Posted on 6/30/2021, 8:20:33 AM by ProgressingAmerica
Ever since the introduction of Windows Vista in early 2007, Microsoft has enforced the rule that Windows drivers must carry digital signatures by default. Any software that runs in kernel mode, in fact, has to be signed by the company. This is a security measure that should prevent malicious software from digging its claws in too deep. However, what happens when Microsoft gives its blessing to a rootkit?
That's what happened a few months ago and was just now discovered thanks to G DATA Software security analyst Karsten Hahn. Initially, the company received a false-positive alert from a driver that was signed by Microsoft. After a lot of investigation into the matter, it turns out that the positive was valid. A driver signed by Microsoft was redirecting traffic bound for hundreds of IP addresses to a server in China.
Shocking!
Not.
Microsoft built a special government-approved version of Windows 10 for China
The Next Web ^ | March 28, 2016 | by AMANDA CONNOLLY
https://freerepublic.com/focus/f-chat/3414728/posts
It’s Not Just Google—Microsoft Is Also Up To No Good In China
Great America ^ | August 18th, 2019 | Paul Bradford
https://freerepublic.com/focus/f-chat/3772903/posts
New cyberattacks targeting U.S. elections (Microsoft on Russia, China, Iran)
Microsoft ^ | 09 10 2020 | Tom Burt
https://freerepublic.com/focus/f-news/3882819/posts?page=4
China-Linked Hack Hits Tens of Thousands of U.S. Microsoft Customers
Wall Street Journal ^ | 03/06/2021 | Robert McMillan and Dustin Volz
https://freerepublic.com/focus/f-news/3940138/posts
Posted on 6/30/2021, 6:10:31 PM by ransomnote