![]() |
LuckyMouse signs malicious NDISProxy driver with certificate of Chinese IT company - Printable Version +- Geeks for your information (https://www.geeks.fyi) +-- Forum: News (https://www.geeks.fyi/forumdisplay.php?fid=105) +--- Forum: Privacy & Security News (https://www.geeks.fyi/forumdisplay.php?fid=107) +--- Thread: LuckyMouse signs malicious NDISProxy driver with certificate of Chinese IT company (/showthread.php?tid=3765) |
LuckyMouse signs malicious NDISProxy driver with certificate of Chinese IT company - harlan4096 - 13 September 18 ![]() What happened?
Since March 2018 we have discovered several infections where a previously unknown Trojan was injected into the lsass.exe system process memory. These implants were injected by the digitally signed 32- and 64-bit network filtering driver NDISProxy. Interestingly, this driver is signed with a digital certificate that belongs to Chinese company LeagSoft, a developer of information security software based in Shenzhen, Guangdong. We informed the company about the issue via CN-CERT.
The campaign described in this report was active immediately prior to Central Asian high-level meeting and we suppose that actor behind still follows regional political agenda. Which malicious modules are used? The malware consists of three different modules:
|