There is a form of ransomware exploiting a vulnerable Gigabyte driver. since the driver is digitally signed it becomes easy to install. The malware installs a second driver that disables security so... Vulnerable yet digitally signed Gigabyte driver actively being exploited - RobbinHood Randomware
Yep, i absolutely saw this coming. This file has been used to hack EAC and Battle eye protected games for months
Verisign should put the cert on their blacklist ... the driver will get invalid, but so does the ransomware which relys on this driver to infect. Just another example of "I dont think this will raise any issues".
Verisign hasn't been a CA since 2010 when it sold the CA portion of its business to Symantec and is thus not responsible for this certificate in any way. The burden is on the certificate owner (Gigabyte) to revoke the certificate. If a CA randomly revoked certificates that they signed but did not own, they would not be a CA for very long.
Verizon ... you're right about them. I somehow had the name in my mind but completely forgot this story ...
it's remind a scene from monty python's graal comedy "hoooo i told you, i told you but you don't listened"... *edit* i found it And about Battleyes, it is that the problem IS Battleyes... On each game when you remove it to play in local (i know it's bad... but legal if you own the game) you solve most bugs, astonishing to offer a protection like that in 2020!!!