HotPage Adware Disguised as Advert Blocker Installs Malicious Kernel Driver

HotPage Adware Disguised as Advert Blocker Installs Malicious Kernel Driver


Jul 18, 2024NewsroomMalware / Home windows Safety

HotPage Adware Disguised as Advert Blocker Installs Malicious Kernel Driver

Cybersecurity researchers have make clear an adware module that purports to dam adverts and malicious web sites, whereas stealthily offloading a kernel driver element that grants attackers the flexibility to run arbitrary code with elevated permissions on Home windows hosts.

The malware, dubbed HotPage, will get its identify from the eponymous installer (“HotPage.exe”), in response to new findings from ESET, which found the malware in the direction of the tip of 2023.

The installer “deploys a driver able to injecting code into distant processes, and two libraries able to intercepting and tampering with browsers’ community visitors,” ESET researcher Romain Dumont mentioned in a technical evaluation printed in the present day.

“The malware can modify or exchange the contents of a requested web page, redirect the consumer to a different web page, or open a brand new web page in a brand new tab primarily based on sure situations.”

Cybersecurity

Moreover leveraging its browser visitors interception and filtering capabilities to show game-related adverts, it’s designed to reap and exfiltrate system data to a distant server related to a Chinese language firm named Hubei Dunwang Community Know-how Co., Ltd (湖北盾网网络科技有限公司).

That is achieved via a driver, whose major goal is to inject the libraries into browser functions and alter their execution circulation to alter the URL being accessed or make sure that the homepage of the brand new internet browser occasion is redirected to a specific URL laid out in a configuration.

That is not all. The absence of any entry management lists (ACLs) for the driving force meant that an attacker with a non-privileged account may leverage it to acquire elevated privileges and run code because the NT AUTHORITYSystem account.

“This kernel element unintentionally leaves the door open for different threats to run code on the highest privilege stage out there within the Home windows working system: the System account,” Dumont mentioned. “Attributable to improper entry restrictions to this kernel element, any processes can talk with it and leverage its code injection functionality to focus on any non-protected processes.”

HotPage Adware

Though the precise technique by which the installer is distributed isn’t identified, proof gathered by the Slovakian cybersecurity agency reveals that it has been marketed as a safety resolution for web cafés that is supposed to enhance customers’ looking expertise by stopping adverts.

The embedded driver is notable for the truth that it is signed by Microsoft. The Chinese language firm is believed to have gone by means of Microsoft’s driver code signing necessities and managed to acquire an Prolonged Verification (EV) certificates. It has been faraway from the Home windows Server Catalog as of Could 1, 2024.

Kernel-mode drivers have been required to be digitally signed to be loaded by the Home windows working system, an necessary layer of protection erected by Microsoft to guard in opposition to malicious drivers that might be weaponized to subvert safety controls and intrude with system processes.

That mentioned, Cisco Talos revealed final July how native Chinese language-speaking menace actors are exploiting a Microsoft Home windows coverage loophole to forge signatures on kernel-mode drivers.

“The evaluation of this relatively generic-looking piece of malware has confirmed, as soon as once more, that adware builders are nonetheless prepared to go the additional mile to realize their targets,” Dumont mentioned.

“Not solely that, they’ve developed a kernel element with a big set of strategies to control processes, however in addition they went by means of the necessities imposed by Microsoft to acquire a code-signing certificates for his or her driver element.”

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.



Leave a Reply

Your email address will not be published. Required fields are marked *