains valid. In this attack scenario, the criminals have used the Gigabyte driver as a wedge so they could load a second, unsigned driver into Windows. This second driver then goes to great lengths to kill processes and files belonging to endpoint security products, bypassing tamper protection, to enable the ransomware to attack without interference. 

  

Known Affected Software Configurations

 cpe:2.3:a:gigabyte:aorus_graphics_engine:*:*:*:*:*:*:*:*
     Show Matching CPE(s) 
Up to (including)
1.33
 cpe:2.3:a:gigabyte:app_center:*:*:*:*:*:*:*:*
     Show Matching CPE(s) 
Up to (including)
1.05.21
 cpe:2.3:a:gigabyte:oc_guru_ii:2.08:*:*:*:*:*:*:*
     Show Matching CPE(s) 
 cpe:2.3:a:gigabyte:xtreme_gaming_engine:*:*:*:*:*:*:*:*
     Show Matching CPE(s) 
Up to (including)
1.25

The vulnerability is active throughout the entire software suite

 

It is the first time we have observed ransomware shipping a trusted, signed (yet vulnerable) third party driver to patch the Windows kernel in-memory, load their own unsigned malicious driver, and take out security applications from kernel space. The ransomware that was being installed in both instances calls itself RobbinHood.

Gigabyte earlier on Gigabyte claimed its products were not affected.

Read more on sophos.



Vulnerable yet digitally signed Gigabyte driver actively being exploited - RobbinHood Randomware Vulnerable yet digitally signed Gigabyte driver actively being exploited - RobbinHood Randomware




« Overclocker gets AMD Threadripper 3990X Running 5.3 GHZ on all 64-core (LN2) · Vulnerable yet digitally signed Gigabyte driver actively being exploited - RobbinHood Randomware · Grab for free: Sims 4 Standard Edition is free on Origin »

Related Stories

New CacheOut Speculative Execution Vulnerability Hits Intel Processors - 01/28/2020 04:34 PM
Intel is not spared when it comes to the number of vulnerabilities that keep hitting their processors. The latest one is CacheOut, a new speculative execution attack that is capable of leaking data fr...

Microsoft patches crypt32.dll vulnerability that allows certificate spoofing - 01/15/2020 09:39 AM
Yesterday we shared news about a big potential vulnerability with a Microsoft Windows component known as crypt32.dll, a Windows module that Microsoft says handles “certificate and cryptographic mes...

Rumor: Microsoft might share information on extremely critical vulnerability later today - 01/14/2020 03:53 PM
It's tagged as a rumor, but you can rest assured it'll become a fact. Keep an eye out on your Tuesday patches, and apply them. According to Krebs On Security, Microsoft is about to release an extre...

Intel will be addressing 77 security vulnerabilities this month - 11/13/2019 02:53 PM
Followed by the news of the Zombieload v2 attack news today, Intel yesterday posted a security blog, in which they state to close 77 vulnerabilities in November....

Epic Games Store Vulnerability, Borderlands 3 DRM Concerns - 11/05/2019 08:59 AM
A new vulnerability was spotted in the Epic Games Store system. Willian Worrall of CCN said that this security allows users to work around the system’s security to access a game without owning it....


2 pages 1 2


Deleted member 271771
Unregistered



#5759138 Posted on: 02/10/2020 10:57 PM
A toll is a toll, and a roll is a roll. If we don't take no tolls then we don't eat no rolls.

Ihtiandr
Junior Member



Posts: 6
Joined: 2015-07-31

#5759166 Posted on: 02/11/2020 01:53 AM
I am sorry, but wasn't the xtreme engine updated to 1.26 in early 2019?

rl66
Senior Member



Posts: 2829
Joined: 2007-05-31

#5759204 Posted on: 02/11/2020 06:13 AM
it's remind a scene from monty python's graal comedy "hoooo i told you, i told you but you don't listened"...
*edit* i found it


And about Battleyes, it is that the problem IS Battleyes...
On each game when you remove it to play in local (i know it's bad... but legal if you own the game) you solve most bugs, astonishing to offer a protection like that in 2020!!!

2 pages 1 2


Post New Comment
Click here to post a comment for this news story on the message forum.


Guru3D.com © 2021