Also in the article making it's rounds on the web, quoted here, which is also part of what Exterminator's post refers to
QUOTE
"
The Windows User Access Control (UAC) security feature in Windows versions 7 and 10 can be easily bypasses by cybercriminals who managed to leverage the Event Viewer application.
The security experts Matt Graeber and Matt Nelson were the ones to uncover this hack. At the end of last month, they detailed one more Windows UAC bypass which is using the Windows 10 Disk Cleanup utility. However, the two bypasses are different from each other when it comes to their technique.
The one from the end of July is using Disk Cleanup and required the researchers to use a high-privileged process to copy a DLL into a safe location, which they used in a DLL hijacking attack that didn’t get detected by UAC.
For the latest bypass, the duo came up with a new technique in which dropping any malicious DLL on the file system and DLL hijacking are not necessary. It doesn’t rely on stored on disk files.
This fileless UAC bypass needs the creation of a structure of intertwined Windows registry keys. The Event Viewer process (eventvwr.exe) would query these keys causing a disguised high integrity process operation like Event Viewer. Thinking of it as an innocuous operation, the UAC wouldn’t flag it.
Given that all other UAC bypass techniques require privileged file copy, process hijacking and dropping files on the user’s PC to be successful, Graber and Nelson claim that this is one of a kind bypass which has never been seen before." END
The " Achilles Heel " of UAC is windows own native processes, and these are two of 3 processes that are highlighted in Exterminator's post. As Malware authors expand and adopt new methods defeating UAC is only going to get easier.
MS has to adapt too, and remove native processes from the "Auto Trust" so to speak, no process or software should be auto exempt. This makes the job much easier for authors to exploit UAC.
As this and other techniques are improved and expanded upon, it will only get easier, so MS has some work to do to stifle this attack vector.