Jump to content

Ransomware abuses Genshin Impact's kernel mode anti-cheat to bypass antivirus protection


Recommended Posts


Security skeptics and advocates have worried for some time now that exploits able to take advantage of anti-cheat kernel-mode drivers could wreak serious havoc on PC security. Now it seems to have happened: The anti-cheat driver used by Genshin Impact, the popular free-to-play RPG, has been abused by a ransomware actor to stop antivirus processes and enable the mass deployment of their ransomware.

A new whitepaper published August 24th to Trend Micro explains how the perfectly legitimate driver mhyprot2.sys was used, absent any other parts of Genshin Impact, to gain root access to a system. 

"Security teams and defenders should note that mhyprot2.sys can be integrated into any malware," wrote authors Ryan Soliven and Hitomi Kimura. 

"Genshin Impact does not need to be installed on a victim’s device for this to work; the use of this driver is independent of the game."

Kernel-mode drivers are at the very core of your computer's system. At the risk of gross oversimplification, software at the kernel level generally has more control over your PC than you do. Genshin Impact's anti-cheat was previously under scrutiny for continuing to run—at the kernel level—even after you closed the game. Developer HoYoVerse, then known as MiHoYo, later changed that.

The paper is clear that this is a severe security breach of the entire Windows operating environment. It notes that the driver module "cannot be erased once distributed" and isn't inherently malicious—simply an abusable piece of otherwise-legitimate software. 

"This module is very easy to obtain and will be available to everyone until it is erased from existence," the paper states. "It could remain for a long time as a useful utility for bypassing privileges. Certificate revocation and antivirus detection might help to discourage the abuse, but there are no solutions at this time because it is a legitimate module."

This is hardly the first time that kernel level anti-cheat has been a security concern for the games industry. A double whammy hit in May 2020 when both Riot Games' Valorant and Doom Eternal released with kernel mode anti-cheat. At the time, Riot noted that plenty of other kernel-level anti-cheat software already existed—although not to the extent of Riot's Vanguard software, which begins when Windows boots up. 

But kernel level anti-cheat technology is generally effective, and for some gamers who are sick of dealing with cheaters, that makes the risk worthwhile. By the end of last year, for instance, Call of Duty players were unhappy enough with cheaters that some welcomed Activision Blizzard having access to every bit of memory on their entire PC.

No matter the history and now-widespread usage, this kind of abuse is exactly what those who feared the spread of kernel-mode anti-cheat were warning of. If a vulnerability has been found, what follows could be significantly worse than vulnerabilities in normal, user-level anti-cheat software. I've reached out to MiHoYo for comment on the report, and will update if I receive a reply.

View the full article

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Create New...

Important Information

By using this site, you agree to our Guidelines Privacy Policy.