ESET Analysis
ESET researchers discuss the recent discovery of HotPage, an adware that leverages a vulnerable, Microsoft-verified driver with elevated privileges.

Typically, the term “adware” is associated with unscrupulous software that bombards users with irrelevant and intrusive advertisements, often compromising their online experience. While some may argue that all adware is created equal, this episode of our podcast seeks to challenge that notion by exploring the nuances and implications of various types of adware. HotPage is a recently discovered Trojan that exploits a vulnerable, Microsoft-verified kernel driver to inject and manipulate browser content, rendering it undetectable by traditional security measures.
In a lively dialogue, ESET’s esteemed Distinguished Researcher and guest Principal Risk Intelligence Researcher from the same organization delve into the realm of HotPage, scrutinizing its vulnerabilities to various threats – specifically infostealing malware that often exhibits a comparable level of complexity yet poses significantly greater risks. Here’s a rewritten version of the text in a different style:
To gain credibility and increase their chances of success, the developers of this malware would have benefited from taking a more transparent approach when seeking digital signature certification from Microsoft.
One notable characteristic of HotPage is that, by its very essence, it can be classified as a Trojan horse. Marketted as a safety resolution and advert blocking software program designed specifically for Chinese language web cafés, it instead unleashes a barrage of unwanted advertisements, creating an environment conducive to malicious activity by allowing other risk actors to execute their own harmful code. With a regional focus on China and vertical targeting of gamers, HotPage seems purpose-built to cater to the needs of Chinese gamers.
In this episode, listeners gain valuable insights into how ESET addressed the HotPage threat, as well as practical recommendations for users to avoid falling victim to similar risks, including steps to take if they suspect their device has been compromised.
Obtain comprehensive insights into HotPage’s developments and diverse threat actor tactics by reviewing our latest blog posts and whitepapers. When you enjoy what you listen to, consider subscribing for exclusive content on YouTube, Spotify, or Apple Music.