Connect with us

Hi, what are you looking for?

News

Today, trusted applications can be used for malicious activities

Today, trusted applications can be used for malicious activities

As most companies seek to improve security and other companies try to invade privacy with their own malicious desires, technology will continue to evolve over time. Protected files and folders are no longer safe because they are now vulnerable to hacker attacks. Hackers will not only disable protection, but they will also hijack installed applications and use them to perform malicious tasks.

Researchers call this a double attack. The attack consists of two steps, the most important of which is capturing encrypted files in the protected folder of the antivirus application. The second step is to capture through fixed and guaranteed defenses. This acquisition is called Phantom Control.

Professor Gabriele Lenzini, a researcher at the University of Luxembourg, admitted that those responsible for cybercriminal security and anti-virus applications are now facing competition because the other party has also gained significant influence and commitment in their work.

It also explained that the discovered vulnerabilities may undermine the protection, so the so-called secure folder can be used against users by manipulating data or against the user’s wishes. Created with the most trusted application.

Take Notepad, for example, which becomes a command rewrite hosting platform that allows you to control the system, then encrypt the file, and then save the copy on the clipboard. Speaking of the Ghost Control attack, the results of this attack proved to have consequences: they checked 29 different antivirus programs, 14 of which were not sufficient to defend against Ghost Control and Cut and Mouse attacks, rather than a single solution.

Twitter and Facebook is getting banned in India

These 29 antivirus programs are sufficient to defend against them. The security research team said that security engineering is an area where security is ensured by connecting components. At the same time, if a hacker finds a gap after interacting with the internal components of the system, the attack surface will be increased.

Today, trusted applications can be used for malicious activities

Image Credit: Digital Information World

OVERVIEW:

The attack consists of two steps, the most important of which is capturing encrypted files in the protected folder of the antivirus application. Take Notepad, for example, which becomes a command rewrite hosting platform that allows you to control the system, then encrypt the file, and then save the copy on the clipboard. Speaking of the Ghost Control attack, the results of this attack proved to have consequences: they checked 29 different antivirus programs, 14 of which were not sufficient to defend against Ghost Control and Cut and Mouse attacks, rather than a single solution.

mail2box786@gmail.com'
Written By

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Tech

The China Telecom site shared key details of the Open A35 before its launch. It shared price information, images, and specifications. MediaTek Helio P35...

Mobile

iPhone SE3, The iPhone S, could not be released as a sequel 2020 this year. According to new reports, the iPhone SE 3 is...

Entertainment

WWE After the Bell with Corey Graves and Vic Joseph will play host to special guests and surprises in the lead-up to WrestleMania 37 with daily episodes beginning...

Extra

Isn’t it tempting to know about Ethan Klein’s Net Worth? That’s why you’re here, and I assure you you’ll find the exact figure of...