Malware News New malware persistence method leveraging Microsoft UWP apps

Ink

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
A security researcher from Norway has discovered a new trick that can allow malware to persist on infected systems after reboots.

In infosec circles, the term for this is "persistence" and refers to a malware strain's ability to start right back up after a system reboot.

Oddvar Moe, a Norwegian blogger and Windows security specialist, has recently discovered a new and somewhat clever way of abusing the Windows Registry to trick Windows into running a malware's process after a boot-up.

Moe's new method only works on Windows 10, and only with apps developed for the Universal Windows Platform, a new Windows runtime system that Microsoft launched back in 2015.

In an interview with ZDNet, Moe said the technique should work with any UWP apps, but it is only useful when used with UWP apps that Windows 10 runs automatically after boot-up --such as Cortana and the People app.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top