HomeVulnerabilityAttackers can abuse the Home windows UI Automation framework to steal information...

Attackers can abuse the Home windows UI Automation framework to steal information from apps

“An alternative choice to take care of stealth with out taking a passive strategy is to make use of the caching mechanism of UIA,” the researcher mentioned. “Along with the UI parts at the moment proven on the display that we are able to work together with, extra parts are loaded prematurely and positioned in a cache. We are able to additionally work together with these parts, equivalent to studying messages not proven on the display, and even set the textual content field and ship messages with out it being mirrored on the display.”

This, after all, works in different functions as properly. For instance, within the context of a web based buying web site opened within the browser, an attacker might use the UIA to detect when the person is typing bank card info and exfiltrate that information.

Or they might work together with the handle bar to forcefully redirect the person to a malicious model of the web site they at the moment have open. Because the person already expects to be on the web site, they may not even discover the handle change. For instance, if the web site refreshes and asks them to log in, they may assume their session expired and they should re-authenticate. This occurs fairly steadily on some web sites, together with electronic mail companies, and may not elevate suspicion.

See also  New malicious MS Workplace macro clusters found
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular