Daily Tech News, Interviews, Reviews and Updates

Ransomware Author Uses Genshin Impact Anti-Cheat Driver, destroys Antivirus

In the final week of July 2022, a ransomware virus was detected in an application environment with properly configured strong encryption. It was discovered that a code-signed driver called “mhyprot2.sys,” which provides anti-cheat functions for Genshin Impact as a controller, was being abused to bypass permissions by analyzing the series. As a result, kernel-level commands terminated the threat detection processes.

As per the reports, ransomware was just the first example of such a malicious activity to be discovered. Majorly, the threat actor aimed to attack the victim’s device with spyware and thereafter, spread the infection. Investigations are being continued, to determine the scope of the driver. The reason is the integration of mbyprot2.sys into any malware, as it is quite easy.

There have previously been reports and factual data about code-signed rootkits such as Netfilter, FiveSys, and Fire Chili. These rootkits were typically signed with stolen certificates or falsely substantiated. However, when a genuine driver is used as a rootkit, the situation changes dramatically. This is also true in this case.



Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More
You might also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More