Connect with us

Hi, what are you looking for?

Today, trusted applications can be used for malicious activities

News

Today, trusted applications can be used for malicious activities

As most companies seek to improve security and other companies try to invade privacy with their own malicious desires, technology will continue to evolve over time. Protected files and folders are no longer safe because they are now vulnerable to hacker attacks. Hackers will not only disable protection, but they will also hijack installed applications and use them to perform malicious tasks.

Researchers call this a double attack. The attack consists of two steps, the most important of which is capturing encrypted files in the protected folder of the antivirus application. The second step is to capture through fixed and guaranteed defenses. This acquisition is called Phantom Control.

Professor Gabriele Lenzini, a researcher at the University of Luxembourg, admitted that those responsible for cybercriminal security and anti-virus applications are now facing competition because the other party has also gained significant influence and commitment in their work.

It also explained that the discovered vulnerabilities may undermine the protection, so the so-called secure folder can be used against users by manipulating data or against the user’s wishes. Created with the most trusted application.

Take Notepad, for example, which becomes a command rewrite hosting platform that allows you to control the system, then encrypt the file, and then save the copy on the clipboard. Speaking of the Ghost Control attack, the results of this attack proved to have consequences: they checked 29 different antivirus programs, 14 of which were not sufficient to defend against Ghost Control and Cut and Mouse attacks, rather than a single solution.

These 29 antivirus programs are sufficient to defend against them. The security research team said that security engineering is an area where security is ensured by connecting components. At the same time, if a hacker finds a gap after interacting with the internal components of the system, the attack surface will be increased.

Today, trusted applications can be used for malicious activities

Image Credit: Digital Information World

OVERVIEW:

Twitter will release updates that no longer crop photos on mobile devices and posts to stop offensive and harmful language on the web

The attack consists of two steps, the most important of which is capturing encrypted files in the protected folder of the antivirus application. Take Notepad, for example, which becomes a command rewrite hosting platform that allows you to control the system, then encrypt the file, and then save the copy on the clipboard. Speaking of the Ghost Control attack, the results of this attack proved to have consequences: they checked 29 different antivirus programs, 14 of which were not sufficient to defend against Ghost Control and Cut and Mouse attacks, rather than a single solution.

Advertisement. Scroll to continue reading.
mail2box786@gmail.com'
Written By

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Showbiz

Pakistani actress Neelam Munirka said that I always try to keep my job while I do not interfere in anyone’s affairs. Pakistani celebrity Neelam...

Celebrity

Catherine McBroom of The Ace Family is speaking out in defense of her husband Austin McBroom after one media outlet alleged that he has...

Entertainment

WWE After the Bell with Corey Graves and Vic Joseph will play host to special guests and surprises in the lead-up to WrestleMania 37 with daily episodes beginning...

Celebrity

Molly Ephraim became popular as Mike Baxter’s daughter on the sitcom Last Man Standing. However, most people don’t know her career highlights in her...

Advertisement