• About Us
  • Privacy Policy
  • DMCA
  • Editorial Policy
  • Contact Form
Sunday, June 15, 2025
  • Login
No Result
View All Result
NEWSLETTER
BOB fm
  • Home
  • Top News
  • World
  • Economy
  • science
  • Technology
  • sport
  • entertainment
  • Contact Form
  • Home
  • Top News
  • World
  • Economy
  • science
  • Technology
  • sport
  • entertainment
  • Contact Form
No Result
View All Result
BOB fm
No Result
View All Result
Home Tech

New malware exploits a zero-day flaw in the Windows operating system

Fred Foster by Fred Foster
November 20, 2022
in Tech
0
New malware exploits a zero-day flaw in the Windows operating system
0
SHARES
157
VIEWS
Share on FacebookShare on Twitter

New malware exploits a zero-day flaw in the Windows operating system

A new phishing campaign has been discovered to be using a Windows zero-day vulnerability to carry out its malicious activities. The campaign leads users to install Qbot malware on their systems.

By default, when users download unknown content from the Internet, Windows marks this file with a setting known as “Mark of the Web (MoTW)”. This small attribute tells Windows that the file was downloaded from an external source, and therefore should be considered “unknown”.

This is what allows the system to present a small window to users, asking if they really want to open the file – as well as an indication that it originated from unknown sources and may contain malware.

However, Security investigators From the company ANALYGENCE, it recently revealed that it has discovered a new malware campaign, in which attackers are able to circumvent this system by exploiting a vulnerability in the Windows operating system. When exploited, files downloaded from the Internet can bypass MoTW protection, which basically allows them to run without any kind of alert, bypassing protections like Microsoft SmartScreen.

With this, Windows allows files to be executed directly, which leads to malware installation.

Campaign use javascript files To distribute malicious content, these files are executed directly on the system by the Windows Script Host (wscript.exe). However, these files were usually distributed as .ISO image files, which ignored the MoTW attributes when extracted to the system.

Criminals will take advantage of this to execute files without the traditional Windows wake. Microsoft will fix this issue in the meantime with its latest Patch Tuesday update, though the main recommendation is still that users be careful about where they download files and where they come from.

Fred Foster

“Friendly zombie fanatic. Analyst. Coffee buff. Professional music specialist. Communicator.”

Fred Foster

Fred Foster

"Friendly zombie fanatic. Analyst. Coffee buff. Professional music specialist. Communicator."

Next Post
The Ball – Scolari recalls the role of veterans in Ronaldo’s growth: «Figo, Pauleta…» (Portugal)

The Ball - Scolari recalls the role of veterans in Ronaldo's growth: «Figo, Pauleta...» (Portugal)

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Navigate

  • Home
  • Top News
  • World
  • Economy
  • science
  • Technology
  • sport
  • entertainment
  • Contact Form

Pages

  • About Us
  • Privacy Policy
  • DMCA
  • Editorial Policy
  • Contact Form
  • About Us
  • Privacy Policy
  • DMCA
  • Editorial Policy
  • Contact Form

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • About Us
  • Contact Form
  • DMCA
  • Editorial Policy
  • Privacy Policy

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.