Posted on 06/30/2021 8:20:33 AM PDT by ProgressingAmerica
Ever since the introduction of Windows Vista in early 2007, Microsoft has enforced the rule that Windows drivers must carry digital signatures by default. Any software that runs in kernel mode, in fact, has to be signed by the company. This is a security measure that should prevent malicious software from digging its claws in too deep. However, what happens when Microsoft gives its blessing to a rootkit?
That's what happened a few months ago and was just now discovered thanks to G DATA Software security analyst Karsten Hahn. Initially, the company received a false-positive alert from a driver that was signed by Microsoft. After a lot of investigation into the matter, it turns out that the positive was valid. A driver signed by Microsoft was redirecting traffic bound for hundreds of IP addresses to a server in China.
(Excerpt) Read more at hothardware.com ...
Unexpected.
Sell MSFT
Windows the Poop
Didn’t John McAfee give a warning about Chinese agents slipping backdoors into OS code as legit employees?
Execute Gates for Treason...?
I’m not sure, but I know that my Linux doesn’t do this.
Apple is in bed with the Chicoms too, as is Google.
“The driver maker, Ningbo Zhuo Zhi Innovation Network Technology, was working with Microsoft to study and patch any known security holes...”
https://www.engadget.com/microsoft-signed-netfilter-malware-driver-164228266.html
bookmark
And puppet man is not going to stop this, because guess who is pulling his strings?
I’m absolutely SHOCKED!!!
Gates hasn’t had anything to do with Microsoft for years.
No apple product call china or any one else - Apple is about protecting your privacy - Google is about selling your data to anyone to make money. Linux and Apple run on the same underlying Unix code.
I’m calling on my Huawei phone and Huawei network to complain about this.
Perfect!
Anybody can get an EV driver signing cert from Microsoft just like anybody can get an EV cert from DigiCert or GoDaddy for a web site. All the EV cert does is verify the legal cororate identity of the driver vendor. That’s it.
Microsoft will revoke the cert and blacklist the vendor just like DigiCert revoking a cert from a bad website.
All Windows Hardware Quality Labs (WHQL) does is automatic testing to ensure driver stability, compatibility, and basic functionality. It is easy for a bad guy to evade testing by not revealing the bad behavior during automatic testing.
This is exactly the same vetting that Google does for Android and Apple does for iPhones.
Microsoft does not ‘allow’ bad software any more than Android or Apple do. The news article is FUD.
A feature, not a bug.
John McAfee
@officialmcafee
Iconoclast.
Lover of women, adventure and mystery.
Founder of McAfee Anti-virus
14K Following
1.1M Followers
Tweet
See new Tweets
Tweet
John McAfee @officialmcafee
· Jun 3
In my last tweet I explained the virtual impossibility of identifying backdoors or other malicious code developed by a foreign agent in the guise of a software engineer.
I will now explain the process of embedding these agents into targeted companies.
https://twitter.com/officialmcafee/status/1400482858741948424
Just keep giving MS those dollars so they can keep expanding their “business as usual”.
thank you Linus Torvalds.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.