[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f0cJZBlm00E_fl4XnqcTE5n8qFI_FQLPAlNq_hmZfSG8":3},{"article":4,"iocs":39},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":24,"category":25,"article_tags":28},"3d41ace7-2373-46f1-8c9a-afbccae7f978","We have found new RedDriver similar to the ones found by Talos (https:\u002F\u002Ft.co\u002FUAZYWmmDLF)\nThey are...","we-have-found-new-reddriver-similar-to-the-ones-found-by-talos-https-t-co-uazywm-088116","We have found new RedDriver similar to the ones found by Talos (https:\u002F\u002Ft.co\u002FUAZYWmmDLF)\nThey are WHQL signed with low detection on VT.\n\n1da4f7f001d239a54fab50eb7c3cbc985db392a3d4405e19c3a5d2035d591004 - SpcSpOpusInfo =  郑州市肆零叁网络科技有限公司 https:\u002F\u002Ft.co\u002FpTYb3dwkM0","Security researchers identified a new RedDriver malware sample similar to those previously reported by Talos. The malware is signed with a legitimate WHQL certificate and exhibits low detection rates on VirusTotal, suggesting potential supply chain or driver-based attack delivery. The sample contains a Chinese company name (郑州市肆零叁网络科技有限公司) in the certificate metadata.","New RedDriver malware variant discovered with WHQL signature and low VirusTotal detection.",null,"https:\u002F\u002Fx.com\u002Fnextronresearch\u002Fstatus\u002F2049769824952148131","https:\u002F\u002Fpbs.twimg.com\u002Fmedia\u002FHHI-howXwAA0pNP.jpg","2026-04-30T08:36:23+00:00","2026-04-30T09:00:08.340801+00:00",8,[18,21],{"name":19,"type":20},"Talos Intelligence","threat_actor",{"name":22,"type":23},"WHQL (Windows Hardware Quality Labs) signing","technology","89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5",{"id":24,"icon":11,"name":26,"slug":27},"Malware","malware",[29,34],{"category":30},{"id":31,"icon":11,"name":32,"slug":33},"26b0b636-0e31-4db1-bffb-61bdf9f20a58","Supply Chain","supply-chain",{"category":35},{"id":36,"icon":11,"name":37,"slug":38},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[40,43],{"type":27,"value":41,"context":42},"RedDriver","Signed malware variant with low VirusTotal detection",{"type":44,"value":45,"context":46},"hash_sha256","1da4f7f001d239a54fab50eb7c3cbc985db392a3d4405e19c3a5d2035d591004","RedDriver malware sample with WHQL signature"]