From thehackernews.com
Microsoft on Friday said it’s investigating an incident wherein a driver signed by the company turned out to be a malicious Windows rootkit that was observed communicating with command-and-control (C2) servers located in China.
The driver, called “Netfilter,” is said to target gaming environments, specifically in the East Asian country, with the Redmond-based firm noting that “the actor’s goal is to use the driver to spoof their geo-location to cheat the system and play from anywhere.”
“The malware enables them to gain an advantage in games and possibly exploit other players by compromising their accounts through common tools like keyloggers,” Microsoft Security Response Center (MSRC) said.