TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A Huawei driver that opened systems to attack

76 pointsby Deinosabout 6 years ago

4 comments

vardumpabout 6 years ago
Two words: plausible deniability.<p>Those techniques used in Huawei&#x27;s driver are pretty unusual. I wonder if there&#x27;s a chain of vulnerabilities from other components, including those that see network data.<p>Disclaimer: My dayjob includes writing Windows kernel drivers.
hactuallyabout 6 years ago
&gt; To perform that restart, the driver injected code into a privileged Windows process and then ran that code using an APC—a technique lifted straight from malware. &gt; Why Huawei chose this approach is not immediately clear, as Windows has as a built-in feature the ability to restart crashed services. There&#x27;s no need for an external watchdog.<p>Yes. How weird. An unusual and vulnerable technique was used that also gave plausible deniability?
评论 #19497049 未加载
MagicPropmakerabout 6 years ago
Good for Microsoft and their toolchain for finding this. They take security seriously.
评论 #19498479 未加载
ancorevardabout 6 years ago
Super surprised to hear it was Huawei that accidentally did this.