Malware, Vulnerability Management, Threat Intelligence

HiddenGh0st RAT launched through widespread Truesight.sys driver exploitation

Credit: Adobe Stock Images

More than 2,500 iterations of a legacy RogueKiller Antirootkit Driver version dubbed "Truesight.sys" have been utilized to facilitate the deployment of the HiddenGh0st malware as part of a widespread Windows-targeted attack campaign believed to be conducted by the Silver Fox APT, reports The Hacker News.

Attacks, which were primarily aimed at China, commenced with the delivery of artifacts masquerading as legitimate apps, which download the legacy Truesight driver and a second-stage payload enabling the retrieval of the endpoint detection and response-killer software and the HiddenGh0st trojan descended from Gh0st RAT, an analysis from Check Point researchers found.

Additional findings showing the direct EDR/AV killer module launching of the Truesight driver suggest that its operations are not dependent of earlier stages, according to researchers.

"Exploiting Arbitrary Process Termination vulnerability allowed the EDR/AV killer module to target and disable processes commonly associated with security solutions, further enhancing the campaign's stealth," researchers added.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds