- Apr 13, 2013
- 3,224
As I’ll be going on a vacation (well deserved) shortly I wanted to present one more Video that is on a topic highly important to me.
A Scriptor series was presented in June that demonstrated that a malicious file could be written that could trash an endpoint by deleting system files even with UAC enabled. An obvious issue is that if such a malicious file was also coded to connect to the Network (worm) an entire organization could be brought down. If that
organization was, for example, an Electric Utility or a Military C&C one can imagine the chaos that would ensue.
Malware such as the one used here has been seen a few times in the past year and has caused much concern. They were created as an AutoIT worm with a Python component (I have coded mine similarly and with a time delay component). This malware type exploits a flaw in Windows seen in Win 8 and below, and through the grapevine I had heard this would be fixed in Windows 10.
We’ll see:
A Scriptor series was presented in June that demonstrated that a malicious file could be written that could trash an endpoint by deleting system files even with UAC enabled. An obvious issue is that if such a malicious file was also coded to connect to the Network (worm) an entire organization could be brought down. If that
organization was, for example, an Electric Utility or a Military C&C one can imagine the chaos that would ensue.
Malware such as the one used here has been seen a few times in the past year and has caused much concern. They were created as an AutoIT worm with a Python component (I have coded mine similarly and with a time delay component). This malware type exploits a flaw in Windows seen in Win 8 and below, and through the grapevine I had heard this would be fixed in Windows 10.
We’ll see: