Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

Threat actors could exploit the DOS-to-NT path conversion process to gain rootkit-like capabilities, concealing and impersonating files, directories, and processes. SafeBreach researcher Or Yair revealed this at the Black Hat Asia conference. MagicDot paths enable rootkit-like functions for unprivileged users, allowing them to execute malicious actions without admin permissions. These actions include hiding files, affecting prefetch file analysis, and more. Microsoft has addressed three out of four security flaws stemming from this process, including elevation of privilege vulnerabilities and remote code execution issues. Yair emphasized the broader implications for software vendors and the significant security risk posed by such known issues.

Read more

Sign up to receive daily content in your inbox

We don’t spam! Read our privacy policy for more info.

Share This Article

Leave Comment

Your email address will not be published. Required fields are marked *

Daily Newsletter

Subscribe to our free daily newsletter to get the latest summarized updates