Vulnerability Management, Threat Intelligence

Techniques to evade Windows security alerts detailed

Share
Laptop user pressing Windows Key on Microsoft Windows keyboard.

Malicious apps could be executed without being flagged by Windows SmartScreen and Smart App Control through several techniques, one of which has already been leveraged by threat actors for the past six years, The Register reports.

Already exploited by attackers is the "LNK Stomping" method, which involves a Windows shortcut file management vulnerability that disregards Windows Mark of the Web, according to an Elastic Security Labs analysis. Microsoft has already been warned of the approach, which could be easily abused through LNK files with atypical internal structures, but has yet to commit to fixing the issue, noted Elastic Tech Lead Joe Desimone. Other attack techniques involve evading reputation-based defenses, the first of which is "Reputation Hijacking," which entails the modification of reputable programs through script hosts. Attackers could also employ "Reputation Seeding," which involves the deployment of a seemingly trustworthy binary that could be abused upon the fulfillment of certain conditions, as well as "Reputation Tampering," which involves alteration of certain app code sections.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.