The coming version of Windows will allow you to set "protected" folders, so that the contents of those folders can only be modified by approved applications. Yes, this is a step toward ransomware protection, but I would be surprised if Microsoft claims that it is total protection, because that claim would be false.Anyone know if this claim by Microsoft is true?
It's beyond flawed. I need to have WD on for it to work.The coming version of Windows will allow you to set "protected" folders, so that the contents of those folders can only be modified by approved applications. Yes, this is a step toward ransomware protection, but I would be surprised if Microsoft claims that it is total protection, because that claim would be false.
Read: Microsoft says 'no known ransomware' runs on Windows 10 S — so we tried to hack it | ZDNetif you're talking Windows 10 S then it cannot run applications outside the Windows Store so the typical ransomware won't work on it at all
Well, it does sound like MS closed off a lot of attack vectors, a lot more than I thought. You can't run an .exe, and you can't run a script. All you can do is try to get a naive user to allow a malicious macro in an MS Office application. That's pretty limited.Read: Microsoft says 'no known ransomware' runs on Windows 10 S — so we tried to hack it | ZDNet
According to that article, a malicious macro for Microsoft Office software which uses reflective DLL loading should do the trick. Of course, the user would have to enable the macro depending on the circumstances but many people become infected via this nowadays on standard versions of Windows anyway.
I cannot say if it really works or not since I've never tested it, but I doubt it is not truthful. It makes perfect sense for it to work.
Anyone know if this claim by Microsoft is true?
Yes, and the naive users are typically the ones who are successfully infected. As an example, if an inexperienced person is capable of downloading an attachment from an untrusted sender and running it without thinking twice, I am sure they will allow the macro - add some social engineering for the cherry on top and the likelihood of a successful infection is even higher.All you can do is try to get a naive user to allow a malicious macro in an MS Office application. That's pretty limited.
Yes, and the naive users are typically the ones who are successfully infected.
I am sure they will allow the macro - add some social engineering for the cherry on top and the likelihood of a successful infection is even higher.
It doesn't even matter if a macro is required. If they are willing to download a normal Win32 executable and run it (leading to infection), what makes you think they won't open the document and allow the macro?