Threat Actors Abusing Signed Drivers to Launch Modern Kernel Level Attacks on Windows

A comprehensive investigation by cybersecurity researchers has uncovered how threat actors are systematically abusing Microsoft’s Windows Hardware Compatibility Program (WHCP) and Extended Validation (EV) certificates to legitimize malicious kernel drivers, effectively bypassing traditional security defenses and gaining unprecedented system control. Since 2020, security researchers have identified more than 620 malicious drivers, 80+ compromised certificates, and 60+ WHCP accounts associated with threat actor campaigns. The emergence of underground driver certificate providers highlights the resourcefulness of threat actors and reveals critical vulnerabilities in current driver-signing processes, emphasizing the urgent need for enhanced security measures in the digital certificate ecosystem. The scale represents a significant escalation in kernel-level attacks, with Group-IB’s threat intelligence investigation revealing that approximately 32% of analyzed malicious drivers functioned as loaders, capable of retrieving secondary payloads from command-and-control servers. The abuse peaked in 2022, when over 250 drivers and approximately 34 certificates and WHCP accounts were identified as potentially compromised by security researchers. Analysis reveals a significant concentration of malicious activity originating from Chinese threat actors, with most certificates and WHCP accounts tied to Chinese companies based on metadata analysis. Security researchers have identified overlapping infrastructure between seemingly unrelated campaigns, suggesting coordinated efforts among multiple threat actor groups using shared signing capabilities. Cybercriminals are increasingly exploiting legitimate Windows driver signing processes to deploy sophisticated kernel-level malware, with new research revealing a concerning trend that has compromised over 620 drivers since 2020.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 07 Jul 2025 10:25:16 +0000


Cyber News related to Threat Actors Abusing Signed Drivers to Launch Modern Kernel Level Attacks on Windows

CVE-2023-52528 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2025-38227 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago
CVE-2022-49301 - In the Linux kernel, the following vulnerability has been resolved: ...
5 months ago
CVE-2024-38565 - In the Linux kernel, the following vulnerability has been resolved: wifi: ar5523: enable proper endpoint verification Syzkaller reports [1] hitting a warning about an endpoint in use not having an expected type to it. Fix the issue by checking for ...
1 year ago Tenable.com
Staying ahead of threat actors in the age of AI - At the same time, it is also important for us to understand how AI can be potentially misused in the hands of threat actors. In collaboration with OpenAI, today we are publishing research on emerging threats in the age of AI, focusing on identified ...
1 year ago Microsoft.com Kimsuky
CVE-2021-47472 - In the Linux kernel, the following vulnerability has been resolved: net: mdiobus: Fix memory leak in __mdiobus_register Once device_register() failed, we should call put_device() to decrement reference count for cleanup. Or it will cause memory leak. ...
1 year ago Tenable.com
CVE-2024-58071 - In the Linux kernel, the following vulnerability has been resolved: ...
5 months ago
CVE-2022-49298 - In the Linux kernel, the following vulnerability has been resolved: ...
5 months ago
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
1 month ago Cybersecuritynews.com
CVE-2025-37897 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
Threat Actors Abusing Signed Drivers to Launch Modern Kernel Level Attacks on Windows - A comprehensive investigation by cybersecurity researchers has uncovered how threat actors are systematically abusing Microsoft’s Windows Hardware Compatibility Program (WHCP) and Extended Validation (EV) certificates to legitimize malicious ...
1 month ago Cybersecuritynews.com
TeamCity Intrusion Saga: APT29 Suspected Among the Attackers Exploiting CVE-2023-42793 - As part of this analysis, we look at threat actor TTPs employed throughout the intrusion and how they were identified and pieced together by the FortiGuard IR team. The following section of this report focuses on the activities of one of these threat ...
1 year ago Feeds.fortinet.com CVE-2023-42793 APT29
CVE-2025-37945 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
Operation Morpheus took down 593 Cobalt Strike servers used by threat actors - Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769. Experts released PoC exploit code for a critical bug in Progress Telerik Report Servers. Threat actors may have exploited a zero-day in older iPhones, Apple warns. Nation-state ...
1 year ago Securityaffairs.com CVE-2024-0769 CVE-2022-38028 CVE-2023-49103 CVE-2023-46747 CVE-2023-46748 CVE-2023-4966 APT28
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
CVE-2024-26957 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Threat actors misuse OAuth applications to automate financially driven attacks - Threat actors are misusing OAuth applications as an automation tool in financially motivated attacks. Threat actors compromise user accounts to create, modify, and grant high privileges to OAuth applications that they can misuse to hide malicious ...
1 year ago Microsoft.com
CVE-2021-47078 - In the Linux kernel, the following vulnerability has been resolved: ...
9 months ago
CVE-2024-41097 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
CVE-2024-50073 - In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm] Read of size 8 at addr ...
9 months ago Tenable.com
CVE-2025-21948 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
CVE-2025-22085 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
Windows Security in 2025: Battling Sophisticated Threats with Advanced Defenses - As threat actors adapt their techniques, Microsoft has responded with significant security enhancements while organizations navigate a complex threat environment dominated by privilege escalation attacks and driver vulnerabilities. This Windows ...
3 months ago Cybersecuritynews.com CVE-2025-0289
CVE-2022-49741 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
CVE-2024-26688 - In the Linux kernel, the following vulnerability has been resolved: fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super When configuring a hugetlb filesystem via the fsconfig() syscall, there is a possible NULL dereference in ...
1 year ago Tenable.com