Rootkit capabilities likely with Windows bugs

Several rootkit-like capabilities could be obtained by threat actors through the exploitation of vulnerabilities in Windows’ DOS-to-NT path conversion process, including file and process concealment and compromised prefetch file analysis, reports The Hacker News. Malicious actors could also leverage the issues to obfuscate a malware file as a verified Microsoft executable, as well as tap a denial-of-service bug to deactivate Process Explorer, according to a SafeBreach report presented at the Black Hat Asia conference.

Source: SC Magazine

 


Date:

Categorie(s):