Legacy Driver Exploitation Through Bypassing Certificate Verification

Legacy Driver Exploitation Through Bypassing Certificate Verification

1. Overview In June 2024, the security company CheckPoint-Research (CPR) published a post on a security threat that used the Legacy Driver Exploitation technique. This attack mostly focused on remotely controlling infected systems using the Gh0stRAT malware and causing additional damage. The threat actor distributed malware using a phishing site