Posted on 06/30/2021 8:20:33 AM PDT by ProgressingAmerica
Ever since the introduction of Windows Vista in early 2007, Microsoft has enforced the rule that Windows drivers must carry digital signatures by default. Any software that runs in kernel mode, in fact, has to be signed by the company. This is a security measure that should prevent malicious software from digging its claws in too deep. However, what happens when Microsoft gives its blessing to a rootkit?
That's what happened a few months ago and was just now discovered thanks to G DATA Software security analyst Karsten Hahn. Initially, the company received a false-positive alert from a driver that was signed by Microsoft. After a lot of investigation into the matter, it turns out that the positive was valid. A driver signed by Microsoft was redirecting traffic bound for hundreds of IP addresses to a server in China.
(Excerpt) Read more at hothardware.com ...
Tanks for the post; ping. MAGA
Likewise. We gotta stick together against what big tech is doing to us.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.