Thursday, May 21, 2026
English News
  • Hyderabad
  • Telangana
  • AP News
  • India
  • World
  • Entertainment
  • Sport
  • Science and Tech
  • Business
  • Rewind
  • ...
    • NRI
    • View Point
    • cartoon
    • My Space
    • Education Today
    • Reviews
    • Property
    • Lifestyle
E-Paper
  • NRI
  • View Point
  • cartoon
  • My Space
  • Reviews
  • Education Today
  • Property
  • Lifestyle
Home | Science & Tech | Microsoft Admits To Signing Rootkit Malware In Supply Chain Fiasco

Microsoft admits to signing rootkit malware in supply-chain fiasco

According to Bleeping Computers, this driver, called "Netfilter," is a rootkit that was observed communicating with Chinese command-and-control (C2) IPs.

By IANS
Updated On - 28 June 2021, 03:17 PM
Microsoft admits to signing rootkit malware in supply-chain fiasco
whatsapp facebook twitter telegram

San Francisco: Tech giant Microsoft has now confirmed signing a malicious driver being distributed within gaming environments.

According to Bleeping Computers, this driver, called “Netfilter,” is a rootkit that was observed communicating with Chinese command-and-control (C2) IPs.


G Data malware analyst Karsten Hahn first took notice of this event last week and was joined by the wider infosec community in tracing and analysing the malicious drivers bearing the seal of Microsoft.

This incident has once again exposed threats to software supply-chain security, except this time it stemmed from a weakness in Microsoft’s code-signing process.

Microsoft said it is actively investigating this incident, although thus far, there is no evidence that stolen code-signing certificates were used.

The mishap seems to have resulted from the threat actor following Microsoft’s process to submit the malicious Netfilter drivers and managing to acquire the Microsoft-signed binary in a legitimate manner.

“Microsoft is investigating a malicious actor distributing malicious drivers within gaming environments,” the company was quoted as saying by the website.

“We have suspended the account and reviewed their submissions for additional signs of malware,” said Microsoft yesterday.

According to Microsoft, the threat actor has mainly targeted the gaming sector specifically in China with these malicious drivers and there is no indication of enterprise environments having been affected so far.

  • Follow Us :
  • Tags
  • gaming environments
  • malicious driver
  • Microsoft

Related News

  • Thousands of IT jobs set to disappear as Meta, Microsoft restructure workforce in AI era

    Thousands of IT jobs set to disappear as Meta, Microsoft restructure workforce in AI era

  • Musk seeks up to $134 billion in damages from OpenAI, Microsoft

    Musk seeks up to $134 billion in damages from OpenAI, Microsoft

  • Open AI, Microsoft face lawsuit over ChatGPT’s alleged role in Connecticut murder-suicide

    Open AI, Microsoft face lawsuit over ChatGPT’s alleged role in Connecticut murder-suicide

  • Microsoft deepening its commitment to India’s AI ecosystem, says Satya Nadella

    Microsoft deepening its commitment to India’s AI ecosystem, says Satya Nadella

Latest News

  • Cartoon Today on May 21, 2026

    5 mins ago
  • Mouni Roy shares glamorous Cannes moments amid separation buzz

    23 mins ago
  • Congress to join Tamil Nadu Cabinet after nearly 60 years in TVK government expansion

    41 mins ago
  • Trump warns Iran against nuclear weapons during Coast Guard Academy speech

    1 hour ago
  • Former Microsoft executive S. Somasegar dies at 59, tech world pays tribute

    1 hour ago
  • Salman Khan accepts paparazzi apology after hospital visit controversy

    2 hours ago
  • CESS brought under NPDCL purview after TERC order

    9 hours ago
  • Woman attacks husband with knife in Khammam

    9 hours ago

company

  • Home
  • About Us
  • Contact Us
  • Privacy Policy

business

  • Subscribe

telangana today

  • Telangana
  • Hyderabad
  • Latest News
  • Entertainment
  • World
  • Andhra Pradesh
  • Science & Tech
  • Sport

follow us

  • Telangana Today Telangana Today
Telangana Today Telangana Today

© Copyrights 2024 TELANGANA PUBLICATIONS PVT. LTD. All rights reserved. Powered by Veegam