Vulnerable yet digitally signed Gigabyte driver actively being exploited - RobbinHood Randomware
Click here to post a comment for Vulnerable yet digitally signed Gigabyte driver actively being exploited - RobbinHood Randomware on our message forum
Astyanax
Yep, i absolutely saw this coming.
This file has been used to hack EAC and Battle eye protected games for months
386SX
Verisign should put the cert on their blacklist ... the driver will get invalid, but so does the ransomware which relys on this driver to infect.
Just another example of "I dont think this will raise any issues".
skimike
386SX
Verizon ... you're right about them. I somehow had the name in my mind but completely forgot this story ... 🙂
GlennB
Ihtiandr
I am sorry, but wasn't the xtreme engine updated to 1.26 in early 2019?http://SSMaker.ru/72d80921/http://sss.ssmaker.ru/72d80921.png
rl66
it's remind a scene from monty python's graal comedy "hoooo i told you, i told you but you don't listened"...
*edit* i found it
[youtube=7Q8hAb230OE]
And about Battleyes, it is that the problem IS Battleyes...
On each game when you remove it to play in local (i know it's bad... but legal if you own the game) you solve most bugs, astonishing to offer a protection like that in 2020!!!