Fake Ad Blocker Capable of Running Arbitrary code on Windows Systems

0
12كيلو بايت

ESET specialists have discovered an advertising malware that is distributed under the guise of an ad blocker. The malware silently loads a kernel driver component, allowing attackers to run arbitrary code with elevated privileges on Windows hosts.

The malware, dubbed HotPage (from the HotPage.exe installer of the same name), has been active since the end of 2023. The exact distribution method of the malware installer is unknown, but it appears to be being advertised as a security solution for internet cafes designed to improve web browsing and block ads.

 
The researchers say that this installer deploys a driver capable of injecting code into remote processes, as well as two libraries capable of intercepting and interfering with network traffic from browsers.

"As a result, the malware is capable of modifying and replacing the content of the requested page, redirecting the user to another page, or opening a new page in a new tab based on certain criteria," the experts write.
In addition to its ability to intercept and filter traffic to display unwanted ads (mainly related to games), the malware is designed to collect and steal system information. The collected data is transmitted to a remote server associated with the Chinese company Hubei Dunwang Network Technology Co., Ltd (湖北盾网网络科技有限公司).

This is done by using a driver whose primary purpose is to inject libraries into browser applications and modify the process of running them (for the sake of spoofing URLs and redirecting browsers' home pages to a specific URL specified in the settings).

Moreover, the lack of an ACL (Access Control List) for this driver allowed attackers with an unprivileged account to gain elevated privileges and run code with System-level privileges.

"This kernel component inadvertently opens the door to threats related to the execution of code with the highest level of privilege in the Windows operating system: the System account. Due to incorrectly implemented restrictions of this kernel component, an attacker with an unprivileged account could gain elevated privileges and run code on behalf of the NT AUTHORITY\System account," ESET warns.
Also, the mentioned driver is notable for the fact that it is signed by Microsoft. It is assumed that the Chinese company was able to pass Microsoft checks and received an Extended Verification (EV) certificate. It was removed from the Windows Server Catalog only on May 1, 2024, after a warning from researchers.

البحث
الأقسام
إقرأ المزيد
Business
Product Reviews and Ratings: "How do I leave a review?" or "Where can I read product feedback?"
In today's digital shopping world, product reviews and ratings are essential tools for both...
بواسطة Dacey Rankins 2025-05-29 17:50:54 0 5كيلو بايت
Life Issues
Addicted. (2014)
A gallerist risks her family and flourishing career when she enters into an affair with a...
بواسطة Leonard Pokrovski 2023-05-21 18:12:36 0 29كيلو بايت
Satire
Top 16 best TV series of 2022
Paradoxically, this terrible war year was very rich in good TV shows. I picked you eight of the...
بواسطة FWhoop Xelqua 2023-01-02 17:51:46 0 21كيلو بايت
Squash
Exploring the Elegance and Intensity of Squash: A Sport for the Agile and Strategic
Squash, often dubbed the "fastest racket sport," is an exhilarating and demanding game that...
بواسطة Dacey Rankins 2024-07-10 16:23:11 0 16كيلو بايت
Television
CBS WSPA channel 7 western North Carolina and South Carolina, USA.
WSPA-TV, channel 7, is the CBS-affiliated television station for western NorthCarolina and South...
بواسطة Nikolai Pokryshkin 2022-11-07 10:11:27 0 42كيلو بايت
image/svg+xml


BigMoney.VIP Powered by Hosting Pokrov