Microsoft permanently blocked Trend Micro driver for ”cheating” hardware test

San Francisco, May 28 (IANS) A Microsoft cybersecurity team has obstructed a free Trend Micro anti-virus device from running on Windows 10 OS that appeared to modify its operation and allegedly cheat through the stringent certification test for drivers.

Windows 10
Windows 10 Update

Source – outlook

For outsider drivers, passing Microsoft’s’ Windows Hardware Quality Labs (WHQL) certification test is important.

On the off chance that a driver is trustworthy than it Digitally marked by Microsoft. After all tests they approve the item apear in Windows.

After reverse-engineering the driver, which sits at the core of Trend Micro’s’ Rootkit Buster software, Microsoft team had the option to pinpoint blemishes in the code, determining that the software can sidestep equipment certification tests.

Check  Apple's iOS 14 will include Podcasts app features in update to compete with Spotify

Meanwhile, Trend Micro has additionally withdrawn downloads of its rootkit detector that utilizes the driver.

Windows internals master Alex Ionescu first discovered that Microsoft has blocked Trend Micro’s’ driver.

Computer security specialist Bill Demirkapi likewise revealed weaknesses in the driver’s’ code just as an exertion by the software to detect Microsoft’s’ QA test suite.

The Rootkit Buster software has now disappeared from cybersecurity firm Trend Micro’s’ website.

As per the organization, they have discovered “a medium-level security issue and are attempting to ensure it is appropriately and quickly settled”.

“We are working intimately with our accomplices at Microsoft to ensure that our code is in compliance with their thorough guidelines,” said the representative.

Check  Investment in Graphene Battery can be a beneficial investment

Rootkit Buster is a free instrument discharged in 2018 that chases down rootkits intended to sidestep detection by filtering concealed documents, vault passages, procedures, drives and the ace boot record.

The software likewise examines bit code patches, working framework administration snares, record streams, ports, and administrations to identify and expel malicious rootkits, reports IT Pro.

Deepak Prajapati

Deepak Prajapati is a software engineer, Who loves to stay updated. "Sharing is Caring" his specialty.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *