Connect with us

Hi, what are you looking for?

News

Today, trusted applications can be used for malicious activities

Today, trusted applications can be used for malicious activities

As most companies seek to improve security and other companies try to invade privacy with their own malicious desires, technology will continue to evolve over time. Protected files and folders are no longer safe because they are now vulnerable to hacker attacks. Hackers will not only disable protection, but they will also hijack installed applications and use them to perform malicious tasks.

Researchers call this a double attack. The attack consists of two steps, the most important of which is capturing encrypted files in the protected folder of the antivirus application. The second step is to capture through fixed and guaranteed defenses. This acquisition is called Phantom Control.

Professor Gabriele Lenzini, a researcher at the University of Luxembourg, admitted that those responsible for cybercriminal security and anti-virus applications are now facing competition because the other party has also gained significant influence and commitment in their work.

It also explained that the discovered vulnerabilities may undermine the protection, so the so-called secure folder can be used against users by manipulating data or against the user’s wishes. Created with the most trusted application.

Take Notepad, for example, which becomes a command rewrite hosting platform that allows you to control the system, then encrypt the file, and then save the copy on the clipboard. Speaking of the Ghost Control attack, the results of this attack proved to have consequences: they checked 29 different antivirus programs, 14 of which were not sufficient to defend against Ghost Control and Cut and Mouse attacks, rather than a single solution.

These 29 antivirus programs are sufficient to defend against them. The security research team said that security engineering is an area where security is ensured by connecting components. At the same time, if a hacker finds a gap after interacting with the internal components of the system, the attack surface will be increased.

Today, trusted applications can be used for malicious activities

Image Credit: Digital Information World

OVERVIEW:

The attack consists of two steps, the most important of which is capturing encrypted files in the protected folder of the antivirus application. Take Notepad, for example, which becomes a command rewrite hosting platform that allows you to control the system, then encrypt the file, and then save the copy on the clipboard. Speaking of the Ghost Control attack, the results of this attack proved to have consequences: they checked 29 different antivirus programs, 14 of which were not sufficient to defend against Ghost Control and Cut and Mouse attacks, rather than a single solution.

Advertisement. Scroll to continue reading.
Content Protection by DMCA.com
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

News

Apple’s latest version, iOS 15, allows users to host the application multiple times on the home screen. The ability to have multiple copies of...

News

One of the most common ways for attackers to try to steal some of your personal information is to use information-stealing programs. This is...

Education

The overall view of Facebook CEO Mark Zuckerberg usually depends on the type of actions he takes with the company, but the fact that...

News

Google has been ruling as a default search engine for a long time, but other competing search engines may now call themselves the default...